You must master the dos command line

A, ping   

  which is used to check whether the network or the network connection speed smooth command. As a network administrator living in or hackers, ping command is the first one must master the DOS command, using the principle is this: the machines on the network has a unique IP address is determined, we give goals IP address to send a packet, the person would return to a similar size data packets, according to the returned data packets we can determine the presence of the target host, can initially determine the target host operating system and so on. Here's a look at some of its commonly used operations. Take a look at the help it, in the DOS window, type: ping / Enter,?. Help screen shown. Here, we only have some basic parameters can be useful to the (same below).   

  -t said it will continuously send data packets to the target IP, until we force it to stop. Imagine, if you use 100M of broadband access, and the target IP is 56K kitten, then not be long before the target IP because so many can not afford data dropped, Oh, an attack on such a simple reality.   

  -l defines the size of the packets transmitted, default is 32 bytes, we can use it to define the maximum 65,500 bytes. Used in conjunction with the above description -t parameters together, there will be better results oh.   

  -n define the number of packets transmitted to the target IP, default is 3 times. If the network more slowly, 3 times for us have wasted a lot of time, because now our aim is only to determine whether there is target IP, then defined as a bar.   

  Explain, if used with the -t and -n parameters parameters, ping command to be placed behind the standard parameters, such as "ping IP -t -n 3", although used -t parameter, but not always go ping but only ping 3 times. In addition, ping command does not have to ping IP, or directly ping host domain name, so that you can get the host IP.   

  Here we give an example to illustrate the specific usage.   

  Here time = 2 represents the data sent to the packet received from the return packet with the time is 2 seconds, from here we can determine the size of the network connection speed. The return value from the TTL can be a preliminary judge ping host operating system, say "preliminary judgment" because this value can be modified. Here TTL = 32 represents the operating system may be win98.

  (Tips: If TTL = 128, it means that the target host may be Win2000; if TTL = 250, then the target host may be Unix)

  Regarding the use of ping command to quickly find local area network failure, you can quickly search the fastest QQ server, can others were ping attack ...... we all rely on these played a.   

Two, nbtstat   

  the command uses the TCP / NetBIOS over IP display protocol statistics and current TCP / IP connection, use this command you can get the remote host NETBIOS information such as user name, workgroup belongs, MAC address of the network card and so on. Here we have a need to know a few basic parameters.   

  -a use of this parameter, as long as you know the remote host machine name, you can get it NETBIOS information (below).   

  -A This parameter can also receive a remote host NETBIOS information, but you need to know its IP.

  -n lists the local machine's NETBIOS information.   

  While getting each other's IP or machine name of the time, you can use the nbtstat command to get further information on the other side, and this adds to our invasion of the insurance factor.   

Three, netstat

  This is a command used to view network status, easy operation and powerful.   

  -a view of all open ports on the local machine can effectively detect and prevent Trojan horse, to know the machine open information services, shown in Figure 4.   

  Here you can see the local machine and opening up FTP services, Telnet services, mail services, WEB services. Usage: netstat -a IP.

  -r lists the current routing information, tell us the local machine gateway, subnet mask, and other information. Usage: netstat -r IP.
Four, tracert

  trace routing information, use this command all the way to transfer data from the local machine to the target host through which can be identified, it is helpful to understand the network layout and structure for us. 5.   

  Data from the local machine described herein transferred to 192.168.0.1 machine, without any intermediate transit, the two machines is described in the same period of the LAN. Usage: tracert IP.   

Five, net   

  This command is a network command of the most important, it must be thoroughly mastered the usage of each sub-command, because its function is too strong, the best tool for this invasion is simply Microsoft has provided us. First, let's take a look at it all those sub-command, type net /? Enter shown in Figure 6.

  Here, we focus on the child to master a few common commands invasion.   

  net view   

  Use this command to view shared resources so the remote host. Command format for the net view \ IP.  

  net use

  the remote host alluding to a shared resource for the local drive letter, graphical interface easy to use, huh, huh. Command format for the net use x: \ IP \ sharename . The above represents the shared directory called magic 192.168.0.5IP alluding to the local Z-disk. The following representation and 192.168.0.7 the establishment of IPC $ connections (net use \ IP \ IPC $    "password" / user: "name"),

  After the establishment of the IPC $ connection, Oh, you can upload files: copy nc.exe \ 192.168.0.7 \ admin $ , it represents the local directory nc.exe reached the remote host, combined with the back to be introduced to the other DOS commands It can be achieved invaded.   

  net start

  Use it to start the service on the remote host. When you and the remote host to establish a connection, if you find it's what the service does not start, and you want to take advantage of this service how to do? On the use of this command to start it. Usage: net start servername, shown in Figure 9, the successful launch of the telnet service.   

  net stop

  invasion found a service out of the way the remote host, how do? Using this command stopped ok, usage and net start the same.   

  net user

  view and the account the relevant circumstances, including new accounts, delete accounts, view a specific account, activate the account, the account is disabled and so on. This is very beneficial to our invasion, and most importantly, it provides a premise we cloned an account. Type the net user without parameters, you can view all users, including the already disabled. The following are explanations.

  1, net user abcd 1234 / add , create a new user named abcd, the password for the 1234 account, the default for the user group members.

  2, net user abcd / del, the user name abcd the user to delete.

  3, net user abcd / active: no, the user name abcd the user to disable.

  4, net user abcd / active: yes, activate the user name abcd users.

  5, net user abcd, see the user's user name is abcd  

  net localgroup

  View all related information and user groups and related operations. Type net localgroup without parameters, that lists all current user groups. In the invasion process, we generally use it to upgrade to an account administrator for the group account, so we can use this account to control the whole of the remote host. Usage: net localgroup groupname username / add.   

  Now we have just added the new administrator user group abcd go, and this time abcd user is already a super administrator, Oh, you can then use the net user abcd to see his state, compare and 10 can be seen come out. But this is too obvious, a look at the user network management situation will be able to leak out flaws, so this method can only deal with rookie network, but we have to know. Now the means are the use of other tools and means to clone a network so that can not see the super administrator, this is something. Interested friends can refer to "hacker defense" "Deep resolve long account" a text on page 30.   

  net time

  this command to view the current time of the remote host. If your goal is just to enter inside the remote host, then perhaps less than the commands. But the simple invasion of success, do not just look at it? We need to further penetration. This is even the remote host needs to know the current time, because the use of time and other means (will be mentioned later) can achieve timing command and start a program, to lay the foundation for us to further invasion. Usage: net time \ IP.   

Six, at

the command of the role is to perform a specific command arrangements and procedures for a specific date or time (time is important to know the net, right?). When we know the current time, remote host, you can use this command to let a program and command execution at a later time (for example, two minutes). Usage: at time command \ computer.   

  It represents the 6:55 time-sharing, so that name to open the telnet service is a-01 computer (here is the open net start telnet service telnet command).   
Seven, ftp   

  we should be more familiar with this command, right? Many open ftp host on the network, much of it is anonymous, meaning that anyone can sign up. Now if you are swept into a service station open ftp host (usually port 21 opened the machine), if you do not use ftp command how to do? Here basic ftp command given method.

  First Enter the command line, type ftp, ftp prompt appears, this time you can type "help" to view help (any DOS commands can use this method to see its help).   

  We may see, so many commands how to use? In fact, with so much less than, master a few basic enough.   

  The first is the login process, which use to open, and directly enter the "open host IP ftp port" carriage return at the ftp prompt, usually the default port is 21, can not write. Followed by enter a valid user name and password login, and here to introduce anonymous ftp as an example.   

  User name and password are ftp, password is not displayed. When prompted **** logged in, it shows successful landing. Because here it is anonymous login, so users appear as Anonymous.   

  Next step is to introduce the use of a specific command.   

  DOS command dir with the same file for viewing the server, hit the carriage return dir, you can see the files on this ftp server.

  cd into a folder.

  get download the file to your local machine.

  put upload files to a remote server. That depends on whether the remote ftp server to your writable permissions, if you can, huh, how to use is not to say, we go to free play.

  delete delete files on remote ftp server. It must also ensure that you have permission to write.

  bye quit the current connection.

  quit Ibid.
  

Eight, telnet

  powerful remote login command, almost all of the invaders like to use it, time-tested. why? It is simple, like using their own machines, as long as you are familiar with DOS commands after a successful connection to a remote machine as administrator, you can use it to dry everything you wanted to do a. Here's how to use, first type telnet Enter, then type help to see its help.   

  Then at the prompt, type open IP carriage return, then appeared landing window, allows you to enter a valid user name and password, enter any password here, are not displayed.   

  When a user name and password are correct after the successful establishment of a telnet connection, this time you will have the same privileges and the user on the remote host, use DOS commands can achieve the things you want to do. Here I use the super administrator privileges landing.  

  Up to this point, the network introduced DOS command to come to an end, the purpose here is simply to introduce an impression rookie network, let the network know that familiar with and master the importance of DOS commands. In fact, and network-related DOS commands far more than that, but to stimulate here, hoping to help the majority of rookie network management. DOS learn a great help for a good network management, special master of some network DOS commands.

  In addition it should be clear that anyone who wants to enter the system, have to have a valid user name and password (input vulnerabilities it almost disappeared), even if you only get a very small account permissions, you can also use it to to achieve the final goal. So resolutely eliminate empty password to your account plus a strong password, it is the best method of defense invasion weak passwords.

  Finally, sincerely say, it is the most important to develop good safety awareness.

=========================================
Start → Run → Command highlights
winver-- ------- check the Windows version
wmimgmt.msc ---- open windows management architecture (WMI)
wupdmgr -------- windows update
wscript -------- windows script host settings
write ---------- WordPad
winmsd --------- system information
wiaacmgr ------- scanner and camera Wizard
winchat -------- XP comes LAN chat

mem.exe -------- display memory usage
the Msconfig.exe --- system configuration utility
mplayer2 ------- simple Media Player Widnows
mspaint in the drawing board --------
mstsc ---------- remote Desktop connection
mplayer2 ------- media player
magnify -------- Magnifier utility
mmc ------------ open the console
mobsync -------- synchronization command

dxdiag --------- inspection DirectX information
drwtsn32 ------ system Doctor
devmgmt.msc --- device Manager
dfrg.msc ------- disk Defragmenter
diskmgmt.msc --- disk management utility
dcomcnfg ----- - open the system component services
ddeshare ------- open DDE sharing settings
dvdplay -------- DVD player

net stop messenger ----- stop messenger service
net start messenger ---- start messenger services
notepad -------- open Notepad
nslookup ------- network management tools guide
ntbackup ------- system backup and restore
narrator ------- screen "Narrator "
ntmsmgr.msc ---- Removable storage Manager
ntmsoprq.msc --- removable storage administrator operation requests
netstat -an ---- (TC) commands to check the interface

syncapp -------- create a briefcase
sysedit -------- System Configuration Editor
sigverif ------- file signature verification process
sndrec32 ------- recorder
shrpubw -------- create a shared folder
secpol.msc ----- local security policy
syskey --------- system encryption, encryption can not be solved once, double password protection windows xp system
services.msc --- local service set
Sndvol32 ----- - volume control
sfc.exe -------- system file checker
sfc / scannow --- windows file protection

tsshutdn ------- 60 second countdown shutdown command
tourstart ------ xp Introduction (roaming xp program after installation is complete)
taskmgr -------- task Manager

eventvwr ------- event Viewer
eudcedit ------- Private Character Editor
explorer ---- --- open Explorer


packager ------- Object Packager
perfmon.msc ---- computer performance monitoring procedures
progman -------- program Manager

regedit.exe ---- registry
rsop.msc ------- group Resultant set of policy
regedt32 ------- Registry Editor
rononce -p ---- 15 seconds off
regsvr32 / u * .dll ---- dll file to stop running
regsvr32 / u zipfldr.dll ------ ZIP canceled support

cmd.exe -------- CMD command prompt
chkdsk.exe ----- Chkdsk disk check
certmgr.msc ---- certificate management utility
calc ----------- start calculator
charmap -------- start character map
cliconfg ------- SQL SERVER client network utility
Clipbrd -------- clipboard Viewer
conf ----- ------ start NetMeeting
compmgmt.msc computer management ---
cleanmgr ------- garbage sorting
ciadv.msc ------ indexing service program

osk ----------- - open the keyboard
odbcad32 ------- ODBC data source administrator
oobe / msoobe / a ---- XP checks whether to activate
lusrmgr.msc ---- native user and group
logoff ------- - logout command


iexpress ------- Trojans bundled tools, the system comes

Nslookup ------- IP address detector

fsmgmt.msc ----- Shared Folder Manager

utilman -------- Utility Manager

gpedit.msc ----- Group Policy

Reproduced in: https: //www.cnblogs.com/majinyu/archive/2009/06/29/1513052.html

Guess you like

Origin blog.csdn.net/weixin_34268843/article/details/93666470