CLI tool for running Playbooks
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

320 lines
12 KiB

1 year ago
  1. using System;
  2. using System.Collections.Generic;
  3. using System.Diagnostics;
  4. using System.Globalization;
  5. using System.IO;
  6. using System.Linq;
  7. using System.Management;
  8. using System.Net;
  9. using System.Reflection;
  10. using System.Runtime.InteropServices;
  11. using System.Threading.Tasks;
  12. using System.Windows;
  13. using System.Xml.Serialization;
  14. using Microsoft.Win32;
  15. using TrustedUninstaller.Shared;
  16. using TrustedUninstaller.Shared.Actions;
  17. namespace TrustedUninstaller.Shared
  18. {
  19. public static class Requirements
  20. {
  21. [Serializable]
  22. public enum Requirement
  23. {
  24. [XmlEnum("Internet")]
  25. Internet = 0,
  26. [XmlEnum("NoInternet")]
  27. NoInternet = 1,
  28. [XmlEnum("DefenderDisabled")]
  29. DefenderDisabled = 2,
  30. [XmlEnum("DefenderToggled")]
  31. DefenderToggled = 3,
  32. [XmlEnum("NoPendingUpdates")]
  33. NoPendingUpdates = 4,
  34. [XmlEnum("Activation")]
  35. Activation = 5,
  36. [XmlEnum("NoAntivirus")]
  37. NoAntivirus = 6
  38. }
  39. public static async Task<Requirement[]> MetRequirements(this Requirement[] requirements)
  40. {
  41. var requirementEnum = (Requirement[])Enum.GetValues(typeof(Requirement));
  42. if (requirements == null)
  43. {
  44. return requirementEnum;
  45. }
  46. // Add all requirements that are not included
  47. var metRequirements = requirementEnum.Except(requirements).ToList();
  48. if (requirements.Contains (Requirement.Internet))
  49. if (await new Internet().IsMet()) metRequirements.Add(Requirement.Internet);
  50. else metRequirements.Add(Requirement.NoInternet);
  51. if (requirements.Contains (Requirement.NoAntivirus))
  52. if (await new NoAntivirus().IsMet()) metRequirements.Add(Requirement.NoAntivirus);
  53. if (requirements.Contains (Requirement.NoPendingUpdates))
  54. if (await new NoPendingUpdates().IsMet()) metRequirements.Add(Requirement.NoPendingUpdates);
  55. if (requirements.Contains (Requirement.Activation))
  56. if (await new Activation().IsMet()) metRequirements.Add(Requirement.Activation);
  57. if (requirements.Contains (Requirement.DefenderDisabled))
  58. if (await new DefenderDisabled().IsMet()) metRequirements.Add(Requirement.DefenderDisabled);
  59. if (requirements.Contains (Requirement.DefenderToggled))
  60. if (await new DefenderDisabled().IsMet()) metRequirements.Add(Requirement.DefenderToggled);
  61. return metRequirements.ToArray();
  62. }
  63. public interface IRequirements
  64. {
  65. Task<bool> IsMet();
  66. Task<bool> Meet();
  67. }
  68. public class RequirementBase
  69. {
  70. public class ProgressEventArgs : EventArgs
  71. {
  72. public int PercentAdded;
  73. public ProgressEventArgs(int percent)
  74. {
  75. PercentAdded = percent;
  76. }
  77. }
  78. public event EventHandler<ProgressEventArgs> ProgressChanged;
  79. protected void OnProgressAdded(int percent)
  80. {
  81. ProgressChanged?.Invoke(this, new ProgressEventArgs(percent));
  82. }
  83. }
  84. public class Internet : RequirementBase, IRequirements
  85. {
  86. [DllImport("wininet.dll", SetLastError = true)]
  87. private static extern bool InternetCheckConnection(string lpszUrl, int dwFlags, int dwReserved);
  88. [DllImport("wininet.dll", SetLastError=true)]
  89. extern static bool InternetGetConnectedState(out int lpdwFlags, int dwReserved);
  90. public async Task<bool> IsMet()
  91. {
  92. try
  93. {
  94. try
  95. {
  96. if (!InternetCheckConnection("http://archlinux.org", 1, 0))
  97. {
  98. if (!InternetCheckConnection("http://google.com", 1, 0))
  99. return false;
  100. }
  101. return true;
  102. }
  103. catch
  104. {
  105. var request = (HttpWebRequest)WebRequest.Create("http://google.com");
  106. request.KeepAlive = false;
  107. request.Timeout = 5000;
  108. using (var response = (HttpWebResponse)request.GetResponse())
  109. return true;
  110. }
  111. }
  112. catch
  113. {
  114. return false;
  115. }
  116. }
  117. public Task<bool> Meet() => throw new NotImplementedException();
  118. }
  119. public class DefenderDisabled : RequirementBase, IRequirements
  120. {
  121. public async Task<bool> IsMet()
  122. {
  123. if (Registry.LocalMachine.OpenSubKey("SYSTEM\\CurrentControlSet\\Services\\WinDefend") != null)
  124. return false;
  125. return Process.GetProcessesByName("MsMpEng").Length == 0;
  126. }
  127. public async Task<bool> Meet()
  128. {
  129. OnProgressAdded(30);
  130. try
  131. {
  132. //Scheduled task to run the program on logon, and remove defender notifications
  133. var runOnLogOn = new CmdAction()
  134. {
  135. Command = $"schtasks /create /tn \"AME Wizard\" /tr \"{Assembly.GetExecutingAssembly().Location}\" /sc onlogon /RL HIGHEST /f",
  136. Wait = false
  137. };
  138. await runOnLogOn.RunTask();
  139. OnProgressAdded(10);
  140. var disableNotifs = new CmdAction()
  141. {
  142. Command = $"reg add \"HKLM\\SOFTWARE\\Policies\\Microsoft\\Windows Defender Security Center\\Notifications\" /v DisableNotifications /t REG_DWORD /d 1 /f"
  143. };
  144. await disableNotifs.RunTask();
  145. OnProgressAdded(10);
  146. var defenderService = new RunAction()
  147. {
  148. Exe = $"NSudoLC.exe",
  149. Arguments = "-U:T -P:E -M:S -Priority:RealTime -UseCurrentConsole -Wait reg delete \"HKLM\\SYSTEM\\CurrentControlSet\\Services\\WinDefend\" /f",
  150. BaseDir = true,
  151. CreateWindow = false
  152. };
  153. await defenderService.RunTask();
  154. OnProgressAdded(20);
  155. // MpOAV.dll normally in use by a lot of processes. This prevents that.
  156. var MpOAVCLSID = new RunAction()
  157. {
  158. Exe = $"NSudoLC.exe",
  159. Arguments = @"-U:T -P:E -M:S -Priority:RealTime -Wait reg delete ""HKCR\CLSID\{2781761E-28E0-4109-99FE-B9D127C57AFE}\InprocServer32"" /f",
  160. BaseDir = true,
  161. CreateWindow = false
  162. };
  163. await MpOAVCLSID.RunTask();
  164. OnProgressAdded(20);
  165. if (Registry.LocalMachine.OpenSubKey("SYSTEM\\CurrentControlSet\\Services\\WinDefend") != null)
  166. {
  167. throw new Exception("Could not remove WinDefend service.");
  168. }
  169. OnProgressAdded(10);
  170. return true;
  171. }
  172. catch (Exception exception)
  173. {
  174. ErrorLogger.WriteToErrorLog(exception.Message, exception.StackTrace,
  175. $"Could not remove Windows Defender.");
  176. return false;
  177. // TODO: Move this to requirements page view if any Meet calls return false
  178. try
  179. {
  180. var saveLogDir = System.Windows.Forms.Application.StartupPath + "\\AME Logs";
  181. if (Directory.Exists(saveLogDir)) Directory.Delete(saveLogDir, true);
  182. Directory.Move(Directory.GetCurrentDirectory() + "\\Logs", saveLogDir);
  183. }
  184. catch (Exception) { }
  185. //MessageBox.Show("Could not remove Windows Defender. Check the error logs and contact the team " +
  186. // "for more information and assistance.", "Could not remove Windows Defender.", MessageBoxButton.OK, MessageBoxImage.Error);
  187. }
  188. }
  189. }
  190. public class DefenderToggled : RequirementBase, IRequirements
  191. {
  192. public async Task<bool> IsMet()
  193. {
  194. var defenderKey = Registry.LocalMachine.OpenSubKey(@"SOFTWARE\Microsoft\Windows Defender");
  195. RegistryKey realtimeKey = null;
  196. try
  197. {
  198. realtimeKey = defenderKey.OpenSubKey("Real-Time Protection");
  199. }
  200. catch
  201. {
  202. }
  203. if (realtimeKey != null)
  204. {
  205. try
  206. {
  207. if (!((int)realtimeKey.GetValue("DisableRealtimeMonitoring") != 1))
  208. return false;
  209. }
  210. catch (Exception exception)
  211. {
  212. return false;
  213. }
  214. }
  215. try
  216. {
  217. if (!((int)defenderKey.OpenSubKey("SpyNet").GetValue("SpyNetReporting") != 0))
  218. return false;
  219. }
  220. catch
  221. {
  222. }
  223. try
  224. {
  225. if (!((int)defenderKey.OpenSubKey("SpyNet").GetValue("SubmitSamplesConsent") != 0))
  226. return false;
  227. }
  228. catch
  229. {
  230. }
  231. try
  232. {
  233. if (!((int)defenderKey.OpenSubKey("Features").GetValue("TamperProtection") != 4))
  234. return false;
  235. }
  236. catch
  237. {
  238. }
  239. return true;
  240. }
  241. public async Task<bool> Meet()
  242. {
  243. throw new NotImplementedException();
  244. }
  245. }
  246. public class NoPendingUpdates : RequirementBase, IRequirements
  247. {
  248. public async Task<bool> IsMet()
  249. {
  250. //TODO: This
  251. return true;
  252. }
  253. public Task<bool> Meet() => throw new NotImplementedException();
  254. }
  255. public class NoAntivirus : RequirementBase, IRequirements
  256. {
  257. public async Task<bool> IsMet()
  258. {
  259. return !WinUtil.GetEnabledAvList(false).Any();
  260. }
  261. public Task<bool> Meet() => throw new NotImplementedException();
  262. }
  263. public class Activation : RequirementBase, IRequirements
  264. {
  265. public async Task<bool> IsMet()
  266. {
  267. return WinUtil.IsGenuineWindows();
  268. }
  269. public Task<bool> Meet() => throw new NotImplementedException();
  270. }
  271. public class WindowsBuild
  272. {
  273. public bool IsMet(string[] builds)
  274. {
  275. return builds.Any(x => x.Equals(Globals.WinVer.ToString()));
  276. }
  277. public Task<bool> Meet() => throw new NotImplementedException();
  278. }
  279. }
  280. }