Record the batch bat of 3389 remote desktop IP every time

Time:2020-6-20

Copy the following code and save it as a batch file. Double click it!

Copy codeThe code is as follows:
MD C:\WINDOWS\PDPLOG
echo date /t ^>^>RDPlog.txt >>C:\WINDOWS\PDPLOG\PdPLOG.CMD
echo time /t ^>^>RDPlog.txt >>C:\WINDOWS\PDPLOG\PdPLOG.CMD
echo netstat -n -p tcp ^| find “:3389“^>^>RDPlog.txt >>C:\WINDOWS\PDPLOG\PdPLOG.CMD
echo start Explorer >>C:\WINDOWS\PDPLOG\PdPLOG.CMD

:: add the IP used by the user to automatically record when entering the remote desktop, which can be used to find the trace of hackers!
REG ADD “HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\WinStations\RDP-Tcp” /v fInheritInitialProgram /t REG_DWORD /d “00000000” /f
REG ADD “HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\WinStations\RDP-Tcp” /v WorkDirectory /t REG_SZ /d C:\WINDOWS\PDPLOG\ /f
REG ADD “HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\WinStations\RDP-Tcp” /v InitialProgram /t REG_SZ /d “C:\WINDOWS\PDPLOG\PdPLOG.CMD” /f
REG ADD “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp” /v fInheritInitialProgram /t REG_DWORD /d “00000000” /f
REG ADD “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp” /v WorkDirectory /t REG_SZ /d C:\WINDOWS\PDPLOG\ /f
REG ADD “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp” /v InitialProgram /t REG_SZ /d “C:\WINDOWS\PDPLOG\PdPLOG.CMD” /f

Echo record remote desktop IP Policy added! Please press any key to exit!
PAUSE >nul

echo netstat -n -p tcp ^| find “:3389″^>^>RDPlog.txt >>C:\WINDOWS\PDPLOG\PdPLOG.CMD
There is a 3389 number in the above sentence, which is the default port of remote desktop.
If you change a friend of your remote desktop, you need to replace 3389 with the port you changed.

The place to view the records is C: \ windows \ pdplog\ RDPlog.txt