2024年1月11日发(作者:)

将以下代码复制到记事本另存为.bat文件

@ECHO OFF

cls

echo.

echo.

echo 1. 开启匿名访问 2.启用验证访问(需要输入用户名密码) 3.关闭共享 4.返回

echo.

echo.

set choice=

set /p choice= ● 请选择‖

if /i "%choice%"=="1" goto share1

if /i "%choice%"=="2" goto share2

if /i "%choice%"=="3" goto share3

if /i "%choice%"=="4" goto end

goto share

:share1

cls

net user Guest /active:yes

echo Windows Registry Editor Version 5.00 >

echo [HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsa] >>

echo "restrictanonymous"=dword:00000000 >>

echo [HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsa] >>

echo "restrictanonymous"=dword:00000000 >>

echo [HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsa] >>

echo "limitblankpassworduse"=dword:00000000 >>

echo [HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsa] >>

echo "limitblankpassworduse"=dword:00000000 >>

echo [HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsa] >>

echo "forceguest"=dword:00000001 >>

echo

[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerUserAssist{75048700-EF1F-11D0-9888-006097DEACF9}Count] >>

echo "HRZR_EHAPCY"=hex:0C,00,00,00,26,00,00,00,F0,FB,E5,52,64,95,C6,01 >>

echo "HRZR_EHAPCY:"P:",Jvaqbjf 防"=hex:0C,00,00,00,08,00,00,00,F0,FB,E5,52,64,95,C6,01 >>

火墙echo

[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSharedAccessParametersFirewallPolicyStandardProfileGloballyOpenPortsList] >>

echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@,-22005" >>

echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@,-22001" >>

echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@,-22002" >>

echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@,-22004" >> echo

[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSharedAccessEpoch] >>

echo "Epoch"=dword:000001ED >> echo

[HKEY_LOCAL_MACHINESYSTEMControlSet001ControlPrintProviders] >>

echo "LogonTime"=hex:E8,31,8E,4F,64,95,C6,01 >> echo

[HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesSharedAccessParametersFirewallPolicyStandardProfileGloballyOpenPortsList] >>

echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@,-22005" >>

echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@,-22001" >>

echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@,-22002" >>

echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@,-22004" >> echo

[HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesSharedAccessEpoch] >>

echo "Epoch"=dword:000001ED >>

regedit /s

del

echo.

echo.

echo √. 局域网匿名访问已开启ゞ

echo 注意:本机要重启后才会生效。

echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁

echo.

exit

//& goto logon

:end

goto logon

:share2

cls

net user Guest /active:no

echo Windows Registry Editor Version 5.00 >

echo [HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsa] >>

echo "restrictanonymous"=dword:00000000 >>

echo [HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsa] >>

echo "restrictanonymous"=dword:00000000 >>

echo [HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsa] >>

echo "limitblankpassworduse"=dword:00000000 >>

echo [HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsa] >>

echo "limitblankpassworduse"=dword:00000000 >>

echo [HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsa] >>

echo "forceguest"=dword:00000000 >>

echo

[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerUserAssist{75048700-EF1F-11D0-9888-006097DEACF9}Count] >>

echo "HRZR_EHAPCY"=hex:0C,00,00,00,26,00,00,00,F0,FB,E5,52,64,95,C6,01 >>

echo "HRZR_EHAPCY:"P:",Jvaqbjf 防火墙"=hex:0C,00,00,00,08,00,00,00,F0,FB,E5,52,64,95,C6,01 >> echo

[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSharedAccessParametersFirewallPolicyStandardProfileGloballyOpenPortsList] >>

echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@,-22005" >>

echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@,-22001" >>

echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@,-22002" >>

echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@,-22004" >> echo

[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSharedAccessEpoch] >>

echo "Epoch"=dword:000001ED >> echo

[HKEY_LOCAL_MACHINESYSTEMControlSet001ControlPrintProviders] >>

echo "LogonTime"=hex:E8,31,8E,4F,64,95,C6,01 >> echo

[HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesSharedAccessParametersFirewallPolicyStandardProfileGloballyOpenPortsList] >>

echo "445:TCP"="445:TCP:LocalSubNet:Enabled:@,-22005" >>

echo "137:UDP"="137:UDP:LocalSubNet:Enabled:@,-22001" >>

echo "138:UDP"="138:UDP:LocalSubNet:Enabled:@,-22002" >>

echo "139:TCP"="139:TCP:LocalSubNet:Enabled:@,-22004" >> echo

[HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesSharedAccessEpoch] >>

echo "Epoch"=dword:000001ED >>

regedit /s

del

echo.

echo.

echo √. 局域网验证访问已开启ゞ

echo 友情提示:无需重启,其它机现在就可以访问本机了。

echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁

echo.

exit

//& goto logon

:end

goto logon

:share3

cls

net user Guest /active:no

echo Windows Registry Editor Version 5.00 >

echo [HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsa] >>

echo "restrictanonymous"=dword:00000001 >>

echo [HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsa] >>

echo "restrictanonymous"=dword:00000001 >>

echo [HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsa] >>

echo "limitblankpassworduse"=dword:00000001 >>

echo [HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsa] >>

echo "limitblankpassworduse"=dword:00000001 >>

echo [HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsa] >>

echo "forceguest"=dword:00000001 >>

echo

[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerUserAssist{75048700-EF1F-11D0-9888-006097DEACF9}Count] >>

echo "HRZR_EHAPCY"=hex:0C,00,00,00,2A,00,00,00,90,AF,A4,87,A4,95,C6,01 >>

echo "HRZR_EHAPCY:"P:",Jvaqbjf 防火墙"=hex:0C,00,00,00,13,00,00,00,90,AF,A4,87,A4,95,C6,01

echo

"Seed"=hex:AC,6F,9A,2B,11,64,44,68,EC,90,1B,76,72,A7,0A,14,4C,79,37,BB,FD,BD,70,B2,B2,58,D5,B5,89,5C,B6,4E,3B,18,A5,26,46,BC,3E,6A,30,A4,7D,A0,56,E6,6A,B5,57,3A,BF,A1,CD,CA,B6,64,4C,F9,0E,D2,64,ED,86,1F,61,F6,D1,01,0B,7C,8D,BD,73,10,C8,4E,57,93,4E,90 >>o

[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSharedAccessParametersFirewallPolicyStandardProfileGloballyOpenPortsList] >>

echo "445:TCP"="445:TCP:LocalSubNet:Disabled:@,-22005" >>

echo "137:UDP"="137:UDP:LocalSubNet:Disabled:@,-22001" >>

echo "138:UDP"="138:UDP:LocalSubNet:Disabled:@,-22002" >>

echo "139:TCP"="139:TCP:LocalSubNet:Disabled:@,-22004" >> echo

[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSharedAccessEpoch] >>

echo "Epoch"=dword:000001FC >> echo

[HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesSharedAccessParametersFirewallPolicyStandardProfileGloballyOpenPortsList] >>

echo "445:TCP"="445:TCP:LocalSubNet:Disabled:@,-22005" >>

echo "137:UDP"="137:UDP:LocalSubNet:Disabled:@,-22001" >>

echo "138:UDP"="138:UDP:LocalSubNet:Disabled:@,-22002" >>

echo "139:TCP"="139:TCP:LocalSubNet:Disabled:@,-22004" >> echo

[HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesSharedAccessEpoch] >>

echo "Epoch"=dword:000001FC >>

regedit /s

del

echo.

echo.

echo √. 已关闭局域网共享ゞ

echo 友情提示:不必重启,设置已生效。

echo ▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁

echo.

exit

//& goto logon

>> echo

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyRNG] >>