Windows NT WIN-F6SLGVICLOP 10.0 build 17763 (Windows Server 2016) AMD64
Microsoft-IIS/10.0
Server IP : & Your IP : 3.133.137.102
Domains :
Cant Read [ /etc/named.conf ]
User : elibrary.unsap.ac.id
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Lock Shell
Lock File++
Readme
D: /
win-acme.v2.2.9.1701.x64.pluggable /
Scripts /
Delete
Unzip
Name
Size
Permission
Date
Action
EasyDNS.ps1
7.87
KB
-rw-rw-rw-
2024-05-22 04:53
ImportADFS.ps1
3.13
KB
-rw-rw-rw-
2024-05-22 04:53
ImportAzureADApplicationProxy.ps1
4.4
KB
-rw-rw-rw-
2024-05-22 04:53
ImportAzureApplicationGateway.ps1
6.06
KB
-rw-rw-rw-
2024-05-22 04:53
ImportExchange.ps1
6.34
KB
-rw-rw-rw-
2024-05-22 04:53
ImportExchange.v2.ps1
5.16
KB
-rw-rw-rw-
2024-05-22 04:53
ImportExchangeHybrid.ps1
6.09
KB
-rw-rw-rw-
2024-05-22 04:53
ImportJKS.ps1
1.39
KB
-rw-rw-rw-
2024-05-22 04:53
ImportKemp.ps1
2.59
KB
-rw-rw-rw-
2024-05-22 04:53
ImportNTDS.ps1
2.54
KB
-rw-rw-rw-
2024-05-22 04:53
ImportRDGateway.ps1
2.74
KB
-rw-rw-rw-
2024-05-22 04:53
ImportRDListener.ps1
2.86
KB
-rw-rw-rw-
2024-05-22 04:53
ImportRDS.ps1
2.27
KB
-rw-rw-rw-
2024-05-22 04:53
ImportRDSFull.ps1
8.23
KB
-rw-rw-rw-
2024-05-22 04:53
ImportSQL.ps1
2.19
KB
-rw-rw-rw-
2024-05-22 04:53
ImportSSTP.ps1
3.52
KB
-rw-rw-rw-
2024-05-22 04:53
ImportVRBCloudGateway.ps1
1.13
KB
-rw-rw-rw-
2024-05-22 04:53
ImportWinRM.ps1
2.86
KB
-rw-rw-rw-
2024-05-22 04:53
ImportWinRM.v2.ps1
2.04
KB
-rw-rw-rw-
2024-05-22 04:53
ImportWindowsAdminCenter.ps1
3.25
KB
-rw-rw-rw-
2024-05-22 04:53
PSRDSCerts.bat
364
B
-rwxrwxrwx
2024-05-22 04:53
PSScript.bat
406
B
-rwxrwxrwx
2024-05-22 04:53
microsoft-dns.ps1
443
B
-rw-rw-rw-
2024-05-22 04:53
Save
Rename
<# .SYNOPSIS Imports a cert from WASC renewal into Exchange services. .DESCRIPTION Note that this script is intended to be run via the install script plugin from WASC via the batch script wrapper. As such, we use positional parameters to avoid issues with using a dash in the cmd line. THIS SCRIPT IS INCOMPLETE AND *mostly* UNTESTED (some modifications have come in from people using it successfully) Documentation referenced from https://technet.microsoft.com/en-us/library/aa997231(v=exchg.160).aspx Proper information should be available here https://github.com/PKISharp/win-acme/wiki/Install-Script or more generally, here https://github.com/PKISharp/win-acme/wiki/Example-Scripts .PARAMETER NewCertThumbprint The exact thumbprint of the cert to be imported. The script will copy this cert to the Personal store if not already there. .PARAMETER ExchangeServices a comma-separated string (no spaces) of all exchange services to import the cert into. Full list of possibilities can be found here: https://technet.microsoft.com/en-us/library/aa997231(v=exchg.160).aspx .PARAMETER LeaveOldExchangeCerts A bool (as an int, since bools are difficult to pass through as parameters) to determine if old exchange certs with the same CN should be deleted. 1 - Leaves old Exchange certs 0 - Deletes old Exchange certs .PARAMETER RenewalId (Central Certificate Store) Id of the WASC renewal, used to determine the file name in the CertificatePath. .PARAMETER CertificatePath (Central Certificate Store) Path to the WACS certificate directory. The certificate that is imported will be "$(RenewalId)-all.pfx" from this directory. .PARAMETER PfxPassword (Central Certificate Store) Password of the .pfx file. .PARAMETER FriendlyName (Central Certificate Store) Friendly name to use when importing the .pfx file. .PARAMETER DebugOn Include this switch parameter to write debug outputs for troubleshooting .EXAMPLE ImportExchange.ps1 <certThumbprint> IIS,SMTP,IMAP If not using central certificate store, the script can be executed as either .EXAMPLE ImportExchange.ps1 <certThumbprint> IIS,SMTP,IMAP 0 to remove old certs .EXAMPLE ImportExchange.ps1 <certThumbprint> IIS,SMTP,IMAP 1 <renewalId> <certificatePath> <pfxPassword> <friendlyName> If using central certificate store, WASC will place the certificate in that path named after the id .NOTES #> param( [Parameter(Position=0,Mandatory=$true)] [string] $NewCertThumbprint, [Parameter(Position=1,Mandatory=$true)] [string] $ExchangeServices, [Parameter(Position=2,Mandatory=$false)] [int] $LeaveOldExchangeCerts = 1, [Parameter(Position=4,Mandatory=$false)] [string] $CacheFile, [Parameter(Position=5,Mandatory=$false)] [string] $PfxPassword, [Parameter(Position=6,Mandatory=$false)] [string] $FriendlyName, [switch]$DebugOn ) if($DebugOn){ $DebugPreference = "Continue" } If($OSVersion -eq "Windows Server 2008 R2 Standard" -and $PSVersionTable.PSVersion.Major -lt 5) { Write-Error "Please upgrade Powershell version. See this URL for details: https://github.com/PKISharp/win-acme/issues/1104" exit } # Print debugging info to make sure the parameters arrived Write-Host "NewCertThumbprint: $NewCertThumbprint" Write-Host "ExchangeServices: $ExchangeServices" Write-Host "LeaveOldExchangeCerts: $LeaveOldExchangeCerts" Write-Host "RenewalId: $RenewalId" Write-Host "CacheFile: $CacheFile" Write-Host "FriendlyName: $FriendlyName" # Load Powershell snapin # Should work with Exchange 2007 and higher # https://hkeylocalmachine.com/?p=180 Write-Host "Searching for Exchange snapin..." Get-PSSnapin -Registered ` | Where-Object { $_.Name -match "Microsoft.Exchange.Management.PowerShell" ` -and ( $_.Name -match "Admin" -or $_.Name -match "E2010" -or $_.Name -match "SnapIn" ) } ` | Add-PSSnapin -ErrorAction SilentlyContinue -PassThru ` | Write-Host # Test if the Cmdlet is there now $Command = Get-Command "Enable-ExchangeCertificate" -errorAction SilentlyContinue if ($Command -eq $null) { Write-Error "Exchange Management Tools for Powershell not installed" return } # Following lines might be needed for SBS2011/Exchange 2010 # ."C:\Program Files\Microsoft\Exchange Server\V14\bin\RemoteExchange.ps1" # Connect-ExchangeServer -auto Write-Host "Checking if certificate can be found in the right store..." $Certificate = ` Get-ChildItem -Path Cert:\LocalMachine -Recurse ` | Where-Object {$_.thumbprint -eq $NewCertThumbprint} ` | Sort-Object -Descending ` | Select-Object -f 1 try { # Load certificate from file if its not found or not in the right store if ($Certificate -eq $null -or ` $Certificate.PSPath -notlike "*LocalMachine\My\*") { Write-Host "Certificate not found where its supposed to be, try to load from file" $Password = ConvertTo-SecureString $PfxPassword -AsPlainText -Force $importExchangeCertificateParameters = @{ FileData = ([System.IO.File]::ReadAllBytes("$CacheFile")) FriendlyName = $FriendlyName PrivateKeyExportable = $True Password = $Password } try { Import-ExchangeCertificate @importExchangeCertificateParameters -ErrorAction Stop | Out-Null Write-Host "Certificate imported for use in Exchange" } catch { Write-Error "Error in Import-ExchangeCertificate" throw } } # Attempt to get cert again directly from Personal Store $Certificate = Get-ChildItem -Path Cert:\LocalMachine\My\ -Recurse ` | Where-Object {$_.thumbprint -eq $NewCertThumbprint} ` | Select-Object -f 1 # Make sure variable is defined Get-ChildItem $Certificate.PSPath -ErrorAction Stop | Out-Null # This command actually updates Exchange try { Write-Host "Updating Exchange services..." Enable-ExchangeCertificate -Services $ExchangeServices -Thumbprint $Certificate.Thumbprint -Force -ErrorAction Stop Write-Host "Certificate set for the following services: $ExchangeServices" } catch { Write-Error "Error in Enable-ExchangeCertificate" throw } if ($LeaveOldExchangeCerts -ne 1) { Write-Host "Old Exchange certificates being cleaned up" try { Get-ExchangeCertificate -DomainName $Certificate.Subject.split("=")[1] ` | Where-Object -FilterScript { $_.Thumbprint -ne $NewCertThumbprint } ` | Remove-ExchangeCertificate -Confirm:$false } catch { Write-Error "Error cleaning up old certificates Get-ExchangeCertificate/Remove-ExchangeCertificate" } } } catch { Write-Error "Script hasn't completed." }