|
| 1 | +New-Item -ItemType Directory -Path "C:\ProgramData\DOAZLab" -Force > $null |
| 2 | +$targetPath = "C:\ProgramData\DOAZLab\id_rsa" |
| 3 | + |
| 4 | +$privateKey = @" |
| 5 | +-----BEGIN OPENSSH PRIVATE KEY----- |
| 6 | +b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAACFwAAAAdzc2gtcn |
| 7 | +NhAAAAAwEAAQAAAgEAtV8aFw/6ByVPYXCXOBr9PtWSl2a3eHsqKmxtEVTAcF38pXOOToyO |
| 8 | +KELMCtLEBrYc8PpI1GW/dHXJDyDpdBhT2QrBLyJ57wSWgo7EucCrKu26IZ0SVD/HA11zoe |
| 9 | +MqwknDLwXfKNcSmz0L2q3/pEq26eKRd7HYasD43zDqtH471DLqa344llcTgpgnn4cjrVIL |
| 10 | +0YRREEkm7TzekjLT6oESprV8LDDcFFlrziV36zkJeViUaA3Lx7M/TZUdjVy3gbwGcP152H |
| 11 | +lMgr9kMJeU2hZOvy9bsbIQILdZ/OhzqCQ5wHXF4nhwNx6+ogGPmIVuUyFjeDjKdTKSVBwQ |
| 12 | +g+u5/ADQWubYAcoXGnzTD6hxYhNm6P8xBys/Z05IzSJgobv9J+IQFo63yYKKEwvaC2tWcr |
| 13 | +rxi53mHLjWrGQZAcNueZdABYK2Xs+61qiw4cgsW+E9Rx8HI9BknKcrbQBQBCjU0VX8tw7D |
| 14 | +RWlpL8KGtWtDIIXL8/w9O4y+L6luoHL4L0OmmAAQhTTKxftzxZwM/y1B+3dJ7aZVyJzNqW |
| 15 | +ZqhyOHWnGFIH9WySPmlBZE+l/cHmWXcFaA8nyvJtiqd1pGa96/KCs+uX8PKtp1LZrgg4Dn |
| 16 | +1MDi/DzcJd6KybCZ/ZA1Xmypm6HT+01CCxyeHrW0mqCK5XJmjvijG3Y3V/oSdm9+EpCDKV |
| 17 | +0AAAdIvPR2+Lz0dvgAAAAHc3NoLXJzYQAAAgEAtV8aFw/6ByVPYXCXOBr9PtWSl2a3eHsq |
| 18 | +KmxtEVTAcF38pXOOToyOKELMCtLEBrYc8PpI1GW/dHXJDyDpdBhT2QrBLyJ57wSWgo7Euc |
| 19 | +CrKu26IZ0SVD/HA11zoeMqwknDLwXfKNcSmz0L2q3/pEq26eKRd7HYasD43zDqtH471DLq |
| 20 | +a344llcTgpgnn4cjrVIL0YRREEkm7TzekjLT6oESprV8LDDcFFlrziV36zkJeViUaA3Lx7 |
| 21 | +M/TZUdjVy3gbwGcP152HlMgr9kMJeU2hZOvy9bsbIQILdZ/OhzqCQ5wHXF4nhwNx6+ogGP |
| 22 | +mIVuUyFjeDjKdTKSVBwQg+u5/ADQWubYAcoXGnzTD6hxYhNm6P8xBys/Z05IzSJgobv9J+ |
| 23 | +IQFo63yYKKEwvaC2tWcrrxi53mHLjWrGQZAcNueZdABYK2Xs+61qiw4cgsW+E9Rx8HI9Bk |
| 24 | +nKcrbQBQBCjU0VX8tw7DRWlpL8KGtWtDIIXL8/w9O4y+L6luoHL4L0OmmAAQhTTKxftzxZ |
| 25 | +wM/y1B+3dJ7aZVyJzNqWZqhyOHWnGFIH9WySPmlBZE+l/cHmWXcFaA8nyvJtiqd1pGa96/ |
| 26 | +KCs+uX8PKtp1LZrgg4Dn1MDi/DzcJd6KybCZ/ZA1Xmypm6HT+01CCxyeHrW0mqCK5XJmjv |
| 27 | +ijG3Y3V/oSdm9+EpCDKV0AAAADAQABAAACAFSnFTnTaqsAJos/rkzxB+dWbqu8tQCGV/li |
| 28 | +DwwKRyGLNJsSksalwsoW1z5r/jN1t49f+jMsZE5alWO6xEu7+RKx+tXhnRDKzucT9M0QGL |
| 29 | +QaLgh3U/E/rUcsTIawTSpOnEurzWs16wjK1ugT02BewP3sEmJP/0dgVyhxH/Lrgkg6FYDj |
| 30 | +ckz1SnVnSAMk46mHRF3fiKh1xDXxdZ6+G3v2D3sA9Pp5OZdD31Xh1hVTU1EwX2ArpEPKrU |
| 31 | +6sPRVYQ4xJcqY1ILRBdU0HQJ+PeFnMFKgWVhFbnzxt55Hr+uNtOQlTzu8zsIiBkI9z9A5H |
| 32 | +pOUnDdK0iwZlerfIO4sfMHjm9lfUin8VQoROZKsRt6DNnHNAmGIaHfFyylWjfRIPSl6IB2 |
| 33 | +0Wu3nUBn3AiYDo6I9aQsxpF58ky3XHlfUMycedYe6lScWS47F3pvXL2GZqLm+1uggI8Qr6 |
| 34 | +Lsasp+izebSdf9C36/CxImA5lt9gIAnv+/YCQJOi/KI6TqeVx2bOjeJwQDMoRFEtK5SyZC |
| 35 | +fu2thq4YhTibgt0BMFfqIYAGgey5qhg4mXuea0Ii+paa0fbKJ7JDC3XKR3szoyFlNy2aI1 |
| 36 | +FfXJ9dqYQJy6aXZjimVDpl28JiqxdODTfQYfNId4cs8cOBD5F55ppRwo7Vl5CYfLuEB6P0 |
| 37 | +AEk2zlQxvMVimNYr6PAAABAQC4Nz0Y9a/RSvd6p9E03LTXDCo3vTVHndguhIbjLXeoHUu/ |
| 38 | +ZtA9dv8XFFSmZ3f1gOOutXYIgXKoK2A5ZkEQgRBlzArjdX8fwnw2X3I5nw1Oa2/WT5kDY6 |
| 39 | +nLhdxOztTEwWMdCNWKADg6VHQNaKcO6qNKLcVoDOVEGv/bby4dadLwuKXnU0c1LdNX4b01 |
| 40 | +tFPucuWL8ZJhszteZJ2AuARSV2ripZZu63LRHuAdskc/crhFofCnuScw7EQFGZtlDtETW8 |
| 41 | +5tHGgrkCphRQ97MN2Nq5o1rCZijPL4K3staYrC5WzUASFTIctyF8dQbLEysNeP1U3bMbdM |
| 42 | +YS3Y0aa8cwdDeTiFAAABAQC+2TKC7y31DomvYVELoCXmvhyCDAg5QUFzUZD9ahQXTNNsR+ |
| 43 | +21RVAgs7089FNnR5N7x8gSsnKMRX2TYz9X4wwLreTQ0duJk2AJiO7LaTkj6bDNjHc8OY29 |
| 44 | +82kgwQKEjYPwl5BCS4K48aaKLuEfvM4PBA1nThVS0cshbVSgtJv/FdlibjIqwZDr7RWQGn |
| 45 | +maqpNpB4Qd2NwuJhc0bnJ72GM/qaRpanaRwq0gvYJD3d9EKore6KwAqTt7yP20pPGOsj61 |
| 46 | +MEn7sEiXnh0cYw9v1BVpht9k1wT0P9d+2YXtMJJA7krkIUwBY1Xp5wumxhViubAKmzLT/J |
| 47 | +z04b7gVuREoSIvAAABAQDzSbAAEUbFg/n8tLRV9GzkjgbhucAQ8WWynBxFGdjsmpIGap1k |
| 48 | +nA7J9rooGBhQoPzby94L0UqI9AvP4BKheGIbXc0gD/DJdA6Q1iY/ftUXF1M1YpB5YSZOOn |
| 49 | ++PjczXXVAegzXdmteQyycIWiI/qqBR0vkMLoQkSBAe6/Gl2yp7FpZXsfF7ok9JEFsTEKg9 |
| 50 | +qcy2VO12+4YBjGlIlrTBZizhOHn8r1bd8mmayLzjRaVxrGDMl/P0hnjDwBT+aReX9PUDLV |
| 51 | +9NW4GQ5b0CXN5F6M5kQipnek/WInSI/Y2YGuZcmSKCn7CaxoFBmDfv9tyYnG2OmHEekPiE |
| 52 | ++65g8W06V8YzAAAADWRvYWRtaW5ATnV4MDEBAgMEBQ== |
| 53 | +-----END OPENSSH PRIVATE KEY----- |
| 54 | +
|
| 55 | +"@ |
| 56 | + |
| 57 | +# Write to file without persisting the key elsewhere |
| 58 | +Set-Content -Path $targetPath -Value $privateKey -NoNewline |
| 59 | + |
| 60 | +# Verify the file (optional) |
| 61 | +Write-Output "Private key written to $targetPath" |
| 62 | + |
| 63 | +$targetPath = "C:\ProgramData\DOAZLab\id_rsa" |
| 64 | +$DomainUser = "doazlab\doadmin" # Set the domain user |
| 65 | + |
| 66 | +# Remove inherited permissions |
| 67 | +icacls $targetPath /inheritance:r |
| 68 | + |
| 69 | +# Grant full control to the domain user |
| 70 | +icacls $targetPath /grant "$DomainUser`:F" |
| 71 | + |
| 72 | +# Remove access for "Authenticated Users" |
| 73 | +icacls $targetPath /remove "NT AUTHORITY\Authenticated Users" |
| 74 | + |
| 75 | +# Remove access for "Users" group (optional, but recommended) |
| 76 | +icacls $targetPath /remove "BUILTIN\Users" |
| 77 | + |
| 78 | +# Verify new permissions |
| 79 | +icacls $targetPath |
0 commit comments