Windows NT WIN-F6SLGVICLOP 10.0 build 17763 (Windows Server 2016) AMD64
Microsoft-IIS/10.0
Server IP : & Your IP : 13.58.48.103
Domains :
Cant Read [ /etc/named.conf ]
User : elibrary.unsap.ac.id
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Lock Shell
Lock File++
Readme
D: /
win-acme.v2.2.9.1701.x64.pluggable /
Scripts /
Delete
Unzip
Name
Size
Permission
Date
Action
EasyDNS.ps1
7.87
KB
-rw-rw-rw-
2024-05-22 04:53
ImportADFS.ps1
3.13
KB
-rw-rw-rw-
2024-05-22 04:53
ImportAzureADApplicationProxy.ps1
4.4
KB
-rw-rw-rw-
2024-05-22 04:53
ImportAzureApplicationGateway.ps1
6.06
KB
-rw-rw-rw-
2024-05-22 04:53
ImportExchange.ps1
6.34
KB
-rw-rw-rw-
2024-05-22 04:53
ImportExchange.v2.ps1
5.16
KB
-rw-rw-rw-
2024-05-22 04:53
ImportExchangeHybrid.ps1
6.09
KB
-rw-rw-rw-
2024-05-22 04:53
ImportJKS.ps1
1.39
KB
-rw-rw-rw-
2024-05-22 04:53
ImportKemp.ps1
2.59
KB
-rw-rw-rw-
2024-05-22 04:53
ImportNTDS.ps1
2.54
KB
-rw-rw-rw-
2024-05-22 04:53
ImportRDGateway.ps1
2.74
KB
-rw-rw-rw-
2024-05-22 04:53
ImportRDListener.ps1
2.86
KB
-rw-rw-rw-
2024-05-22 04:53
ImportRDS.ps1
2.27
KB
-rw-rw-rw-
2024-05-22 04:53
ImportRDSFull.ps1
8.23
KB
-rw-rw-rw-
2024-05-22 04:53
ImportSQL.ps1
2.19
KB
-rw-rw-rw-
2024-05-22 04:53
ImportSSTP.ps1
3.52
KB
-rw-rw-rw-
2024-05-22 04:53
ImportVRBCloudGateway.ps1
1.13
KB
-rw-rw-rw-
2024-05-22 04:53
ImportWinRM.ps1
2.86
KB
-rw-rw-rw-
2024-05-22 04:53
ImportWinRM.v2.ps1
2.04
KB
-rw-rw-rw-
2024-05-22 04:53
ImportWindowsAdminCenter.ps1
3.25
KB
-rw-rw-rw-
2024-05-22 04:53
PSRDSCerts.bat
364
B
-rwxrwxrwx
2024-05-22 04:53
PSScript.bat
406
B
-rwxrwxrwx
2024-05-22 04:53
microsoft-dns.ps1
443
B
-rw-rw-rw-
2024-05-22 04:53
Save
Rename
<# .SYNOPSIS Imports a cert from WACS renewal into SQL Server .DESCRIPTION Note that this script is intended to be run via the install script plugin from win-acme via the batch script wrapper. As such, we use positional parameters to avoid issues with using a dash in the cmd line. Proper information should be available here https://github.com/win-acme/win-acme .PARAMETER NewCertThumbprint The exact thumbprint of the cert to be imported. .EXAMPLE ImportSQL.ps1 <certThumbprint> ./wacs.exe --target manual --host hostname.example.com --installation script --script ".\Scripts\ImportSQL.ps1" --scriptparameters "'{CertThumbprint}'" --certificatestore My --acl-read "NT Service\MSSQLSERVER" .NOTES #> param( [Parameter(Position=0,Mandatory=$true)] [string]$NewCertThumbprint ) #inspired by https://blogs.infosupport.com/configuring-sql-server-encrypted-connections-using-powershell/ $CertInStore = Get-ChildItem -Path Cert:\LocalMachine -Recurse | Where-Object {$_.thumbprint -eq $NewCertThumbprint} | Sort-Object -Descending | Select-Object -f 1 if($CertInStore){ try{ # 1. Configure the Certificate that SQL Server should use # Locate the "SuperSocketNetLib" registry key that contains the encryption settings; highest # first in case there are multiple versions. $regKey = (ls "Registry::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft SQL Server" -Recurse | Where-Object { $_.Name -like '*SuperSocketNetLib' } | Sort-Object -Property Name -Descending) if($regKey -is [Array]) { $regKey = $regKey[0] Write-Warning "Multiple SQL instances found in the registry, using ""$($regKey.Name)""." } # The thumbprint must be in all lowercase, otherwise SQL server doesn't seem to accept it?! Set-ItemProperty $regKey.PSPath -Name "Certificate" -Value $NewCertThumbprint.ToLowerInvariant() Restart-Service MSSQLSERVER -Force -ErrorAction Stop "Cert thumbprint set to SQL and service restarted" }catch{ "Cert thumbprint was not set successfully" "Error: $($Error[0])" } } else { "Cert thumbprint not found in the cert store... which is strange because it should be there." }