Batch file gurus
-
- Posts: 22175
- Joined: Sun Oct 14, 2001 7:00 am
Batch file gurus
need some help. i'm looking to create a .bat file that will input characters within any given field that the cursor resides. for example, in the username field of a webpage.
any help or pointers appreciated.
any help or pointers appreciated.
-
- Posts: 22175
- Joined: Sun Oct 14, 2001 7:00 am
- FragaGeddon
- Posts: 3229
- Joined: Sun Sep 17, 2000 7:00 am
-
- Posts: 22175
- Joined: Sun Oct 14, 2001 7:00 am
- FragaGeddon
- Posts: 3229
- Joined: Sun Sep 17, 2000 7:00 am
-
- Posts: 22175
- Joined: Sun Oct 14, 2001 7:00 am
sorry, these devices use encryption keys per user, per device, so unauthorized drives will not work (users don't get thumb drives because there is no business need in this environment), but thanks again for the suggestion.FragaGeddon wrote:Well you can run keepass from a thumb drive. No need to install it. You might have to install it on another computer first. Then just copy the files over.
-
- Posts: 4108
- Joined: Sat Dec 14, 2002 8:00 am
assuming that it's for entering something on a particular webpage - does the form on the webpage only accept requests from POST or could you build a url and push the request through on GET?
what's the scope for bending the 3rd party rule - e.g. if you can create a batch file on the machine, what else can you do?
what's the scope for bending the 3rd party rule - e.g. if you can create a batch file on the machine, what else can you do?
-
- Posts: 22175
- Joined: Sun Oct 14, 2001 7:00 am
yeah, kinda what i figured, but thought i'd give it a shot.Tormentius wrote:The only way I know of is through WSH. AFAIK what you're looking for isn't possible with a simple batch file.
a webpage was just an example, but i'm not familiar enough with HTML to get very far with that idea.4days wrote:assuming that it's for entering something on a particular webpage - does the form on the webpage only accept requests from POST or could you build a url and push the request through on GET?
actually you can't create it on the tablets themselves, but they can grab it from a network folder with no problem.4days wrote:
what's the scope for bending the 3rd party rule - e.g. if you can create a batch file on the machine, what else can you do?
but they can't run an exe across the network? would they trust an MSI? you could make one that doesn't actually install anything but runs a custom action to call an external/embedded program. the embedded program being this app with the ability to input data.+JuggerNaut+ wrote:actually you can't create it on the tablets themselves, but they can grab it from a network folder with no problem.
without a much better idea of what it actually needs to do, it's hard/pointless to say - even if you had the freedom to install software on the tablet.
-
- Posts: 22175
- Joined: Sun Oct 14, 2001 7:00 am
it's sounding like much more trouble than it's worth rather than the lazy bastards just hammering it out on the V/keyboard or copying/pasting. i'm thinking i'm gonna lay this one to rest.4days wrote:but they can't run an exe across the network? would they trust an MSI? you could make one that doesn't actually install anything but runs a custom action to call an external/embedded program. the embedded program being this app with the ability to input data.+JuggerNaut+ wrote:actually you can't create it on the tablets themselves, but they can grab it from a network folder with no problem.
without a much better idea of what it actually needs to do, it's hard/pointless to say - even if you had the freedom to install software on the tablet.
i appreciate all the responses guys, thanks.
Can't you use something like autohotkey? You can make an exe with that which won't require users to have autohotkey installed. http://www.autohotkey.com/
Although I probably missed the entire point of discussion as I mostly skimmed it, and for that I appologize.
Although I probably missed the entire point of discussion as I mostly skimmed it, and for that I appologize.

-
- Posts: 4022
- Joined: Sat Mar 12, 2005 6:24 pm
If it's an internal website that you have access to, you could wrap it in an IFRAME and use some black JavaScript magic to fill in the fields, like this:
Code: Select all
window.frame['frameName'].document.forms['formName']['inputField'].value = 'Yet Another JavaScript Hacker';
-
- Posts: 4108
- Joined: Sat Dec 14, 2002 8:00 am
And if that site is listed via Group Policy as a trusted site the security in IE would probably let it work. Might be worth a shot.^misantropia^ wrote:If it's an internal website that you have access to, you could wrap it in an IFRAME and use some black JavaScript magic to fill in the fields, like this:Code: Select all
window.frame['frameName'].document.forms['formName']['inputField'].value = 'Yet Another JavaScript Hacker';
-
- Posts: 22175
- Joined: Sun Oct 14, 2001 7:00 am
i'll see if we can implement this, thanks.^misantropia^ wrote:If it's an internal website that you have access to, you could wrap it in an IFRAME and use some black JavaScript magic to fill in the fields, like this:Code: Select all
window.frame['frameName'].document.forms['formName']['inputField'].value = 'Yet Another JavaScript Hacker';
who's bypassing passwords? this is only for the login.bitWISE wrote:Why require a login/password if you want to bypass it? Restrict the website to a specific range of IPs and remove the login screen.