/
windows_asr_test.go
95 lines (79 loc) · 2.82 KB
/
windows_asr_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
// Hardentools
// Copyright (C) 2017-2020 Security Without Borders
//
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with this program. If not, see <http://www.gnu.org/licenses/>.
package main
import (
"fmt"
"io/ioutil"
"strings"
"testing"
)
// func TestWarnIfWindowsDefenderNotActive(t *testing.T) {
// warnIfWindowsDefenderNotActive()
// }
// IsHardened checks if ASR is already hardened
func TestIsHardened(t *testing.T) {
initLogging(ioutil.Discard, ioutil.Discard, false)
if !checkWindowsVersion() {
t.Error("Invalid Windows Version")
}
t.Log("--- Get-MpPreference before hardening")
debugOutput(t)
err := WindowsASR.Harden(true)
if err != nil {
t.Error(err)
}
isHardened := WindowsASR.IsHardened()
if isHardened == false {
t.Error("Harden did not work correctly")
}
t.Log("--- Get-MpPreference after hardening")
debugOutput(t)
err = WindowsASR.Harden(false)
if err != nil {
t.Error(err)
}
isHardened = WindowsASR.IsHardened()
if isHardened == true {
t.Error("Restore did not work correctly")
}
t.Log("--- Get-MpPreference after restoring")
debugOutput(t)
}
func debugOutput(t *testing.T) {
psString := fmt.Sprintf("$prefs = Get-MpPreference; $prefs.AttackSurfaceReductionRules_Ids")
ruleIDsOut, err := executeCommand("PowerShell.exe", "-Command", psString)
if err != nil {
t.Logf("ERROR: WindowsASR: Verify if Windows Defender is running. Executing Powershell.exe with command \"%s\" failed.", psString)
t.Logf("ERROR: WindowsASR: Powershell Output was: %s", ruleIDsOut)
t.Error("error executing powershell")
}
psString = fmt.Sprintf("$prefs = Get-MpPreference; $prefs.AttackSurfaceReductionRules_Actions")
ruleActionsOut, err := executeCommand("PowerShell.exe", "-Command", psString)
if err != nil {
t.Logf("ERROR: WindowsASR: Verify if Windows Defender is running. Executing Powershell.exe with command \"%s\" failed.", psString)
t.Logf("ERROR: WindowsASR: Powershell Output was: %s", ruleActionsOut)
t.Error("error executing powershell")
}
// split / remove line feeds and carriage return
currentRuleIDs := strings.Split(ruleIDsOut, "\r\n")
currentRuleActions := strings.Split(ruleActionsOut, "\r\n")
// just some debug output
for i, ruleIDdebug := range currentRuleIDs {
if len(ruleIDdebug) > 0 {
t.Logf("%s = %s\n", ruleIDdebug, currentRuleActions[i])
}
}
}