Vault7: CIA Hacking Tools Revealed
Navigation: » Latest version
Get User Account Control (UAC) Level (MISCUserAccountControlLevel_WIN32)
SECRET//NOFORN
Miscellaneous Module
Stash Repository: Miscellaneous Library
Module Name: MISCUserAccessControlLevel_WIN32 (Uses Windows Registry APIApplication Programming Interface)
Module Description: Describe how the technique works. All the cool things it does. Describe how cool the module writer is, etc.
Usage: MSDNMicrosoft Developer Network style documentation here.
PSP/OS Issues: No known issues.
('excerpt' missing)
Sharing Level: Unilateral
Technique Origin: In-house (Windows APIApplication Programming Interface Calls - Specific Registry Keys)
Notes: Any information that could be useful to anyone maintaining the code or using the code. i.e. This module uses Alternate Data Streams which are only available on NTFSNTMicrosoft operating system filesystem (Windows) volumes.
Module Specific Structures: Any module specific data structures.
Module Return Codes:
Returns TRUE on success and FALSE on failure.
Example Code:
INCLUDE DESCRIPTIVE LABELS FOR EACH MODULE
SECRET//NOFORN