-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathreadme
52 lines (32 loc) · 1.93 KB
/
readme
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
installation/packaging:
so here's how i set up a distributable package or whatever you want to call it
build the solution; 3 projects
copy the respective binaries into a directory
rename hithere.exe to ht.dat
i don't know why i thought that would be a good idea, and i apologize. fork it if you care to fix it.
locktest copies the ht.dat to %appdata%\ht.exe and attempts to run it, then deletes it.
------
how it works:
so antiCryptoLocker.exe sets a bunch of registry values in HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\safer\codeidentifiers
it then makes a set of keys where .exes cannot run from for 9 common "unsafe" paths:
%appdata%\*.exe
%localappdata%\*.exe
%userprofile%\AppData\Local\Temp\*.exe
%userprofile%\AppData\Local\Temp\wz*\*.exe
%userprofile%\AppData\Local\Temp\7z*\*.exe
%userprofile%\AppData\Local\Temp\*.zip\*.exe
%userprofile%\AppData\Local\Temp\rar*\*.exe
%appdata%\*\*.exe
%localappdata%\*\*.exe
------
operation instructions:
make the "distributable" as mentioned above. the final directory should have antiCryptoLocker.exe, lockTest.exe, and ht.dat.
run locktest - if the test button results in a hello world, it's not locked down and you'll be notified.
run anticryptolocker as administrator - click "lockdown" and reboot to apply policy.
run locktest again - it should fail to run. a simple, nonexhaustive test but you get the idea.
to unlock .exe paths just run anticryptolocker as administrator and click "unlock" and reboot
------
compatibility:
windows xp through 8 (tested against 7) - HOME EDITIONS ONLY - see note below*
.net framework 2.0 and above
*IF YOU HAVE GROUP POLICIES ENFORCED THAT INCLUDE SOFTWARE RESTRICTION POLICIES THIS TOOL WILL LIKELY NOT WORK AS EXPECTED - THIS IS INTENDED FOR NON-PROFESSIONAL EDITIONS OF WINDOWS THAT LACK GROUP POLICY EDITORS OR FOR USERS THAT DON'T CARE TO USE THEM. no warranty is implied, use at your own risk, any bad stuff that happens is your fault, blah blah.