This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # First do the standard installaton | |
| Write-Host "========================================" -ForegroundColor Cyan | |
| Write-Host "AutomatedLab Installation Script" -ForegroundColor Cyan | |
| Write-Host "========================================" -ForegroundColor Cyan | |
| Write-Host "" | |
| Write-Host "[Step 1/2] Installing AutomatedLab meta-module..." -ForegroundColor Yellow | |
| Write-Host " This may take a few minutes..." -ForegroundColor Gray | |
| try { | |
| Install-Module -Name AutomatedLab -AllowPrerelease -AllowClobber -Force -Scope AllUsers -ErrorAction Stop |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <# | |
| .SYNOPSIS | |
| Registers a scheduled job to run the specified script on a schedule. | |
| .DESCRIPTION | |
| This script registers a scheduled job to run the specified script on a schedule. It can register the | |
| job to run as local system or as the user who called this script. | |
| .PARAMETER At | |
| The time at which the job should be triggered. The format is 24 hours like 21:00. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| $t1 = [datetime]::Today.AddHours(4).ToString('s') | |
| $e = $null | |
| $FilterXML = @" | |
| <QueryList> | |
| <Query Id="0" Path="Security"> | |
| <Select Path="Security"> | |
| (*[EventData[ | |
| Data[@Name="TargetDomainName"] != "Window Manager" and | |
| Data[@Name="TargetDomainName"] != "Font Driver Host" and | |
| Data[@Name="TargetDomainName"] != "NT AUTHORITY" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| $code = @' | |
| using System; | |
| using System.Collections.Generic; | |
| using System.ComponentModel; | |
| using System.Linq; | |
| using System.Runtime.InteropServices; | |
| using System.Text; | |
| using System.Threading.Tasks; | |
| namespace Test |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| $sessions = klist sessions | |
| $pattern = '\[(\d+)\] Session \d \d:(?<LowPart>0)x(?<HighPart>[a-f0-9]+)' | |
| $sessions = foreach ($line in $sessions) | |
| { | |
| if ($line -match $pattern) | |
| { | |
| New-Object PSObject -Property @{ | |
| LowPart = $Matches.LowPart | |
| HighPart = $Matches.HighPart |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| function GenerateRandomSalt | |
| { | |
| [byte[]]$data = New-Object byte[](32) | |
| $cp = [System.Security.Cryptography.RNGCryptoServiceProvider]::new() | |
| for ($i = 0; $i -lt 10; $i++) | |
| { | |
| $cp.GetBytes($data) | |
| } |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| [System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12 | |
| mkdir -Path C:\ProgramData\Microsoft\Windows\PowerShell\PowerShellGet -Force | |
| Invoke-WebRequest -Uri 'https://nuget.org/nuget.exe' -OutFile C:\ProgramData\Microsoft\Windows\PowerShell\PowerShellGet\nuget.exe -ErrorAction Stop | |
| Install-PackageProvider -Name NuGet -Force | |
| Install-Module -Name PowerShellGet -Force |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <# | |
| .SYNOPSIS | |
| Powerful asynchronus IPv4 Port Scanner | |
| .DESCRIPTION | |
| This powerful asynchronus IPv4 Port Scanner allows you to scan every Port-Range you want (500 to 2600 would work). | |
| The result will contain the Port number, Protocol, Service name, Description and the Status. | |
| .EXAMPLE |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| param ( | |
| [Parameter(Mandatory)] | |
| $ResourceGroupName, | |
| [Parameter(Mandatory)] | |
| $VmName, | |
| [Parameter(Mandatory)] | |
| [ValidateSet('Standard_LRS', 'Premium_LRS', 'StandardSSD_LRS', 'UltraSSD_LRS')] | |
| $StorageType, |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| $vms = Get-LabVM -Role FileServer | |
| $wiresharkUri = 'https://1.eu.dl.wireshark.org/win64/Wireshark-win64-3.2.2.exe' | |
| $fiddlerUri = 'https://telerik-fiddler.s3.amazonaws.com/fiddler/FiddlerSetup.exe' | |
| $fiddler = Get-LabInternetFile -Uri $fiddlerUri -Path $labSources\SoftwarePackages -PassThru | |
| $wireshark = Get-LabInternetFile -Uri $wiresharkUri -Path $labSources\SoftwarePackages -FileName Wireshark.exe -PassThru | |
| Install-LabSoftwarePackage -Path $fiddler.FullName -CommandLine /S -ComputerName $vms | |
| Install-LabSoftwarePackage -Path $wireshark.FullName -CommandLine /S -ComputerName $vms |
NewerOlder