Open mallorybowes opened 4 years ago
Contributor @blauwers added support for Mac to the current script in the repo. Windows still needs to be done.
I tested this on MacOS Big Sur 11.1 on a 2020 13" MacBook Pro w/ Apple Silicon M1. It works perfectly without any modification.
In case other Jamf admins find this: yes, it works perfectly as an extension attribute. Wrap the output in "<result>"
{...} "</result>"
and you're done.
edit: actually... nope. Jamf recon runs as root, so the script checks for extensions installed to the root user's profile... which is none. It runs, but it does not return the expected result... it always finds no compromised extensions. I'm working on a fix... it's very Jamf-specific, so I will not submit it as a PR back to this repo. Message me if you need the Jamf-updated script.
chanting Windows! Windows! Windows!
chanting Windows! Windows! Windows!
Lol. I've thought about making an attempt to flail "The Worst Powershell Script Ever Written" together (since Windows is def not my AoE) but I'm still working on the reformatting / adding metadata to the existing extension list. (Yes, I'm incredibly slow since I tasked myself over the holidays to have that completed. It's coming. I promise. :-)
Other Windows ppl jump in if I'm wrong here but as a temp bodge, I think one thing that could work currently for Win10 is installing WSL2 and adding Ubuntu (or other distro) to get the bash shell working in Windows. That would allow the currently posted script to run and it would probably just need the correct path(s) to the user's Chrome / Brave / Edge / other Chrome-based extension directories. (I'm sensing adding the option for command-line path args to the existing script could be helpful... (⌐⊙_⊙) )
I don't currently have a Windows machine to test on (one is in the post and will be here soon) but I can add a reminder in my calendar to check that script process out once the new machine shows up. (And btw, I'm def not switching to Windows. I'm going to test using Qubes to run Win10 for malware detonations. =)
Another note on this issue: I'll be converting my old laptop to a Chromebook using Neverware so will have a way to test for that platform.
I've created Powershell script for Windows called Scan-ChromeExtensions.ps1
located in pull request #20. Let me know if you have any questions.
Just a wishlist item. I'm not a programmer (far from it) but should be able to figure out a "native" way to get this idea to work on multiple endpoints.