2024-01-25 13:37:12 +01:00
|
|
|
|
Script: *encrypt-file.ps1*
|
|
|
|
|
========================
|
2021-11-08 21:36:42 +01:00
|
|
|
|
|
2022-11-17 19:46:02 +01:00
|
|
|
|
This PowerShell script encrypts a file using the given password and AES encryption.
|
2021-11-08 21:36:42 +01:00
|
|
|
|
|
2023-07-29 10:04:38 +02:00
|
|
|
|
Parameters
|
|
|
|
|
----------
|
2021-11-08 21:36:42 +01:00
|
|
|
|
```powershell
|
2023-07-29 10:15:44 +02:00
|
|
|
|
PS> ./encrypt-file.ps1 [[-Path] <String>] [[-Password] <String>] [<CommonParameters>]
|
2021-11-08 21:36:42 +01:00
|
|
|
|
|
|
|
|
|
-Path <String>
|
|
|
|
|
Specifies the path to the file to encrypt
|
|
|
|
|
|
|
|
|
|
Required? false
|
|
|
|
|
Position? 1
|
|
|
|
|
Default value
|
|
|
|
|
Accept pipeline input? false
|
|
|
|
|
Accept wildcard characters? false
|
|
|
|
|
|
|
|
|
|
-Password <String>
|
|
|
|
|
Specifies the password to use
|
|
|
|
|
|
|
|
|
|
Required? false
|
|
|
|
|
Position? 2
|
|
|
|
|
Default value
|
|
|
|
|
Accept pipeline input? false
|
|
|
|
|
Accept wildcard characters? false
|
|
|
|
|
|
|
|
|
|
[<CommonParameters>]
|
|
|
|
|
This script supports the common parameters: Verbose, Debug, ErrorAction, ErrorVariable, WarningAction,
|
|
|
|
|
WarningVariable, OutBuffer, PipelineVariable, and OutVariable.
|
|
|
|
|
```
|
|
|
|
|
|
2023-07-29 10:04:38 +02:00
|
|
|
|
Example
|
|
|
|
|
-------
|
2021-11-08 21:36:42 +01:00
|
|
|
|
```powershell
|
2023-08-06 21:36:33 +02:00
|
|
|
|
PS> ./encrypt-file.ps1 C:\MyFile.txt "123"
|
2021-11-08 21:36:42 +01:00
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
2023-07-29 10:04:38 +02:00
|
|
|
|
Notes
|
|
|
|
|
-----
|
2022-11-17 19:46:02 +01:00
|
|
|
|
Author: Markus Fleschutz | License: CC0
|
2021-11-08 21:36:42 +01:00
|
|
|
|
|
2023-07-29 10:04:38 +02:00
|
|
|
|
Related Links
|
|
|
|
|
-------------
|
2021-11-08 21:36:42 +01:00
|
|
|
|
https://github.com/fleschutz/PowerShell
|
|
|
|
|
|
2023-07-29 10:04:38 +02:00
|
|
|
|
Script Content
|
|
|
|
|
--------------
|
2022-11-17 20:05:34 +01:00
|
|
|
|
```powershell
|
2022-11-17 20:02:26 +01:00
|
|
|
|
<#
|
|
|
|
|
.SYNOPSIS
|
|
|
|
|
Encrypts a file
|
|
|
|
|
.DESCRIPTION
|
|
|
|
|
This PowerShell script encrypts a file using the given password and AES encryption.
|
|
|
|
|
.PARAMETER Path
|
|
|
|
|
Specifies the path to the file to encrypt
|
|
|
|
|
.PARAMETER Password
|
|
|
|
|
Specifies the password to use
|
|
|
|
|
.EXAMPLE
|
2023-08-06 21:36:33 +02:00
|
|
|
|
PS> ./encrypt-file.ps1 C:\MyFile.txt "123"
|
2022-11-17 20:02:26 +01:00
|
|
|
|
.LINK
|
|
|
|
|
https://github.com/fleschutz/PowerShell
|
|
|
|
|
.NOTES
|
|
|
|
|
Author: Markus Fleschutz | License: CC0
|
|
|
|
|
#>
|
|
|
|
|
|
|
|
|
|
param([string]$Path = "", [string]$Password = "")
|
|
|
|
|
|
|
|
|
|
function EncryptFile {
|
|
|
|
|
[CmdletBinding(DefaultParameterSetName='SecureString')]
|
|
|
|
|
[OutputType([System.IO.FileInfo[]])]
|
|
|
|
|
Param(
|
|
|
|
|
[Parameter(Mandatory=$true, Position=1, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)]
|
|
|
|
|
[Alias('PSPath','LiteralPath')]
|
|
|
|
|
[string[]]$FileName,
|
|
|
|
|
[Parameter(Mandatory=$false, Position=2)]
|
|
|
|
|
[ValidateSet('AES','DES','RC2','Rijndael','TripleDES')]
|
|
|
|
|
[String]$Algorithm = 'AES',
|
|
|
|
|
[Parameter(Mandatory=$false, Position=3, ParameterSetName='SecureString')]
|
|
|
|
|
[System.Security.SecureString]$Key = (New-CryptographyKey -Algorithm $Algorithm),
|
|
|
|
|
[Parameter(Mandatory=$true, Position=3, ParameterSetName='PlainText')]
|
|
|
|
|
[String]$KeyAsPlainText,
|
|
|
|
|
[Parameter(Mandatory=$false, Position=4)]
|
|
|
|
|
[System.Security.Cryptography.CipherMode]$CipherMode,
|
|
|
|
|
[Parameter(Mandatory=$false, Position=5)]
|
|
|
|
|
[System.Security.Cryptography.PaddingMode]$PaddingMode,
|
|
|
|
|
[Parameter(Mandatory=$false, Position=6)]
|
|
|
|
|
[String]$Suffix = ".$Algorithm",
|
|
|
|
|
[Parameter()]
|
|
|
|
|
[Switch]$RemoveSource
|
|
|
|
|
)
|
|
|
|
|
begin {
|
|
|
|
|
try {
|
|
|
|
|
if ($PSCmdlet.ParameterSetName -eq 'PlainText') {
|
|
|
|
|
$Key = $KeyAsPlainText | ConvertTo-SecureString -AsPlainText -Force
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$BSTR = [System.Runtime.InteropServices.Marshal]::SecureStringToBSTR($Key)
|
|
|
|
|
$EncryptionKey = [System.Convert]::FromBase64String([System.Runtime.InteropServices.Marshal]::PtrToStringAuto($BSTR))
|
|
|
|
|
|
|
|
|
|
$Crypto = [System.Security.Cryptography.SymmetricAlgorithm]::Create($Algorithm)
|
|
|
|
|
if ($PSBoundParameters.ContainsKey('CipherMode')) {
|
|
|
|
|
$Crypto.Mode = $CipherMode
|
|
|
|
|
}
|
|
|
|
|
if ($PSBoundParameters.ContainsKey('PaddingMode')) {
|
|
|
|
|
$Crypto.Padding = $PaddingMode
|
|
|
|
|
}
|
|
|
|
|
$Crypto.KeySize = $EncryptionKey.Length*8
|
|
|
|
|
$Crypto.Key = $EncryptionKey
|
|
|
|
|
} catch {
|
|
|
|
|
Write-Error $_ -ErrorAction Stop
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
process {
|
|
|
|
|
$Files = Get-Item -LiteralPath $FileName
|
|
|
|
|
|
|
|
|
|
foreach($File in $Files) {
|
|
|
|
|
$DestinationFile = $File.FullName + $Suffix
|
|
|
|
|
|
|
|
|
|
try {
|
|
|
|
|
$FileStreamReader = New-Object System.IO.FileStream($File.FullName, [System.IO.FileMode]::Open)
|
|
|
|
|
$FileStreamWriter = New-Object System.IO.FileStream($DestinationFile, [System.IO.FileMode]::Create)
|
|
|
|
|
|
|
|
|
|
$Crypto.GenerateIV()
|
|
|
|
|
$FileStreamWriter.Write([System.BitConverter]::GetBytes($Crypto.IV.Length), 0, 4)
|
|
|
|
|
$FileStreamWriter.Write($Crypto.IV, 0, $Crypto.IV.Length)
|
|
|
|
|
|
|
|
|
|
$Transform = $Crypto.CreateEncryptor()
|
|
|
|
|
$CryptoStream = New-Object System.Security.Cryptography.CryptoStream($FileStreamWriter, $Transform, [System.Security.Cryptography.CryptoStreamMode]::Write)
|
|
|
|
|
$FileStreamReader.CopyTo($CryptoStream)
|
|
|
|
|
|
|
|
|
|
$CryptoStream.FlushFinalBlock()
|
|
|
|
|
$CryptoStream.Close()
|
|
|
|
|
$FileStreamReader.Close()
|
|
|
|
|
$FileStreamWriter.Close()
|
|
|
|
|
|
|
|
|
|
if ($RemoveSource) {
|
|
|
|
|
Remove-Item -LiteralPath $File.FullName
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$result = Get-Item $DestinationFile
|
|
|
|
|
$result | Add-Member –MemberType NoteProperty –Name SourceFile –Value $File.FullName
|
|
|
|
|
$result | Add-Member –MemberType NoteProperty –Name Algorithm –Value $Algorithm
|
|
|
|
|
$result | Add-Member –MemberType NoteProperty –Name Key –Value $Key
|
|
|
|
|
$result | Add-Member –MemberType NoteProperty –Name CipherMode –Value $Crypto.Mode
|
|
|
|
|
$result | Add-Member –MemberType NoteProperty –Name PaddingMode –Value $Crypto.Padding
|
|
|
|
|
$result
|
|
|
|
|
} catch {
|
|
|
|
|
Write-Error $_
|
|
|
|
|
if ($FileStreamWriter) {
|
|
|
|
|
$FileStreamWriter.Close()
|
|
|
|
|
Remove-Item -LiteralPath $DestinationFile -Force
|
|
|
|
|
}
|
|
|
|
|
continue
|
|
|
|
|
} finally {
|
|
|
|
|
if($CryptoStream){$CryptoStream.Close()}
|
|
|
|
|
if($FileStreamReader){$FileStreamReader.Close()}
|
|
|
|
|
if($FileStreamWriter){$FileStreamWriter.Close()}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
try {
|
|
|
|
|
if ($Path -eq "" ) { $Path = read-host "Enter path to file" }
|
|
|
|
|
if ($Password -eq "" ) { $Password = read-host "Enter password" }
|
|
|
|
|
$StopWatch = [system.diagnostics.stopwatch]::startNew()
|
|
|
|
|
|
2023-05-26 12:20:18 +02:00
|
|
|
|
[char[]]$PasswordAsArray = $Password
|
|
|
|
|
$PasswordAsBase64 = [System.Convert]::ToBase64String($PasswordAsArray)
|
|
|
|
|
EncryptFile "$Path" -Algorithm AES -KeyAsPlainText $PasswordAsBase64 -RemoveSource
|
2022-11-17 20:02:26 +01:00
|
|
|
|
|
|
|
|
|
[int]$Elapsed = $StopWatch.Elapsed.TotalSeconds
|
|
|
|
|
"✔️ file encrypted in $Elapsed sec"
|
|
|
|
|
exit 0 # success
|
|
|
|
|
} catch {
|
|
|
|
|
"⚠️ Error in line $($_.InvocationInfo.ScriptLineNumber): $($Error[0])"
|
|
|
|
|
exit 1
|
|
|
|
|
}
|
2022-11-17 20:05:34 +01:00
|
|
|
|
```
|
2022-11-17 20:02:26 +01:00
|
|
|
|
|
2024-05-19 10:25:56 +02:00
|
|
|
|
*(generated by convert-ps2md.ps1 using the comment-based help of encrypt-file.ps1 as of 05/19/2024 10:25:20)*
|