下面的代码复制一下存成一个批处理文件后双击即可!
复制代码 代码如下:
MD C:WINDOWSPDPLOG
echo date /t ^>^>RDPlog.txt >>C:WINDOWSPDPLOGPdPLOG.CMD
echo time /t ^>^>RDPlog.txt >>C:WINDOWSPDPLOGPdPLOG.CMD
echo netstat -n -p tcp ^| find ":3389"^>^>RDPlog.txt >>C:WINDOWSPDPLOGPdPLOG.CMD
echo start Explorer >>C:WINDOWSPDPLOGPdPLOG.CMD
:: 添加用户每次进入远程桌面时自动记录下来所用IP,可用来发现黑客踪迹!
REG ADD "HKEY_LOCAL_MACHINESYSTEMControlSet001ControlTerminal ServerWinStationsRDP-Tcp" /v fInheritInitialProgram /t REG_DWORD /d "00000000" /f
REG ADD "HKEY_LOCAL_MACHINESYSTEMControlSet001ControlTerminal ServerWinStationsRDP-Tcp" /v WorkDirectory /t REG_SZ /d C:WINDOWSPDPLOG /f
REG ADD "HKEY_LOCAL_MACHINESYSTEMControlSet001ControlTerminal ServerWinStationsRDP-Tcp" /v InitialProgram /t REG_SZ /d "C:WINDOWSPDPLOGPdPLOG.CMD" /f
REG ADD "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlTerminal ServerWinStationsRDP-Tcp" /v fInheritInitialProgram /t REG_DWORD /d "00000000" /f
REG ADD "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlTerminal ServerWinStationsRDP-Tcp" /v WorkDirectory /t REG_SZ /d C:WINDOWSPDPLOG /f
REG ADD "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlTerminal ServerWinStationsRDP-Tcp" /v InitialProgram /t REG_SZ /d "C:WINDOWSPDPLOGPdPLOG.CMD" /f
Echo 记录远程桌面IP策略添加完毕! 请按任意键退出!
PAUSE >nul
echo netstat -n -p tcp ^| find ":3389"^>^>RDPlog.txt >>C:WINDOWSPDPLOGPdPLOG.CMD
上面一句中有个3389数字,这个是远程桌面的默认端口。
如果更改远程桌面的朋友,需要将3389替换为你更改的端口。
查看记录的地方在C:WINDOWSPDPLOGRDPlog.txt