windows服务器记录3389远程桌面IP战略
发布时间:2021-12-18 11:27:24 所属栏目:系统 来源:互联网
导读:下面的代码复制一下存成一个批处理文件后双击即可! 3389IP日志路径是C:/WINDOWS/PDPLOG/RDPlog.txt 程序代码 复制代码 代码如下: MD C:/WINDOWS/PDPLOG echo date /t ^^RDPlog.txt C:/WINDOWS/PDPLOG/PdPLOG.CMD echo time /t ^^RDPlog.txt C:/WINDOWS/PDPLOG
下面的代码复制一下存成一个批处理文件后双击即可! 3389IP日志路径是C:/WINDOWS/PDPLOG/RDPlog.txt 程序代码 复制代码 代码如下: MD C:/WINDOWS/PDPLOG echo date /t ^>^>RDPlog.txt >>C:/WINDOWS/PDPLOG/PdPLOG.CMD echo time /t ^>^>RDPlog.txt >>C:/WINDOWS/PDPLOG/PdPLOG.CMD echo netstat -n -p tcp ^| find ":3389"^>^>RDPlog.txt >>C:/WINDOWS/PDPLOG/PdPLOG.CMD echo start Explorer >>C:/WINDOWS/PDPLOG/PdPLOG.CMD :: 添加用户每次进入远程桌面时自动记录下来所用IP,可用来发现黑客踪迹! REG ADD "HKEY_LOCAL_MACHINE/SYSTEM/ControlSet001/Control/Terminal Server/WinStations/RDP-Tcp" /v fInheritInitialProgram /t REG_DWORD /d "00000000" /f REG ADD "HKEY_LOCAL_MACHINE/SYSTEM/ControlSet001/Control/Terminal Server/WinStations/RDP-Tcp" /v WorkDirectory /t REG_SZ /d C:/WINDOWS/PDPLOG/ /f REG ADD "HKEY_LOCAL_MACHINE/SYSTEM/ControlSet001/Control/Terminal Server/WinStations/RDP-Tcp" /v InitialProgram /t REG_SZ /d "C:/WINDOWS/PDPLOG/PdPLOG.CMD" /f REG ADD "HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/Terminal Server/WinStations/RDP-Tcp" /v fInheritInitialProgram /t REG_DWORD /d "00000000" /f REG ADD "HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/Terminal Server/WinStations/RDP-Tcp" /v WorkDirectory /t REG_SZ /d C:/WINDOWS/PDPLOG/ /f REG ADD "HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/Terminal Server/WinStations/RDP-Tcp" /v InitialProgram /t REG_SZ /d "C:/WINDOWS/PDPLOG/PdPLOG.CMD" /f (编辑:ASP站长) 【免责声明】本站内容转载自互联网,其相关言论仅代表作者个人观点绝非权威,不代表本站立场。如您发现内容存在版权问题,请提交相关链接至邮箱:bqsm@foxmail.com,我们将及时予以处理。 |
相关内容
未处理完善
-
无相关信息
最新更新