Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).
Const ComputersList = "C:\sysadmin\CopyFilesPcList.txt" Const SourceFile = "C:\sysadmin\Isolations.url" Const TargetFolder = "C:sysadmin\" Const ReportFile = "C:\sysadmin\CopyFilesLog.txt" Dim objFSO : Set objFSO = CreateObject("Scripting.FileSystemObject") Dim objFile : Set objFile = objFSO.CreateTextFile (ReportFile) arrComputers = Split(objFSO.OpenTextFile(ComputersList).ReadAll, vbNewLine) For Each PC in arrComputers objFile.WriteLine "Attempting copy to " & PC On Error Resume Next objFSO.CopyFile SourceFile, "\\" & PC & "\" & Replace(TargetFolder, ":\","$\") If Err.Number <> 0 Then objFile.WriteLine vbTab & "Failed to copy to " & PC" Else objFile.WriteLine vbTab & "File successfully copied to " & PC End If On Error Goto 0 Next objFile.Close
Join the community of 500,000 technology professionals and ask your questions.
Connect with top rated Experts
9 Experts available now in Live!