1
Primary
true
false
NTFS
C
1
1
0
true
OnError
true
Vagrant Administrator
Vagrant Inc.
YC6KT-GKW9T-YTKYR-T4X34-R7VHC
Never
0
1
OnError
false
/IMAGE/NAME
Windows Server 2008 R2 SERVERSTANDARD
en-US
en-US
en-US
en-US
en-US
en-US
false
vagrant
true
vagrant
true
Vagrant User
vagrant
administrators
vagrant
true
true
Home
vagrant
true
vagrant
true
cmd.exe /c powershell -Command "Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Force"
Set Execution Policy 64 Bit
1
true
C:\Windows\SysWOW64\cmd.exe /c powershell -Command "Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Force"
Set Execution Policy 32 Bit
2
true
cmd.exe /c winrm quickconfig -q
winrm quickconfig -q
3
true
cmd.exe /c winrm quickconfig -transport:http
winrm quickconfig -transport:http
4
true
cmd.exe /c winrm set winrm/config @{MaxTimeoutms="1800000"}
Win RM MaxTimoutms
5
true
cmd.exe /c winrm set winrm/config/winrs @{MaxMemoryPerShellMB="800"}
Win RM MaxMemoryPerShellMB
6
true
cmd.exe /c winrm set winrm/config/winrs @{MaxShellsPerUser="999"}
Win RM MaxShellsPerUser
7
true
cmd.exe /c winrm set winrm/config/winrs @{MaxProcessesPerShell="999"}
Win RM MaxProcessesPerShell
8
true
cmd.exe /c winrm set winrm/config/service @{MaxConcurrentOperationsPerUser="999"}
Win RM ConcurrentOperationsPerUser
9
true
cmd.exe /c winrm set winrm/config/service @{AllowUnencrypted="true"}
Win RM AllowUnencrypted
10
true
cmd.exe /c winrm set winrm/config/service/auth @{Basic="true"}
Win RM auth Basic
11
true
cmd.exe /c winrm set winrm/config/client/auth @{Basic="true"}
Win RM client auth Basic
12
true
cmd.exe /c winrm set winrm/config/listener?Address=*+Transport=HTTP @{Port="5985"}
Win RM listener Address/Port
13
true
cmd.exe /c netsh advfirewall firewall set rule group="remote administration" new enable=yes
Win RM adv firewall enable
14
true
cmd.exe /c netsh firewall add portopening TCP 5985 "Port 5985"
Win RM port open
15
true
cmd.exe /c net stop winrm
Stop Win RM Service
16
true
cmd.exe /c sc config winrm start= auto
Win RM Autostart
17
true
cmd.exe /c net start winrm
Start Win RM Service
18
true
%SystemRoot%\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ /v HideFileExt /t REG_DWORD /d 0 /f
19
Show file extensions in Explorer
%SystemRoot%\System32\reg.exe ADD HKCU\Console /v QuickEdit /t REG_DWORD /d 1 /f
20
Enable QuickEdit mode
%SystemRoot%\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ /v Start_ShowRun /t REG_DWORD /d 1 /f
21
Show Run command in Start Menu
%SystemRoot%\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ /v StartMenuAdminTools /t REG_DWORD /d 1 /f
22
Show Administrative Tools in Start Menu
%SystemRoot%\System32\reg.exe ADD HKLM\SYSTEM\CurrentControlSet\Control\Power\ /v HibernateFileSizePercent /t REG_DWORD /d 0 /f
23
Zero Hibernation File
%SystemRoot%\System32\reg.exe ADD HKLM\SYSTEM\CurrentControlSet\Control\Power\ /v HibernateEnabled /t REG_DWORD /d 0 /f
24
Disable Hibernation Mode
cmd.exe /c wmic useraccount where "name='vagrant'" set PasswordExpires=FALSE
25
Disable password expiration for vagrant user
cmd.exe /c mkdir -p C:\vagrant\scripts
Create directory for vagrant files to avoid provisioner bug with packer.
26
cmd.exe /c C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -File a:\install_netfx.ps1 -AutoStart
Install .NET 4.0
27
cmd.exe /c C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -File a:\openssh.ps1 -AutoStart
Install OpenSSH
99
true
false
false
metasploitable3-2008R2
Eastern Standard Time
true
false
false
true
true