PortValhalla/scripts/Windows/OS/User.ps1

135 lines
4.8 KiB
PowerShell
Raw Normal View History

2023-06-22 20:56:43 +00:00
. "$PSScriptRoot/../Scripts/Context.ps1";
2023-06-28 20:08:20 +00:00
$uacDisablerName = "PortValhalla UAC Disabler";
2023-06-29 02:05:12 +00:00
$taskTrigger = 1337;
2023-06-22 20:56:43 +00:00
function New-PersonalUser([Context] $context)
{
if (-not (Get-LocalUser $context.UserName))
{
2023-06-23 12:04:46 +00:00
Write-Host "Creating Personal User";
2023-06-22 21:36:45 +00:00
while ($true) {
Write-Host (
[string]::Join(
"`n",
"So... Windows is too dumb to create users which are bound to a Microsoft Account.",
"Thus, you have to do it by yourself.",
"So sorry..."));
2023-06-23 10:34:12 +00:00
$users = Get-LocalUser | ForEach-Object { $_.Name };
2023-06-23 00:34:53 +00:00
Write-Host "Following users exist already:"
Write-Host $users;
2023-06-22 21:36:45 +00:00
Read-Host "Please hit enter once you're done...";
2023-06-22 21:39:49 +00:00
$user = Get-LocalUser | Where-Object { -not ($users -contains $_.Name) } | Select-Object -Last 1;
2023-06-22 20:56:43 +00:00
2023-06-22 21:36:45 +00:00
if ($user) {
2023-06-22 22:20:30 +00:00
Write-Information "Found New User:";
Write-Information $user;
2023-06-22 21:36:45 +00:00
break;
}
}
2023-06-22 20:56:43 +00:00
Write-Information "Renaming the new User to $($context.UserName)";
Rename-LocalUser $user $context.UserName;
2023-06-28 20:36:40 +00:00
Add-LocalGroupMember -Group "Administrators" -Member $user && Set-LocalUser $context.AdminName -Password (ConvertTo-SecureString -AsPlainText "Admin") && Disable-LocalUser $context.AdminName;
2023-06-28 20:10:23 +00:00
Write-Information "Enabling UAC for the next login (Microsoft Account login won't work otherwise, lol)";
2023-06-28 23:51:30 +00:00
Enable-UACNextLogin $context;
2023-06-28 20:10:23 +00:00
Write-Information "Disabling Auto login";
2023-06-25 16:26:06 +00:00
$context.RemoveAutologin();
Restart-Computer;
2023-06-25 16:11:56 +00:00
exit;
2023-06-22 20:56:43 +00:00
}
2023-06-29 02:05:12 +00:00
elseif ((Get-UACState))
{
2023-06-29 02:05:12 +00:00
Write-EventLog -LogName Application -Source "Application" -EventId $taskTrigger -Message "This event was created by $env:Username";
for ($i = 0; $i -lt $120; $i++)
{
2023-06-29 02:05:12 +00:00
if ((Get-UACState))
{
break;
}
}
2023-06-29 02:05:12 +00:00
if ((Get-UACState))
{
2023-06-29 02:05:12 +00:00
Write-Error "UAC Could not be disabled!";
Read-Host "Press enter to continue anyway";
}
2023-06-28 20:50:39 +00:00
Enable-CurrentUserAutologon $context;
Write-Information "Removing Admin Account";
Get-CimInstance -ClassName "Win32_UserProfile" -Filter "SID = $((Get-LocalUser $context.AdminName).SID)" | Remove-CimInstance;
Write-Host "Rebooting";
$context.Reboot();
}
2023-06-22 20:56:43 +00:00
}
2023-06-28 23:51:30 +00:00
function Get-SystemPolicyKey() {
[OutputType([Microsoft.Win32.RegistryKey])]
param()
$keyPath = "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System";
2023-06-28 23:51:30 +00:00
return Get-Item "$keyPath";
}
function Get-UACState() {
return Get-ItemPropertyValue -Path (Get-SystemPolicyKey).PSPath -Name "EnableLUA";
}
function Set-UACState([bool] $value) {
$null = Set-ItemProperty -Path (Get-SystemPolicyKey).PSPath -Name "EnableLUA" -Value [int]$value;
}
function Enable-UACNextLogin([Context] $context) {
Set-UACState $true;
2023-06-29 02:05:12 +00:00
$tempTask = "PortValhalla Temp";
2023-06-29 00:54:09 +00:00
$key = Get-SystemPolicyKey;
$action = New-ScheduledTaskAction -Execute "pwsh.exe" -Argument (
[string]::Join(
" ",
@(
"-c",
2023-06-29 02:05:12 +00:00
"Set-ItemProperty '$($key.PSPath)' -Name 'EnableLUA' -Value 0 -Type DWord;",
2023-06-29 00:54:31 +00:00
"Unregister-ScheduledTask -Confirm:`$false '$uacDisablerName';",
2023-06-29 00:53:54 +00:00
". '$PSScriptRoot/../Scripts/Context.ps1';",
2023-06-28 23:51:30 +00:00
"`$context = [Context]::new();",
2023-06-29 00:53:54 +00:00
"`$context.EntryPoint = '$($context.EntryPoint)';",
"`$context.RegisterReboot((Get-Item 'Registry::HKEY_USERS\$((Get-LocalUser $context.UserName).SID)'));",
2023-06-29 00:57:10 +00:00
"Restart-Computer -Force;")));
2023-06-28 19:20:59 +00:00
2023-06-29 02:05:12 +00:00
schtasks /Create /SC ONEVENT /MO "*[System[Provider[@Name='Application'] and EventID=$taskTrigger]]" /TR cmd.exe /TN "$tempTask";
$trigger = (Get-ScheduledTask $tempTask).Triggers;
$principal = New-ScheduledTaskPrincipal -UserId "SYSTEM" -RunLevel Highest;
$task = New-ScheduledTask -Action $action -Principal $principal -Trigger $trigger;
2023-06-28 20:08:20 +00:00
$null = Register-ScheduledTask $uacDisablerName -InputObject $task;
2023-06-29 02:05:12 +00:00
$null = Unregister-ScheduledTask -Confirm:$false $tempTask;
}
2023-06-28 20:50:39 +00:00
function Enable-CurrentUserAutologon([Context] $context)
{
Add-Type -assemblyname System.DirectoryServices.AccountManagement;
Write-Information "Re-Enabling Autologin for Current User";
$principalContext = [System.DirectoryServices.AccountManagement.PrincipalContext]::new("Machine");
while ($true)
{
$password = Read-Host "Please enter the password of your user" -MaskInput;
if ($principalContext.ValidateCredentials($context.UserName, $password))
{
break;
}
else {
Write-Error "The specified password is incorrect!";
}
}
$context.SetAutologin($context.UserName, $password);
}