systeminfo.c 8.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242
  1. #include <stdio.h>
  2. #include <wbemidl.h>
  3. #include "systeminfo.h"
  4. #include "beacon.h"
  5. //START TrustedSec BOF print code: https://github.com/trustedsec/CS-Situational-Awareness-BOF/blob/master/src/common/base.c
  6. #ifndef bufsize
  7. #define bufsize 8192
  8. #endif
  9. char *output = 0;
  10. WORD currentoutsize = 0;
  11. HANDLE trash = NULL;
  12. int bofstart();
  13. void internal_printf(const char* format, ...);
  14. void printoutput(BOOL done);
  15. int bofstart() {
  16. output = (char*)MSVCRT$calloc(bufsize, 1);
  17. currentoutsize = 0;
  18. return 1;
  19. }
  20. void internal_printf(const char* format, ...){
  21. int buffersize = 0;
  22. int transfersize = 0;
  23. char * curloc = NULL;
  24. char* intBuffer = NULL;
  25. va_list args;
  26. va_start(args, format);
  27. buffersize = MSVCRT$vsnprintf(NULL, 0, format, args);
  28. va_end(args);
  29. if (buffersize == -1) return;
  30. char* transferBuffer = (char*)KERNEL32$HeapAlloc(KERNEL32$GetProcessHeap(), HEAP_ZERO_MEMORY, bufsize);
  31. intBuffer = (char*)KERNEL32$HeapAlloc(KERNEL32$GetProcessHeap(), HEAP_ZERO_MEMORY, buffersize);
  32. va_start(args, format);
  33. MSVCRT$vsnprintf(intBuffer, buffersize, format, args);
  34. va_end(args);
  35. if(buffersize + currentoutsize < bufsize)
  36. {
  37. MSVCRT$memcpy(output+currentoutsize, intBuffer, buffersize);
  38. currentoutsize += buffersize;
  39. } else {
  40. curloc = intBuffer;
  41. while(buffersize > 0)
  42. {
  43. transfersize = bufsize - currentoutsize;
  44. if(buffersize < transfersize)
  45. {
  46. transfersize = buffersize;
  47. }
  48. MSVCRT$memcpy(output+currentoutsize, curloc, transfersize);
  49. currentoutsize += transfersize;
  50. if(currentoutsize == bufsize)
  51. {
  52. printoutput(FALSE);
  53. }
  54. MSVCRT$memset(transferBuffer, 0, transfersize);
  55. curloc += transfersize;
  56. buffersize -= transfersize;
  57. }
  58. }
  59. KERNEL32$HeapFree(KERNEL32$GetProcessHeap(), 0, intBuffer);
  60. KERNEL32$HeapFree(KERNEL32$GetProcessHeap(), 0, transferBuffer);
  61. }
  62. void printoutput(BOOL done) {
  63. char * msg = NULL;
  64. BeaconOutput(CALLBACK_OUTPUT, output, currentoutsize);
  65. currentoutsize = 0;
  66. MSVCRT$memset(output, 0, bufsize);
  67. if(done) {MSVCRT$free(output); output=NULL;}
  68. }
  69. //END TrustedSec BOF print code.
  70. int go() {
  71. BOOL SomethingToPrint = 0;
  72. HRESULT hr = S_OK;
  73. IWbemLocator *pLoc = NULL;
  74. IWbemServices *pSvc = NULL;
  75. IEnumWbemClassObject* pEnumerator = NULL;
  76. IWbemClassObject *pclsObj = NULL;
  77. ULONG uReturn = 0;
  78. VARIANT vtProp;
  79. BSTR strNetworkResource = NULL;
  80. BSTR strQueryLanguage = NULL;
  81. BSTR strQuery = NULL;
  82. if(!bofstart()) return;
  83. hr = OLE32$CoInitializeEx(NULL, COINIT_MULTITHREADED);
  84. if (FAILED(hr)) goto cleanup;
  85. hr = OLE32$CoInitializeSecurity(NULL, -1, NULL, NULL, RPC_C_AUTHN_LEVEL_DEFAULT, RPC_C_IMP_LEVEL_IMPERSONATE, NULL, EOAC_NONE, NULL);
  86. if (FAILED(hr)) {
  87. if(hr == RPC_E_TOO_LATE) {
  88. BeaconPrintf(CALLBACK_ERROR, "COM error RPC_E_TOO_LATE (COM security settings already set for this process). Will attempt to do it with the current security settings..", hr);
  89. } else {
  90. BeaconPrintf(CALLBACK_ERROR, "CoInitializeSecurity failed with error: 0x%lx\n", hr);
  91. goto cleanup;
  92. }
  93. }
  94. IID CLSIDWbemLocator = {0x4590f811, 0x1d3a, 0x11d0, {0x89, 0x1f, 0x00, 0xaa, 0x00, 0x4b, 0x2e, 0x24}};
  95. IID IIDIWbemLocator = {0xdc12a687, 0x737f, 0x11cf, {0x88, 0x4d, 0x00, 0xaa, 0x00, 0x4b, 0x2e, 0x24}};
  96. hr = OLE32$CoCreateInstance(&CLSIDWbemLocator, NULL, CLSCTX_INPROC_SERVER, &IIDIWbemLocator, (void**)&pLoc);
  97. if (FAILED(hr)) goto cleanup;
  98. strNetworkResource = OLEAUT32$SysAllocString(L"ROOT\\CIMV2");
  99. hr = pLoc->lpVtbl->ConnectServer(pLoc, strNetworkResource, NULL, NULL, NULL, 0, NULL, NULL, &pSvc);
  100. if (FAILED(hr)) goto cleanup;
  101. //Win32_OperatingSystem
  102. strQueryLanguage = OLEAUT32$SysAllocString(L"WQL");
  103. strQuery = OLEAUT32$SysAllocString(L"SELECT * FROM Win32_OperatingSystem");
  104. hr = pSvc->lpVtbl->ExecQuery(pSvc, strQueryLanguage, strQuery, WBEM_FLAG_FORWARD_ONLY | WBEM_FLAG_RETURN_IMMEDIATELY, NULL, &pEnumerator);
  105. if (FAILED(hr)) goto cleanup;
  106. internal_printf("===================SYSTEM INFORMATION===================\n\n");
  107. while (pEnumerator) {
  108. hr = pEnumerator->lpVtbl->Next(pEnumerator, WBEM_INFINITE, 1, &pclsObj, &uReturn);
  109. if (0 == uReturn) {
  110. if (hr == WBEM_E_ACCESS_DENIED) {
  111. BeaconPrintf(CALLBACK_ERROR, "COM error WBEM_E_ACCESS_DENIED. Current COM security permissions don't allow for this operation in the current process.", hr);
  112. goto cleanup;
  113. }
  114. break;
  115. }
  116. hr = pclsObj->lpVtbl->Get(pclsObj, L"Caption", 0, &vtProp, 0, 0);
  117. internal_printf("%-20ls %ls\n", L"OS Name:", vtProp.bstrVal);
  118. OLEAUT32$VariantClear(&vtProp);
  119. hr = pclsObj->lpVtbl->Get(pclsObj, L"Version", 0, &vtProp, 0, 0);
  120. internal_printf("%-20ls %ls\n", L"OS Version:", vtProp.bstrVal);
  121. OLEAUT32$VariantClear(&vtProp);
  122. hr = pclsObj->lpVtbl->Get(pclsObj, L"ProductType", 0, &vtProp, 0, 0);
  123. switch(vtProp.uintVal) {
  124. case 1: internal_printf("%-20ls Standalone Workstation\n", L"OS Configuration:"); break;
  125. case 2: internal_printf("%-20ls Domain Controller\n", L"OS Configuration:"); break;
  126. case 3: internal_printf("%-20ls Server\n", L"OS Configuration:"); break;
  127. default: internal_printf("%-20ls Unknown\n", L"OS Configuration:");
  128. }
  129. OLEAUT32$VariantClear(&vtProp);
  130. hr = pclsObj->lpVtbl->Get(pclsObj, L"RegisteredUser", 0, &vtProp, 0, 0);
  131. internal_printf("%-20ls %ls\n", L"Registered Owner:", vtProp.bstrVal);
  132. OLEAUT32$VariantClear(&vtProp);
  133. hr = pclsObj->lpVtbl->Get(pclsObj, L"WindowsDirectory", 0, &vtProp, 0, 0);
  134. internal_printf("%-20ls %ls\n", L"Windows Directory:", vtProp.bstrVal);
  135. OLEAUT32$VariantClear(&vtProp);
  136. hr = pclsObj->lpVtbl->Get(pclsObj, L"LastBootUpTime", 0, &vtProp, 0, 0);
  137. internal_printf("%-20ls %ls\n", L"System Boot Time:", vtProp.bstrVal);
  138. OLEAUT32$VariantClear(&vtProp);
  139. hr = pclsObj->lpVtbl->Get(pclsObj, L"Locale", 0, &vtProp, 0, 0);
  140. internal_printf("%-20ls %ls\n", L"System Locale:", vtProp.bstrVal);
  141. OLEAUT32$VariantClear(&vtProp);
  142. SomethingToPrint = 1;
  143. pclsObj->lpVtbl->Release(pclsObj);
  144. }
  145. //Win32_ComputerSystem
  146. OLEAUT32$SysFreeString(strQuery);
  147. strQuery = OLEAUT32$SysAllocString(L"SELECT * FROM Win32_ComputerSystem");
  148. hr = pSvc->lpVtbl->ExecQuery(pSvc, strQueryLanguage, strQuery, WBEM_FLAG_FORWARD_ONLY | WBEM_FLAG_RETURN_IMMEDIATELY, NULL, &pEnumerator);
  149. if (FAILED(hr)) goto cleanup;
  150. while (pEnumerator) {
  151. hr = pEnumerator->lpVtbl->Next(pEnumerator, WBEM_INFINITE, 1, &pclsObj, &uReturn);
  152. if (0 == uReturn) {
  153. break;
  154. }
  155. hr = pclsObj->lpVtbl->Get(pclsObj, L"Model", 0, &vtProp, 0, 0);
  156. internal_printf("%-20ls %ls\n", L"System Model:", vtProp.bstrVal);
  157. OLEAUT32$VariantClear(&vtProp);
  158. hr = pclsObj->lpVtbl->Get(pclsObj, L"SystemType", 0, &vtProp, 0, 0);
  159. internal_printf("%-20ls %ls\n", L"System Type:", vtProp.bstrVal);
  160. OLEAUT32$VariantClear(&vtProp);
  161. hr = pclsObj->lpVtbl->Get(pclsObj, L"Domain", 0, &vtProp, 0, 0);
  162. internal_printf("%-20ls %ls\n", L"Domain:", vtProp.bstrVal);
  163. OLEAUT32$VariantClear(&vtProp);
  164. pclsObj->lpVtbl->Release(pclsObj);
  165. }
  166. //Win32_QuickFixEngineering
  167. OLEAUT32$SysFreeString(strQuery);
  168. strQuery = OLEAUT32$SysAllocString(L"SELECT * FROM Win32_QuickFixEngineering");
  169. hr = pSvc->lpVtbl->ExecQuery(pSvc, strQueryLanguage, strQuery, WBEM_FLAG_FORWARD_ONLY | WBEM_FLAG_RETURN_IMMEDIATELY, NULL, &pEnumerator);
  170. if (FAILED(hr)) goto cleanup;
  171. internal_printf("Hotfixes Installed:\n");
  172. while (pEnumerator) {
  173. hr = pEnumerator->lpVtbl->Next(pEnumerator, WBEM_INFINITE, 1, &pclsObj, &uReturn);
  174. if (0 == uReturn) {
  175. break;
  176. }
  177. hr = pclsObj->lpVtbl->Get(pclsObj, L"HotFixID", 0, &vtProp, 0, 0);
  178. internal_printf("%-20ls %ls\n", L"", vtProp.bstrVal);
  179. OLEAUT32$VariantClear(&vtProp);
  180. pclsObj->lpVtbl->Release(pclsObj);
  181. }
  182. cleanup:
  183. if (pEnumerator) pEnumerator->lpVtbl->Release(pEnumerator);
  184. if (pLoc) pLoc->lpVtbl->Release(pLoc);
  185. if (pSvc) pSvc->lpVtbl->Release(pSvc);
  186. if (strNetworkResource) OLEAUT32$SysFreeString(strNetworkResource);
  187. if (strQueryLanguage) OLEAUT32$SysFreeString(strQueryLanguage);
  188. if (strQuery) OLEAUT32$SysFreeString(strQuery);
  189. OLE32$CoUninitialize();
  190. if(SomethingToPrint) {
  191. printoutput(TRUE);
  192. } else BeaconPrintf(CALLBACK_ERROR, "Failed to load system information.\n");
  193. return 0;
  194. }