Solved

VB Script to ask for input where a file name would go

Posted on 2013-10-25
13
232 Views
Last Modified: 2013-11-18
My company is working on creating RSA tokens for Android.  In order to create the token we go through the whole process of creating from the server but then we have to download and convert the token using an application and command-line.  

I need assistance in creating a script that will allow me to enter the token name instead of having to type in the whole command everytime.

Command:

TokenConverter "FILENAME.sdtid" -android  -o tokenfile.txt

I would like the script to run this command but prompt for the Filename.sdtid so that it can be entered and then processed.

I'm new to scripting so I'm not even sure where to begin with this.

Any assistance would be appreciated.
0
Comment
Question by:MacGyver80
  • 8
  • 2
  • 2
13 Comments
 
LVL 14

Expert Comment

by:ThomasMcA2
Comment Utility
Which OS is this? In Windows, you can create a small batch file, like this:

@echo off

TokenConverter "%1" -android  -o tokenfile.txt

Open in new window


That %1 gets replaced with the first parameter that gets passed to the batch file. So if you name the batch file mycvt.bat, your conversion command becomes:

mycnv FILENAME.sdtid

Open in new window

0
 
LVL 3

Author Comment

by:MacGyver80
Comment Utility
It's Windows 7, so even a Powershell or VB would be helpful
0
 
LVL 3

Author Comment

by:MacGyver80
Comment Utility
So I took the first script and made it in to a batch file, named it ConvertMyToken.bat.  Then, I took the 2nd and made it in to a bacth file and named it mycnv.bat.  I then launched the ConvertMyToken.bat and a command prompt appeared and then immediately closed.
0
 
LVL 3

Author Comment

by:MacGyver80
Comment Utility
This is what I started off using:

@echo off
c:\Token_Converter\TokenConverter TokenName.sdtid -android -o tokenfile.txt

But if I can get it to prompt for the token name instead of me having to put it in to the actual script every time it would save a lot of time.
0
 
LVL 14

Expert Comment

by:ThomasMcA2
Comment Utility
You don't have to put it in the script. My version uses %1, which gets replaced by the 1st parm from the command line. So this script:

TokenConverter "%1" -android  -o tokenfile.txt

Open in new window


when it is run like this:

mycnv FILENAME.sdtid

Open in new window


actually runs like this

TokenConverter "FILENAME.sdtid" -android  -o tokenfile.txt
0
 
LVL 3

Author Comment

by:MacGyver80
Comment Utility
Forgive my lack of knowledge with scripting but I'm lost.  Are you saying all I have to put in to the batch file is

1: echo off
2:
3: TokenConverter "%1" -android -o tokenfile.txt

because it doesn't work.  It will open a the command prompt very quickly and then close without doing anything.
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 
LVL 68

Assisted Solution

by:Qlemo
Qlemo earned 500 total points
Comment Utility
If you use the method shown by ThomasMcA2, you'll need to open a command prompt, change to the folder the script and files are, and type the line
   mycnv FILENAME.sdtid
Of course you can also hard-code paths to script and files, if you want to have them in different folders.

However, as I read it, you want to click on the script, and have it ask for the filename:
@echo off
set /p sdtid=Please provide filename without extension
TokenConvert %sdtid%.sdtid -android -o tokenfile.txt

Open in new window

You could also use that to create differently named output files:
@echo off
set /p sdtid=Please provide filename without extension
TokenConvert %sdtid%.sdtid -android -o %sdtid%.txt

Open in new window

You can also hard-code the paths to TokenConvert and/or the files again.
0
 
LVL 3

Accepted Solution

by:
MacGyver80 earned 0 total points
Comment Utility
I actually wanted it to be a VBS but ended up going with a batch file.  Pretty much did some major searching on the web and came up with the following:

@echo off
set /p TokenName=Enter Token path and name or Drag token in to this window:
set /p User=Enter Username:
set /p Password=Enter Token Password Specified for Token in RSA:
T:\IT\IT-Installation\RSA_TokenConverter_Droid\TokenConverterFiles_DO_NOT_TOUCH\TokenConverter %TokenName% -p %Password% -android -o T:\IT\IT-Installation\RSA_TokenConverter_Droid\TokenURLs\%User%.txt
echo Creating and opening Token Output for %User%
echo Output location T:\IT\IT-Installation\RSA_TokenConverter_Droid\TokenURLs\%User%.txt
echo Token URL is being displayed. Close text file, then close this window...
echo **Note** When this window is closed the text file with the URL will be deleted...
T:\IT\IT-Installation\RSA_TokenConverter_Droid\TokenURLs\%User%.txt
pause
del T:\IT\IT-Installation\RSA_TokenConverter_Droid\TokenURLs\%User%.txt
0
 
LVL 3

Author Comment

by:MacGyver80
Comment Utility
I've requested that this question be closed as follows:

Accepted answer: 0 points for MacGyver80's comment #a39642483

for the following reason:

I found the information myself and compiled the bat file in to an .EXE
0
 
LVL 68

Expert Comment

by:Qlemo
Comment Utility
Objection:
Your posted solution might be what you used in the end, but never asked for. The similarity to what I've posted (and my posted being a direct response to your request as defined last), I cannot accept your final disposition. We can't help you with something you don't tell us, and what you have got was the best we could do under that circumstances.
0
 
LVL 3

Author Comment

by:MacGyver80
Comment Utility
I've requested that this question be deleted for the following reason:

Found the answer myself through web searching
0
 
LVL 3

Author Closing Comment

by:MacGyver80
Comment Utility
Thanks for the suggestions Qlemo. I was able to expand very much based off of that.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

This tutorial will discuss the log-in process using WhizBase. In this article I assume you already know HTML. I will write the code using WhizBase Server Pages, so you need to know some basics in WBSP (you might look at some of my other articles abo…
It is a general practice to get rid of old user profiles on a computer  in a LAN environment. As I have been working with a company in a LAN environment where users move from one place to some other place at times. This will make many user profil…
This tutorial will teach you the core code needed to finalize the addition of a watermark to your image. The viewer will use a small PHP class to learn and create a watermark.
In this fifth video of the Xpdf series, we discuss and demonstrate the PDFdetach utility, which is able to list and, more importantly, extract attachments that are embedded in PDF files. It does this via a command line interface, making it suitable …

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now