418 lines
11 KiB
Python
418 lines
11 KiB
Python
"""WizardKit: Windows Functions"""
|
|
# vim: sts=2 sw=2 ts=2
|
|
|
|
import logging
|
|
import os
|
|
import pathlib
|
|
import platform
|
|
|
|
from contextlib import suppress
|
|
import psutil
|
|
|
|
try:
|
|
import winreg
|
|
except ImportError as err:
|
|
if platform.system() == 'Windows':
|
|
raise err
|
|
|
|
from wk.borrowed import acpi
|
|
from wk.exe import run_program
|
|
from wk.std import GenericError, GenericWarning, sleep
|
|
|
|
|
|
# STATIC VARIABLES
|
|
LOG = logging.getLogger(__name__)
|
|
CONEMU = 'ConEmuPID' in os.environ
|
|
KNOWN_DATA_TYPES = {
|
|
'BINARY': winreg.REG_BINARY,
|
|
'DWORD': winreg.REG_DWORD,
|
|
'DWORD_LITTLE_ENDIAN': winreg.REG_DWORD_LITTLE_ENDIAN,
|
|
'DWORD_BIG_ENDIAN': winreg.REG_DWORD_BIG_ENDIAN,
|
|
'EXPAND_SZ': winreg.REG_EXPAND_SZ,
|
|
'LINK': winreg.REG_LINK,
|
|
'MULTI_SZ': winreg.REG_MULTI_SZ,
|
|
'NONE': winreg.REG_NONE,
|
|
'QWORD': winreg.REG_QWORD,
|
|
'QWORD_LITTLE_ENDIAN': winreg.REG_QWORD_LITTLE_ENDIAN,
|
|
'SZ': winreg.REG_SZ,
|
|
}
|
|
KNOWN_HIVES = {
|
|
'HKCR': winreg.HKEY_CLASSES_ROOT,
|
|
'HKCU': winreg.HKEY_CURRENT_USER,
|
|
'HKLM': winreg.HKEY_LOCAL_MACHINE,
|
|
'HKU': winreg.HKEY_USERS,
|
|
'HKEY_CLASSES_ROOT': winreg.HKEY_CLASSES_ROOT,
|
|
'HKEY_CURRENT_USER': winreg.HKEY_CURRENT_USER,
|
|
'HKEY_LOCAL_MACHINE': winreg.HKEY_LOCAL_MACHINE,
|
|
'HKEY_USERS': winreg.HKEY_USERS,
|
|
}
|
|
KNOWN_HIVE_NAMES = {
|
|
winreg.HKEY_CLASSES_ROOT: 'HKCR',
|
|
winreg.HKEY_CURRENT_USER: 'HKCU',
|
|
winreg.HKEY_LOCAL_MACHINE: 'HKLM',
|
|
winreg.HKEY_USERS: 'HKU',
|
|
winreg.HKEY_CLASSES_ROOT: 'HKEY_CLASSES_ROOT',
|
|
winreg.HKEY_CURRENT_USER: 'HKEY_CURRENT_USER',
|
|
winreg.HKEY_LOCAL_MACHINE: 'HKEY_LOCAL_MACHINE',
|
|
winreg.HKEY_USERS: 'HKEY_USERS',
|
|
}
|
|
OS_VERSION = float(platform.win32_ver()[0])
|
|
REG_MSISERVER = r'HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\MSIServer'
|
|
SLMGR = pathlib.Path(f'{os.environ.get("SYSTEMROOT")}/System32/slmgr.vbs')
|
|
|
|
|
|
# Activation Functions
|
|
def activate_with_bios():
|
|
"""Attempt to activate Windows with a key stored in the BIOS."""
|
|
# Code borrowed from https://github.com/aeruder/get_win8key
|
|
#####################################################
|
|
#script to query windows 8.x OEM key from PC firmware
|
|
#ACPI -> table MSDM -> raw content -> byte offset 56 to end
|
|
#ck, 03-Jan-2014 (christian@korneck.de)
|
|
#####################################################
|
|
bios_key = None
|
|
table = b"MSDM"
|
|
if acpi.FindAcpiTable(table) is True:
|
|
rawtable = acpi.GetAcpiTable(table)
|
|
#http://msdn.microsoft.com/library/windows/hardware/hh673514
|
|
#byte offset 36 from beginning
|
|
# = Microsoft 'software licensing data structure'
|
|
# / 36 + 20 bytes offset from beginning = Win Key
|
|
bios_key = rawtable[56:len(rawtable)].decode("utf-8")
|
|
if not bios_key:
|
|
raise GenericError('BIOS key not found.')
|
|
|
|
# Check if activation is needed
|
|
if is_activated():
|
|
raise GenericWarning('System already activated')
|
|
|
|
# Install Key
|
|
cmd = ['cscript', '//nologo', SLMGR, '/ipk', bios_key]
|
|
run_program(cmd, check=False)
|
|
sleep(5)
|
|
|
|
# Attempt activation
|
|
cmd = ['cscript', '//nologo', SLMGR, '/ato']
|
|
run_program(cmd, check=False)
|
|
sleep(5)
|
|
|
|
# Check status
|
|
if not is_activated():
|
|
raise GenericError('Activation Failed')
|
|
|
|
|
|
def get_activation_string():
|
|
"""Get activation status, returns str."""
|
|
cmd = ['cscript', '//nologo', SLMGR, '/xpr']
|
|
proc = run_program(cmd, check=False)
|
|
act_str = proc.stdout
|
|
act_str = act_str.splitlines()[1]
|
|
act_str = act_str.strip()
|
|
return act_str
|
|
|
|
|
|
def is_activated():
|
|
"""Check if Windows is activated via slmgr.vbs and return bool."""
|
|
act_str = get_activation_string()
|
|
|
|
# Check result.
|
|
return act_str and 'permanent' in act_str
|
|
|
|
|
|
# Registry Functions
|
|
def reg_delete_key(hive, key, recurse=False):
|
|
# pylint: disable=raise-missing-from
|
|
"""Delete a key from the registry.
|
|
|
|
NOTE: If recurse is False then it will only work on empty keys.
|
|
"""
|
|
hive = reg_get_hive(hive)
|
|
hive_name = KNOWN_HIVE_NAMES.get(hive, '???')
|
|
|
|
# Delete subkeys first
|
|
if recurse:
|
|
with suppress(OSError), winreg.OpenKey(hive, key) as open_key:
|
|
while True:
|
|
subkey = fr'{key}\{winreg.EnumKey(open_key, 0)}'
|
|
reg_delete_key(hive, subkey, recurse=recurse)
|
|
|
|
# Delete key
|
|
try:
|
|
winreg.DeleteKey(hive, key)
|
|
LOG.warning(r'Deleting registry key: %s\%s', hive_name, key)
|
|
except FileNotFoundError:
|
|
# Ignore
|
|
pass
|
|
except PermissionError:
|
|
LOG.error(r'Failed to delete registry key: %s\%s', hive_name, key)
|
|
if recurse:
|
|
# Re-raise exception
|
|
raise
|
|
|
|
# recurse is not True so assuming we tried to remove a non-empty key
|
|
msg = fr'Refusing to remove non-empty key: {hive_name}\{key}'
|
|
raise FileExistsError(msg)
|
|
|
|
|
|
def reg_delete_value(hive, key, value):
|
|
"""Delete a value from the registry."""
|
|
access = winreg.KEY_ALL_ACCESS
|
|
hive = reg_get_hive(hive)
|
|
hive_name = KNOWN_HIVE_NAMES.get(hive, '???')
|
|
|
|
# Delete value
|
|
with winreg.OpenKey(hive, key, access=access) as open_key:
|
|
try:
|
|
winreg.DeleteValue(open_key, value)
|
|
LOG.warning(
|
|
r'Deleting registry value: %s\%s "%s"', hive_name, key, value,
|
|
)
|
|
except FileNotFoundError:
|
|
# Ignore
|
|
pass
|
|
except PermissionError:
|
|
LOG.error(
|
|
r'Failed to delete registry value: %s\%s "%s"', hive_name, key, value,
|
|
)
|
|
# Re-raise exception
|
|
raise
|
|
|
|
|
|
def reg_get_hive(hive):
|
|
"""Get winreg HKEY constant from string, returns HKEY constant."""
|
|
if isinstance(hive, int):
|
|
# Assuming we're already a winreg HKEY constant
|
|
pass
|
|
else:
|
|
hive = KNOWN_HIVES[hive.upper()]
|
|
|
|
# Done
|
|
return hive
|
|
|
|
|
|
def reg_get_data_type(data_type):
|
|
"""Get registry data type from string, returns winreg constant."""
|
|
if isinstance(data_type, int):
|
|
# Assuming we're already a winreg value type constant
|
|
pass
|
|
else:
|
|
data_type = KNOWN_DATA_TYPES[data_type.upper()]
|
|
|
|
# Done
|
|
return data_type
|
|
|
|
|
|
def reg_key_exists(hive, key):
|
|
"""Test if the specified hive/key exists, returns bool."""
|
|
exists = False
|
|
hive = reg_get_hive(hive)
|
|
|
|
# Query key
|
|
try:
|
|
winreg.QueryValue(hive, key)
|
|
except FileNotFoundError:
|
|
# Leave set to False
|
|
pass
|
|
else:
|
|
exists = True
|
|
|
|
# Done
|
|
return exists
|
|
|
|
|
|
def reg_read_value(hive, key, value, force_32=False, force_64=False):
|
|
"""Query value from hive/hey, returns multiple types."""
|
|
access = winreg.KEY_READ
|
|
data = None
|
|
hive = reg_get_hive(hive)
|
|
|
|
# Set access
|
|
if force_32:
|
|
access = access | winreg.KEY_WOW64_32KEY
|
|
elif force_64:
|
|
access = access | winreg.KEY_WOW64_64KEY
|
|
|
|
# Query value
|
|
with winreg.OpenKey(hive, key, access=access) as open_key:
|
|
# Returning first part of tuple and ignoreing type
|
|
data = winreg.QueryValueEx(open_key, value)[0]
|
|
|
|
# Done
|
|
return data
|
|
|
|
|
|
def reg_write_settings(settings):
|
|
"""Set registry values in bulk from a custom data structure.
|
|
|
|
Data structure should be as follows:
|
|
EXAMPLE_SETTINGS = {
|
|
# See KNOWN_HIVES for valid hives
|
|
'HKLM': {
|
|
r'Software\\2Shirt\\WizardKit': (
|
|
# Value tuples should be in the form:
|
|
# (name, data, data-type, option),
|
|
# See KNOWN_DATA_TYPES for valid types
|
|
# The option item is optional
|
|
('Sample Value #1', 'Sample Data', 'SZ'),
|
|
('Sample Value #2', 14, 'DWORD'),
|
|
),
|
|
# An empty key will be created if no values are specified
|
|
r'Software\\2Shirt\\WizardKit\\Empty': (),
|
|
r'Software\\2Shirt\\WizardKit\\Test': (
|
|
('Sample Value #3', 14000000000000, 'QWORD'),
|
|
),
|
|
},
|
|
'HKCU': {
|
|
r'Software\\2Shirt\\WizardKit': (
|
|
# The 4th item forces using the 32-bit registry
|
|
# See reg_set_value() for valid options
|
|
('Sample Value #4', 'Sample Data', 'SZ', '32'),
|
|
),
|
|
},
|
|
}
|
|
"""
|
|
for hive, keys in settings.items():
|
|
hive = reg_get_hive(hive)
|
|
for key, values in keys.items():
|
|
if not values:
|
|
# Create an empty key
|
|
winreg.CreateKey(hive, key)
|
|
for value in values:
|
|
reg_set_value(hive, key, *value)
|
|
|
|
|
|
def reg_set_value(hive, key, name, data, data_type, option=None):
|
|
# pylint: disable=too-many-arguments
|
|
"""Set value for hive/key."""
|
|
access = winreg.KEY_WRITE
|
|
data_type = reg_get_data_type(data_type)
|
|
hive = reg_get_hive(hive)
|
|
option = str(option)
|
|
|
|
# Safety check
|
|
if not name and option in ('32', '64'):
|
|
raise NotImplementedError(
|
|
'Unable to set default values using alternate registry views',
|
|
)
|
|
|
|
# Set access
|
|
if option == '32':
|
|
access = access | winreg.KEY_WOW64_32KEY
|
|
elif option == '64':
|
|
access = access | winreg.KEY_WOW64_64KEY
|
|
|
|
# Create key
|
|
winreg.CreateKeyEx(hive, key, access=access)
|
|
|
|
# Set value
|
|
if name:
|
|
with winreg.OpenKey(hive, key, access=access) as open_key:
|
|
winreg.SetValueEx(open_key, name, 0, data_type, data)
|
|
else:
|
|
# Set default value instead
|
|
winreg.SetValue(hive, key, data_type, data)
|
|
|
|
|
|
# Safe Mode Functions
|
|
def disable_safemode():
|
|
"""Edit BCD to remove safeboot value."""
|
|
cmd = ['bcdedit', '/deletevalue', '{default}', 'safeboot']
|
|
run_program(cmd)
|
|
|
|
|
|
def disable_safemode_msi():
|
|
"""Disable MSI access under safemode."""
|
|
cmd = ['reg', 'delete', REG_MSISERVER, '/f']
|
|
run_program(cmd)
|
|
|
|
|
|
def enable_safemode():
|
|
"""Edit BCD to set safeboot as default."""
|
|
cmd = ['bcdedit', '/set', '{default}', 'safeboot', 'network']
|
|
run_program(cmd)
|
|
|
|
|
|
def enable_safemode_msi():
|
|
"""Enable MSI access under safemode."""
|
|
cmd = ['reg', 'add', REG_MSISERVER, '/f']
|
|
run_program(cmd)
|
|
cmd = [
|
|
'reg', 'add', REG_MSISERVER, '/ve',
|
|
'/t', 'REG_SZ',
|
|
'/d', 'Service', '/f',
|
|
]
|
|
run_program(cmd)
|
|
|
|
|
|
# Service Functions
|
|
def disable_service(service_name):
|
|
"""Set service startup to disabled."""
|
|
cmd = ['sc', 'config', service_name, 'start=', 'disabled']
|
|
run_program(cmd, check=False)
|
|
|
|
# Verify service was disabled
|
|
if get_service_start_type(service_name) != 'disabled':
|
|
raise GenericError(f'Failed to disable service {service_name}')
|
|
|
|
|
|
def enable_service(service_name, start_type='auto'):
|
|
"""Enable service by setting start type."""
|
|
cmd = ['sc', 'config', service_name, 'start=', start_type]
|
|
psutil_type = 'automatic'
|
|
if start_type == 'demand':
|
|
psutil_type = 'manual'
|
|
|
|
# Enable service
|
|
run_program(cmd, check=False)
|
|
|
|
# Verify service was enabled
|
|
if get_service_start_type(service_name) != psutil_type:
|
|
raise GenericError(f'Failed to enable service {service_name}')
|
|
|
|
|
|
def get_service_status(service_name):
|
|
"""Get service status using psutil, returns str."""
|
|
status = 'unknown'
|
|
try:
|
|
service = psutil.win_service_get(service_name)
|
|
status = service.status()
|
|
except psutil.NoSuchProcess:
|
|
status = 'missing?'
|
|
|
|
return status
|
|
|
|
|
|
def get_service_start_type(service_name):
|
|
"""Get service startup type using psutil, returns str."""
|
|
start_type = 'unknown'
|
|
try:
|
|
service = psutil.win_service_get(service_name)
|
|
start_type = service.start_type()
|
|
except psutil.NoSuchProcess:
|
|
start_type = 'missing?'
|
|
|
|
return start_type
|
|
|
|
|
|
def start_service(service_name):
|
|
"""Stop service."""
|
|
cmd = ['net', 'start', service_name]
|
|
run_program(cmd, check=False)
|
|
|
|
# Verify service was started
|
|
if not get_service_status(service_name) in ('running', 'start_pending'):
|
|
raise GenericError(f'Failed to start service {service_name}')
|
|
|
|
|
|
def stop_service(service_name):
|
|
"""Stop service."""
|
|
cmd = ['net', 'stop', service_name]
|
|
run_program(cmd, check=False)
|
|
|
|
# Verify service was stopped
|
|
if not get_service_status(service_name) == 'stopped':
|
|
raise GenericError(f'Failed to stop service {service_name}')
|
|
|
|
|
|
if __name__ == '__main__':
|
|
print("This file is not meant to be called directly.")
|