Solved

Stinger & Login Script

Posted on 2004-10-01
10
1,038 Views
Last Modified: 2008-02-01
Hi

I don't know if it's the right section ;-)

I will user NAI's stinger within a login script. My question is how to handle the log files. Stinger allows with it's options to run it in silent mode (no user interaction) and with creating a log file. But the file is always called stinger.txt. How can i script that stinger creates a file like %computername%.txt - so i can find my most infected clients by checking the file size. My antivirus solution is trendmicro officescan - but some worms or trojans aren't detected by this. stinger does ....

Any ideas?
0
Comment
Question by:dipich
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
  • 2
  • +1
10 Comments
 
LVL 4

Expert Comment

by:ferg-o
ID: 12205208
Try NAI support. Not trying to diss you but they have answers to these questions.

Rgds.
0
 
LVL 4

Expert Comment

by:itcnbwise
ID: 12207289
Write a batch file that runs after stinger in your login script.  Then try this line:

rename stinger.txt <computername>.txt

0
 
LVL 23

Accepted Solution

by:
Tim Holman earned 125 total points
ID: 12208322
This script should do the trick:

c:\stinger /go /adl /log /silent
ren c:\stinger.txt %computername%.txt


0
Watch Anatomy of a Wi-Fi Hack On-Demand

In less than a weekend, anyone with Internet access and some free time can become a Wi-Fi MitM to wreak havoc on your network. View our Wi-Fi Expert in an on-demand episode of our Secure Wi-Fi mini-series as he explores the motives, execution, and anatomy of a Wi-Fi hack.

 
LVL 4

Expert Comment

by:itcnbwise
ID: 12208346
That's what I posted.  You just changed "rename" to "ren".
0
 

Author Comment

by:dipich
ID: 12208434
Thanks

I'll try this script on monday. I hope it works - because stinger takes a lot of time. How will a batch file handel if this takes a few minutes?

@echo off
copy \\server\share\stinger.exe c:\
c:\stinger /go /adl /log /silent
ren c:\stinger.txt %computername%.txt
copy %computername%.txt \\server\share\logs\
del stinger.exe
del %computername%.txt

0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 12212660
> That's what I posted.  You just changed "rename" to "ren".

No it wasn't - you missed out the % on either end of computername....  ;)



0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 12212676
Also, you need %%, not % in your batch file for it to work...

for example:

ren c:\stinger.txt %%computername%%.txt
0
 

Author Comment

by:dipich
ID: 12247958
Hi Guys

teh first scripts failed - but nuw it works.

and my working script looks like the following one :

@echo off
c:
copy \\server\stinger$\stinger.exe c:\
c:\stinger.exe /go /adl /log /silent
ren c:\stinger.txt %computername%.txt
copy %computername%.txt \\server\stinger$
del c:\stinger.exe
del c:\%computername%.txt

this is an onw script called in my loginscript.

have a try
0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

OnPage: Incident management and secure messaging on your smartphone
If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question