标题:
[网络连接]
bat可以制作自动打开网址,输入密码吗?
[打印本页]
作者:
李超
时间:
2023-5-3 02:50
标题:
bat可以制作自动打开网址,输入密码吗?
想自动登入一个网站,自已跳转页面,并选择
作者:
Batcher
时间:
2023-5-3 09:27
回复
1#
李超
不同的网站,不同的方法。建议给出你需要登录的真实网站地址。
作者:
jyswjjgdwtdtj
时间:
2023-5-3 09:40
试试vbs?(只能ie)
作者:
apeng1
时间:
2023-5-3 19:59
是的,可以使用bat来实现自动打开网址,并输入密码的操作。需要注意的是,这种方法并不安全,因为密码是以明文形式存储在bat文件中的。
以下是一个示例代码,可以打开Chrome浏览器并自动输入用户名和密码进行登录:
@echo off
set url=https://www.example.com/login
set username=your_username
set password=your_password
start chrome %url%
ping localhost -n 3 > nul
echo.Set oShell = CreateObject("WScript.Shell") > temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.oShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.oShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.oShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.oShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.oShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.oShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.oShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.oShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.oShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.oShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.oShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.oShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.oShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.oShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.oShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.oShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.Set objShell = CreateObject("WScript.Shell") >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 1000 >> temp.vbs
echo.objShell.SendKeys "%{DOWN}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "{ENTER}" >> temp.vbs
echo.WScript.Sleep 1500 >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "%{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys %username% >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "{TAB}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys %password% >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
echo.objShell.SendKeys "{ENTER}" >> temp.vbs
echo.WScript.Sleep 500 >> temp.vbs
cscript temp.vbs
del temp.vbs > nul
```
在上面的代码示例中,将网址、用户名和密码替换为实际的值。代码中使用了ping命令和VBS脚本来实现等待网页完全加载的操作,并通过SendKeys方法自动输入用户名和密码。最后,使用del命令删除生成的临时vbs文件。
需要注意的是,此脚本仅适用于Windows操作系统,并且需要安装Chrome浏览器。并且,这种方法不安全,因为密码以明文形式存储在bat文件中,在使用公共设备时请谨慎操作。
作者:
jyswjjgdwtdtj
时间:
2023-5-3 20:15
回复
4#
apeng1
怎么能用sendkeys呢 你在害人
作者:
dos-a
时间:
2023-5-3 21:52
他这个应该是gpt给的
作者:
jyswjjgdwtdtj
时间:
2023-5-3 22:05
回复
6#
dos-a
别人说chatgpd的写代码能力在下降是真的
还说“因为密码是以明文形式存储在bat文件中的”危险 我看sendkeys自己最危险
欢迎光临 批处理之家 (http://www.bathome.net/)
Powered by Discuz! 7.2