TAILIEUCHUNG - Windows Internals covering windows server 2008 and windows vista- P11

Windows Internals covering windows server 2008 and windows vista- P11: In this chapter, we’ll introduce the key Microsoft Windows operating system concepts and terms we’ll be using throughout this book, such as the Windows API, processes, threads, virtual memory, kernel mode and user mode, objects, handles, security, and the registry. | The Windows command prompt SystemRoot System32 enforces it for batch file execution. Windows Scripting Host components that start scripts SystemRoot System32 for command-line scripts SystemRoot System32 for UI scripts and SystemRoot System32 for script objects enforce it for script execution. Each of these components determines whether the restriction policies are enabled by reading the registry value HKEY_LOCAL_MACHINE Software Microsoft Policies Windows Safer CodeIdentifiers TransparentEnabled which if set to 1 indicates that policies are in effect. Then it determines whether the code it s about to execute matches one of the rules specified in a subkey of the Codeidentifiers key and if so whether or not the execution should be allowed. If there is no match the default policy as specified in the DefaultLevel value of the CodeIdentifiers key determines whether the execution is allowed. Software Restriction Policies are a powerful tool for preventing the unauthorized access of code and scripts but only if properly applied. Unless the default policy is set to disallow execution a user can make minor changes to an image that s been marked as disallowed so that he can bypass the rule and execute it. For example a user can change an innocuous byte of a process image so that a hash rule fails to recognize it or copy a file to a different location to avoid a path-based rule. EXPERIMENT Watching Software Restriction Policy enforcement You can indirectly see Software Restriction Policies being enforced by watching accesses to the registry when you attempt to execute an image that you ve disallowed. 1. Run to open the Local Security Policy Editor and navigate to the Software Restriction Policies node. 2. Choose Create New Policies from the context menu if no policies are defined. 3. Create a path-based disallow restriction policy for SystemRoot System32 . 4. Run Process Monitor and set an include filter for .

TỪ KHÓA LIÊN QUAN
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.