Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

88 lines
3.6 KiB

//First pass - on mutable object
WScript.Echo ("************************");
WScript.Echo ("PASS 1 - SWbemObjectPath");
WScript.Echo ("************************\n");
var Path = new ActiveXObject("WbemScripting.SWbemObjectPath");
WScript.Echo ("Expect \"\"");
WScript.Echo (Path.DisplayName);
WScript.Echo ();
Path.DisplayName = "winmgmts:root/cimv2:Win32_Wibble.Name=10,Zip=7";
WScript.Echo ("Expect no security info");
WScript.Echo (Path.DisplayName);
WScript.Echo ();
Path.DisplayName = "winmgmts:{impersonationLevel=impersonate}!root/cimv2:Win32_Wibble.Name=10,Zip=7";
WScript.Echo ("Expect \"{impersonationLevel=impersonate}!\"");
WScript.Echo (Path.DisplayName);
WScript.Echo ();
Path.DisplayName = "winmgmts:{authenticationLevel=connect,impersonationLevel=impersonate}!root/cimv2:Win32_Wibble.Name=10,Zip=7";
WScript.Echo ("Expect \"{authenticationLevel=connect,impersonationLevel=impersonate}!\"");
WScript.Echo (Path.DisplayName);
WScript.Echo ();
Path.DisplayName = "winmgmts:{impersonationLevel=impersonate,authenticationLevel=connect}!root/cimv2:Win32_Wibble.Name=10,Zip=7";
WScript.Echo ("Expect \"{authenticationLevel=connect,impersonationLevel=impersonate}!\"");
WScript.Echo (Path.DisplayName);
WScript.Echo ();
Path.DisplayName = "winmgmts:{authenticationLevel=default}!root/cimv2:Win32_Wibble.Name=10,Zip=7";
WScript.Echo ("Expect \"{authenticationLevel=default}!\"");
WScript.Echo (Path.DisplayName);
WScript.Echo ();
Path.DisplayName = "winmgmts:{authenticationLevel=none}!";
WScript.Echo ("Expect \"{authenticationLevel=none}\"");
WScript.Echo (Path.DisplayName);
WScript.Echo ();
Path.DisplayName = "winmgmts:{authenticationLevel=call}";
WScript.Echo ("Expect \"{authenticationLevel=call}\"");
WScript.Echo (Path.DisplayName);
WScript.Echo ();
Path.DisplayName = "winmgmts:{authenticationLevel=pkt,impersonationLevel=delegate}!";
WScript.Echo ("Expect \"{authenticationLevel=pkt,impersonationLevel=delegate}\"");
WScript.Echo (Path.DisplayName);
WScript.Echo ();
Path.DisplayName = "winmgmts:{authenticationLevel=pktIntegrity,impersonationLevel=identify}";
WScript.Echo ("Expect \"{authenticationLevel=pktIntegrity,impersonationLevel=identify}\"");
WScript.Echo (Path.DisplayName);
WScript.Echo ();
Path.DisplayName = "winmgmts:{authenticationLevel=pktPrivacy,impersonationLevel=identify}!root/default";
WScript.Echo ("Expect \"{authenticationLevel=pktPrivacy,impersonationLevel=identify}\"");
WScript.Echo (Path.DisplayName);
WScript.Echo ();
Path.DisplayName = "winmgmts:{authenticationLevel=pktPrivacy,impersonationLevel=identify}!root/default:__Cimomidentification=@";
WScript.Echo ("Expect \"{authenticationLevel=pktPrivacy,impersonationLevel=identify}\"");
WScript.Echo (Path.DisplayName);
WScript.Echo ();
Path.DisplayName = "winmgmts:{impersonationLevel=anonymous}!";
WScript.Echo ("Expect \"{impersonationLevel=anonymous}\"");
WScript.Echo (Path.DisplayName);
WScript.Echo ();
Path.DisplayName = "winmgmts:{impersonationLevel=anonymous}";
WScript.Echo ("Expect \"{impersonationLevel=anonymous}\"");
WScript.Echo (Path.DisplayName);
WScript.Echo ();
//Second pass - on object path
WScript.Echo ("**************************");
WScript.Echo ("PASS 2 - SWbemObject.Path_");
WScript.Echo ("**************************\n");
var Object = GetObject("winmgmts:win32_logicaldisk");
WScript.Echo ("Expect \"{authenticationLevel=pktPrivacy,impersonationLevel=identify}\"");
WScript.Echo (Object.Path_.DisplayName);
WScript.Echo ();
Object.Security_.ImpersonationLevel = 3;
WScript.Echo ("Expect \"{authenticationLevel=pktPrivacy,impersonationLevel=impersonate}\"");
WScript.Echo (Object.Path_.DisplayName);