Lou*_*eru 81 windows ntfs symbolic-link
有没有办法查看 Windows 机器上所有活动符号链接的列表?
我已经接受了@JoachimOtahal 的答案,因为它可以在一秒钟内起作用,并且我认为在提出问题时提供了我需要的东西。
C:\Windows\System32> cmd /E /C "prompt $T$$ & echo.%TIME%$ & dir /AL /S C:\ | find "SYMLINK" & for %Z in (.) do rem/ "
22:01:17.00$
06/05/2021 08:26 AM <SYMLINKD> All Users [C:\ProgramData]
06/14/2021 04:57 PM <SYMLINK> DEFAULTUSER_BASE [C:\ProgramData\Microsoft\Windows\Containers\BaseImages\40caa4df-ced5-4c45-99a3-7e2bc561dafb\BaseLayer\Files\Windows\System32\Config\DEFAULT]
06/14/2021 04:57 PM <SYMLINK> SAM_BASE [C:\ProgramData\Microsoft\Windows\Containers\BaseImages\40caa4df-ced5-4c45-99a3-7e2bc561dafb\BaseLayer\Files\Windows\System32\Config\SAM]
06/14/2021 04:57 PM <SYMLINK> SECURITY_BASE [C:\ProgramData\Microsoft\Windows\Containers\BaseImages\40caa4df-ced5-4c45-99a3-7e2bc561dafb\BaseLayer\Files\Windows\System32\Config\SECURITY]
06/14/2021 04:57 PM <SYMLINK> SOFTWARE_BASE [C:\ProgramData\Microsoft\Windows\Containers\BaseImages\40caa4df-ced5-4c45-99a3-7e2bc561dafb\BaseLayer\Files\Windows\System32\Config\SOFTWARE]
06/14/2021 04:57 PM <SYMLINK> SYSTEM_BASE [C:\ProgramData\Microsoft\Windows\Containers\BaseImages\40caa4df-ced5-4c45-99a3-7e2bc561dafb\BaseLayer\Files\Windows\System32\Config\SYSTEM]
06/14/2021 04:57 PM <SYMLINK> DEFAULTUSER_BASE [C:\ProgramData\Microsoft\Windows\Containers\BaseImages\40caa4df-ced5-4c45-99a3-7e2bc561dafb\BaseLayer\Files\Windows\System32\Config\DEFAULT]
06/14/2021 04:57 PM <SYMLINK> SAM_BASE [C:\ProgramData\Microsoft\Windows\Containers\BaseImages\40caa4df-ced5-4c45-99a3-7e2bc561dafb\BaseLayer\Files\Windows\System32\Config\SAM]
06/14/2021 04:57 PM <SYMLINK> SECURITY_BASE [C:\ProgramData\Microsoft\Windows\Containers\BaseImages\40caa4df-ced5-4c45-99a3-7e2bc561dafb\BaseLayer\Files\Windows\System32\Config\SECURITY]
06/14/2021 04:57 PM <SYMLINK> SOFTWARE_BASE [C:\ProgramData\Microsoft\Windows\Containers\BaseImages\40caa4df-ced5-4c45-99a3-7e2bc561dafb\BaseLayer\Files\Windows\System32\Config\SOFTWARE]
06/14/2021 04:57 PM <SYMLINK> SYSTEM_BASE [C:\ProgramData\Microsoft\Windows\Containers\BaseImages\40caa4df-ced5-4c45-99a3-7e2bc561dafb\BaseLayer\Files\Windows\System32\Config\SYSTEM]
05/22/2021 09:02 AM <SYMLINKD> All Users [C:\ProgramData]
06/14/2021 04:57 PM <SYMLINK> DEFAULTUSER_BASE [C:\ProgramData\Microsoft\Windows\Containers\BaseImages\40caa4df-ced5-4c45-99a3-7e2bc561dafb\BaseLayer\Files\Windows\System32\Config\DEFAULT]
06/14/2021 04:57 PM <SYMLINK> SAM_BASE [C:\ProgramData\Microsoft\Windows\Containers\BaseImages\40caa4df-ced5-4c45-99a3-7e2bc561dafb\BaseLayer\Files\Windows\System32\Config\SAM]
06/14/2021 04:57 PM <SYMLINK> SECURITY_BASE [C:\ProgramData\Microsoft\Windows\Containers\BaseImages\40caa4df-ced5-4c45-99a3-7e2bc561dafb\BaseLayer\Files\Windows\System32\Config\SECURITY]
06/14/2021 04:57 PM <SYMLINK> SOFTWARE_BASE [C:\ProgramData\Microsoft\Windows\Containers\BaseImages\40caa4df-ced5-4c45-99a3-7e2bc561dafb\BaseLayer\Files\Windows\System32\Config\SOFTWARE]
06/14/2021 04:57 PM <SYMLINK> SYSTEM_BASE [C:\ProgramData\Microsoft\Windows\Containers\BaseImages\40caa4df-ced5-4c45-99a3-7e2bc561dafb\BaseLayer\Files\Windows\System32\Config\SYSTEM]
02/26/2021 03:15 AM <SYMLINKD> Downloads [E:\Downloads\]
22:01:38.69$ rem/
Run Code Online (Sandbox Code Playgroud)
Ind*_*rek 116
尝试以下命令:
dir /AL /S C:\
Run Code Online (Sandbox Code Playgroud)
/A显示具有特定属性的所有文件,并L指定重解析点(符号链接和目录连接)/S 使命令递归C:\为您要扫描的驱动器号,或者如果您不想扫描整个驱动器,则替换为路径nix*_*xda 26
Get-ChildItem -Path C:\ -Force -Recurse -ErrorAction 'silentlycontinue' |
Where { $_.Attributes -match "ReparsePoint"}
Run Code Online (Sandbox Code Playgroud)
-Force 包括隐藏文件和系统文件-Recurse 获取所有子项-ErrorAction 'silentlycontinue'抑制对路径 XYZ 的访问被拒绝错误Where { $_.Attributes -match "ReparsePoint"}检查文件夹和文件是否是连接点模式和属性说明†:
PS > GCI | SELECT Mode,Attribuets -Unique
Mode Attributes
---- ----------
d---- Directory
d---s System, Directory
d---- Directory, NotContentIndexed
d---- Directory, Compressed
la--- Archive
-a--- Archive
lar-- ReadOnly, Archive
-a--- Archive, Compressed
Run Code Online (Sandbox Code Playgroud)
小智 12
$_.Linktype 缺少符号链接。$_.Attributes 缺少硬链接。两个属性中均列出了交汇点。- 需要强制,否则会跳过隐藏的符号链接。\n获取符号链接、连接点和硬链接的完整工作示例:
\nGet-ChildItem -Path "C:\\Windows\\","c:\\","$env:USERPROFILE" -Force |\n Where-Object { $_.LinkType -ne $null -or $_.Attributes -match "ReparsePoint" } |\n ft FullName,Length,Attributes,Linktype,Target\nRun Code Online (Sandbox Code Playgroud)\n输出看起来像这样 - 在我的例子中,我做了一个连接只是为了展示它应该是什么样子。请注意:PS 仍然有一个错误,未显示符号链接的目标,请检查此以获取更多信息:https ://stackoverflow.com/questions/16926127/powershell-to-resolve-junction-target-path
\nPS D:\\> Get-ChildItem -Path "C:\\Windows\\","c:\\","$env:USERPROFILE" -Force |\n Where-Object { $_.LinkType -ne $null -or $_.Attributes -match "ReparsePoint" } |\n ft FullName,Length,Attributes,Linktype,Target\n\n\nFullName Length Attributes LinkType Target \n-------- ------ ---------- -------- ------ \nC:\\Windows\\bfsvc.exe 79360 Archive HardLink {C:\\Windows\\WinSxS\\amd64_microsoft-windows-b..vironment-servicing_31bf3856ad364e35_10.0.17763.1518_no...\nC:\\Windows\\DfsrAdmin.exe 232960 Archive HardLink {C:\\Windows\\WinSxS\\msil_dfsradmin_31bf3856ad364e35_10.0.17763.529_none_86a482ce47ce0e6b\\DfsrAdmin.exe...\nC:\\Windows\\explorer.exe 4389168 Archive HardLink {C:\\Windows\\WinSxS\\amd64_microsoft-windows-explorer_31bf3856ad364e35_10.0.17763.1911_none_9f01b4994bb...\nC:\\Windows\\HelpPane.exe 1072128 Archive HardLink {C:\\Windows\\WinSxS\\amd64_microsoft-windows-help-client_31bf3856ad364e35_10.0.17763.1911_none_b9659da9...\nC:\\Windows\\hh.exe 18432 Archive HardLink {C:\\Windows\\WinSxS\\amd64_microsoft-windows-htmlhelp_31bf3856ad364e35_10.0.17763.1697_none_15caed9d569...\nC:\\Windows\\mib.bin 43131 Archive HardLink {C:\\Windows\\WinSxS\\amd64_microsoft-windows-snmp-mgmt-api_31bf3856ad364e35_10.0.17763.1_none_dc5249570...\nC:\\Windows\\notepad.exe 254464 Archive HardLink {C:\\Windows\\WinSxS\\amd64_microsoft-windows-notepad_31bf3856ad364e35_10.0.17763.1697_none_bc8f846641e0...\nC:\\Windows\\regedit.exe 357888 Archive HardLink {C:\\Windows\\WinSxS\\amd64_microsoft-windows-registry-editor_31bf3856ad364e35_10.0.17763.1697_none_41a3...\nC:\\Windows\\splwow64.exe 133632 Archive HardLink {C:\\Windows\\WinSxS\\amd64_microsoft-windows-printing-spooler-core_31bf3856ad364e35_10.0.17763.1697_non...\nC:\\Windows\\twain_32.dll 64512 Archive HardLink {C:\\Windows\\WinSxS\\wow64_microsoft-windows-w..ion-twaincomponents_31bf3856ad364e35_10.0.17763.1_none_...\nC:\\Windows\\WindowsShell.Manifest 670 ReadOnly, Hidden, Archive HardLink {C:\\Windows\\WinSxS\\amd64_microsoft-windows-shell32_31bf3856ad364e35_10.0.17763.1_none_5cef14c36a2559b...\nC:\\Windows\\winhlp32.exe 11776 Archive HardLink {C:\\Windows\\WinSxS\\wow64_microsoft-windows-winhstb_31bf3856ad364e35_10.0.17763.1_none_2420a29095f0ffc...\nC:\\Windows\\WMSysPr9.prx 316640 Archive HardLink {C:\\Windows\\WinSxS\\amd64_microsoft-windows-mediaplayer-wmvsdk_31bf3856ad364e35_10.0.17763.1_none_96f1...\nC:\\Windows\\write.exe 11264 Archive HardLink {C:\\Windows\\WinSxS\\amd64_microsoft-windows-write_31bf3856ad364e35_10.0.17763.1_none_5048bc153541494b\\...\nC:\\BackupPlatte Directory, ReparsePoint Junction {Volume{6072e7bc-2cae-11e9-b57a-bc5ff4e5c991}\\} \nC:\\Dokumente und Einstellungen Hidden, System, Directory, ReparsePoint, NotContentIndexed \nC:\\Programme Hidden, System, Directory, ReparsePoint, NotContentIndexed \nC:\\Users\\Administrator\\Anwendungsdaten Hidden, System, Directory, ReparsePoint, NotContentIndexed \nC:\\Users\\Administrator\\Cookies Hidden, System, Directory, ReparsePoint, NotContentIndexed \nC:\\Users\\Administrator\\Druckumgebung Hidden, System, Directory, ReparsePoint, NotContentIndexed \nC:\\Users\\Administrator\\Eigene Dateien Hidden, System, Directory, ReparsePoint, NotContentIndexed \nC:\\Users\\Administrator\\Lokale Einstellungen Hidden, System, Directory, ReparsePoint, NotContentIndexed \nC:\\Users\\Administrator\\Netzwerkumgebung Hidden, System, Directory, ReparsePoint, NotContentIndexed \nC:\\Users\\Administrator\\Recent Hidden, System, Directory, ReparsePoint, NotContentIndexed \nC:\\Users\\Administrator\\SendTo Hidden, System, Directory, ReparsePoint, NotContentIndexed \nC:\\Users\\Administrator\\Startmen\xc3\xbc Hidden, System, Directory, ReparsePoint, NotContentIndexed \nC:\\Users\\Administrator\\Vorlagen Hidden, System, Directory, ReparsePoint, NotContentIndexed \nRun Code Online (Sandbox Code Playgroud)\n简单的 mod 可以深入了解我在 ( -and $_.Length -eq 1) Powershell 7 +的搜索中的情况:
PS > Get-ChildItem -Path "C:\\Windows\\","c:\\","$env:USERPROFILE" -Force |\n Where-Object { $_.LinkType -ne $null -or $_.Attributes -match "ReparsePoint" -and $_.Length -eq 1 } |\n ft FullName,Attributes,Linktype,Target\n\nFullName Attributes LinkType Target\n-------- ---------- -------- ------\nC:\\Documents and Settings Hidden, System, Directory, ReparsePoint, NotContentIndexed\nC:\\Users\\Louis\\Application Data Hidden, System, Directory, ReparsePoint, NotContentIndexed\nC:\\Users\\Louis\\Cookies Hidden, System, Directory, ReparsePoint, NotContentIndexed\nC:\\Users\\Louis\\Downloads Directory, ReparsePoint SymbolicLink {E:\\Downloads\\}\nC:\\Users\\Louis\\iCloudDrive ReadOnly, Directory, Archive, ReparsePoint {}\nC:\\Users\\Louis\\Local Settings Hidden, System, Directory, ReparsePoint, NotContentIndexed\nC:\\Users\\Louis\\My Documents Hidden, System, Directory, ReparsePoint, NotContentIndexed\nC:\\Users\\Louis\\NetHood Hidden, System, Directory, ReparsePoint, NotContentIndexed\nC:\\Users\\Louis\\PrintHood Hidden, System, Directory, ReparsePoint, NotContentIndexed\nC:\\Users\\Louis\\Recent Hidden, System, Directory, ReparsePoint, NotContentIndexed\nC:\\Users\\Louis\\SendTo Hidden, System, Directory, ReparsePoint, NotContentIndexed\nC:\\Users\\Louis\\Start Menu Hidden, System, Directory, ReparsePoint, NotContentIndexed\nC:\\Users\\Louis\\Templates Hidden, System, Directory, ReparsePoint, NotContentIndexed\nRun Code Online (Sandbox Code Playgroud)\n
小智 5
我知道这个答案已经晚了,但这里可能更接近您可能正在寻找的内容:
dir /AL /S C:\ | find "SYMLINK"
Run Code Online (Sandbox Code Playgroud)
| 归档时间: |
|
| 查看次数: |
151343 次 |
| 最近记录: |