【原创】跨越3389障碍终极思考
文章首发:[3.A.S.T]http://www.3ast.com.cn/9W |z bW5d5wH4RCC u z原文作者:柔肠寸断[3.A.S.T]
=========================================
首先给点基础的代码,然后再说障碍Qcw$o0A;rU#Y
=========================================p+o#dvD [?Qm
2000生成3389bat代码[code]echo Windows Registry Editor Version 5.00 >2000.reg
echo. >>2000.reg(E7S\Z.~+LF`;oO4t
echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\netcache] >>2000.reg k#k.X+`h'^G I%D
echo "Enabled"="0" >>2000.reg :q@+\dOO O7L
echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] >>2000.reg
echo "ShutdownWithoutLogon"="0" >>2000.reg
echo [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Installer] >>2000.reg t{'k.J9e:Fv-F
echo "EnableAdminTSRemote"=dword:00000001 >>2000.reg
echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server] >>2000.reg S/G"J4L)zff;a
echo "TSEnabled"=dword:00000001 >>2000.reg
echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TermDD] >>2000.reg qAa6taE(E:o
echo "Start"=dword:00000002 >>2000.reg 6v.iBeoA
echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TermService] >>2000.reg } G1y6|*M+AW
echo "Start"=dword:00000002 >>2000.reg N/X3T%qe;{(].w/t
echo [HKEY_USERS\.DEFAULT\Keyboard Layout\Toggle] >>2000.reg ;`mfp HNz
echo "Hotkey"="1" >>2000.reg 4WfU)gJr]
echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd\Tds\tcp] >>2000.reg qIH:g,nW
echo "PortNumber"=dword:00000D3D >>2000.reg "p!Dk&W2]0\-a'G3yl
echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp] >>2000.reg
echo "PortNumber"=dword:00000D3D >>2000.reg[/code]Win XP&Win 2003生成3389bat代码[code]echo Windows Registry Editor Version 5.00 >3389.reg?RD!E E#p_j
echo. >>3389.reg}!TPO'p(R5dQ
echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server] >>3389.reg
echo "fDenyTSConnections"=dword:00000000 >>3389.regGGW2D*p
echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd\Tds\tcp] >>3389.reg
echo "PortNumber"=dword:00000d3d >>3389.reg
echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp] >>3389.regSg#C!z"y1]N^
echo "PortNumber"=dword:00000d3d >>3389.reg[/code]其中PortNumber是端口号,00000d3d为3389
IQ.X t [o+~/B
通过cmd下“ regedit /s "reg文件路径" ”进行reg文件导入
但是必须要重新启动,虽然已经表面上开启了+uYl"T9XJ
给一段比较好的代码,从众多代码中遴选出来的,具有较高的成功率,[color=red][b]基本上重启成功率达到100%[/b][/color]T3M f&x ME`q/KD&d G
vM4`/[/PcE P:GF\
重启bat代码[code]@ECHO OFF & cd/d %temp% & echo [version] > restart.inf|FG-zO!l{@Y
(set inf=InstallHinfSection DefaultInstall)
echo signature=$chicago$ >> restart.inf
echo [defaultinstall] >> restart.inf!a Q de|Jn,E
rundll32 setupapi,%inf% 1 %temp%\restart.inf[/code]如果安装有IIS,可以使用iisreset.exe 命令:iisreset /rebootl q.\ y3_q? z
重启之后就可以登陆了,而且不会出现错误
nWC u;F!H
====================================================
下面听好了,开始说说障碍;
面对很多的克隆版本操作系统,即使你成功开启了3389,但是你连接的时候会出现如图的情况
[attach]199[/attach]
这是为什么呢??其实答案很简单,就是在做系统封装的时候,为了减小程序的体积,有的程序就被删除或者忽略了,造成现在的无法连接3389(但是已经开启了),这要怎么办呢????9IIg]{aL
我们可以使用[color=red][b]devcon程序[/b][/color],有的系统已经把他包含在自己的内部命令中,如果没有也没关系,微软官方网站都有下载,复制到system32目录,就可以当作内部命令使用了。我们为什么要用他???就是因为精简版的系统中,系统的终端服务器设备重定向器没有正确安装,我们用devcon的目的就是对终端服务器设备重定向器进行恢复。
运行[code]devcon -r install %windir%\inf\machine.inf root\rdpdr[/code]成功执行,通过这种方法就可以解决上述问题L/n1t*\CM ip
[attach]200[/attach]_T_"N!\1U(|g
再说一种比较常见的方法,导入一个Reg文件[code] o.H^suX
Windows Registry Editor Version 5.00V-C$Du'~2J^c4e
[HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Enum\\Root\\RDPDR\\0000]
"ClassGUID"="{4D36E97D-E325-11CE-BFC1-08002BE10318}" z0S%L'GJc@&[F
"Class"="System"!\hZ8Q@e
"HardwareID"=hex(7):52,00,4f,00,4f,00,54,00,5c,00,52,00,44,00,50,00,44,00,52,\\3lU(M9F'C Ye2y^Q
00,00,00,00,00AeP*?,dKXM)^-E]
"Driver"="{4D36E97D-E325-11CE-BFC1-08002BE10318}\\\\0030"
"Mfg"="(标准系统设备)"
"Service"="rdpdr"
"DeviceDesc"="终端服务器设备重定向器"
"ConfigFlags"=dword:00000000
"Capabilities"=dword:00000000
0w1R&ww!r1G(K3y
[/code]对系统进行导入,但是问题又来了3T-z})d(Z/ls
进行注册表文件进行导入的时候就会出现问题
[attach]201[/attach]
进行reg的查看才知道,是因为相关的键值没有权限才会造成无法导入8b5RK?9D]yl&J
这里我推荐一个新的工具:Regini
相关的用法(regini /? 没有帮助)::|j|,@)C/k
[quote]
Regini Data [Options...]
Useful Options:
1 - Administrators Full Access
2 - Administrators Read Accessk5Nq-c/_1kd}$N
3 - Administrators Read and Write Access)^;npjsH2?%]
4 - Administrators Read, Write and Delete Access
5 - Creator Full Access
6 - Creator Read and Write Access2Y t]](_%B+^
7 - World Full Access
8 - World Read Access
9 - World Read and Write Access[_awC C
10 - World Read, Write and Delete Access
11 - Power Users Full Access
12 - Power Users Read and Write Access
13 - Power Users Read, Write and Delete Access
14 - System Operators Full Access4|(D)kI6{+`o
15 - System Operators Read and Write Access
16 - System Operators Read, Write and Delete Access"fh ~_1cN
17 - System Full Accessb5Q\(Sl)^R
18 - System Read and Write Access*oFxUk;y)f
19 - System Read Accessb/[&H/E;KA d3X o
20 - Administrators Read, Write and Execute AccessiCSp(U v^
21 - Interactive User Full Access
22 - Interactive User Read and Write Access
23 - Interactive User Read, Write and Delete Access
4}It8f!U/[9{
[/quote]u&v6VB \!^)Xj q
O&lds-zQ
data中为注册表的键值,通过这样的方法就可以提升键值为相关的权限,从而成功导入reg文件FXf,@#g
[attach]202[/attach] 能看懂!!
但是没有时间实践啊!!
还需努力!!!
柔柔深夜写作!
值得学习!!! 累死了,睡觉了.................
回复 1楼 柔肠寸断 的帖子
小柔,上面的批处理有点问题,代码的最后四行,2000还有XP&2003的都有问题![code] b~1Wn ^iecho "PortNumber"=dword:00000D3D >>2000.reg
echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp] >>2000.reg #N?7a#}r.~
echo "PortNumber"=dword:00000D3D >>2000.regWP+Yx8b&l@t#IPd/?
[/code][code]RHws V6g,S$Prs-bB
echo "PortNumber"=dword:00000d3d >>3389.reg