A computer expert must know eight most commonly used computer commands

Source: Internet
Author: User
Tags anonymous current time ftp remote ftp server

First, nbtstat

This command uses TCP/IP on Denetbios to display protocol statistics and current TCP/IP connections, using this command you can get remote host Denetbios information, such as user name, the de workgroup, network card DEMAC address, etc. Here we need to know a few basic de parameters.

-A Use this parameter, as long as you know the remote host de machine name, you can get it Denetbios information (hereinafter).

-A This parameter can also get remote host Denetbios information, but need you to know it deip.

-N lists local machine Denetbios information.

When you get the other Deip or machine name DE, you can use the nbtstat command to further get the other de information, which adds to our intrusion de safety factor.

Second, Ping

It is used to check whether the network is unobstructed or the network connection Speed de command. As a living on the network of a de administrator or hacker, the ping command is the first to have to master the Dedos command, and it uses the de principle to be so de: the de machine on the network has a uniquely determined DEIP address, we send a packet to the destination IP address, The other side is going to return a same size de packet, according to the Return de packet we can determine the target host de exists, can initially determine the target host de operating system and so on. Here's a look at some of the commonly used de operations for de. First look at the help, in the DOS window type: ping/? Enter. The De help screen shown. Here, we only master some of the basic de parameters that are useful for the de parameter (same as below).

-T means that packets will be sent uninterrupted to the destination IP until we force it to stop. Imagine, if you use 100Mde broadband access, and the target IP is 56Kde kitten, then it will not be long, the target IP is not able to withstand so much de data and dropped, hehe, an attack is so simple de implementation.

-L defines the size of the Send packet de, which defaults to 32 bytes, which we can use to define the maximum to 65500 bytes. Combined with the de-t parameters described above, there will be a better de effect oh.

-N defines the number of packets sent to the destination IP, which defaults to 3 times. If the network speed is slow, 3 times for us also wasted a lot of time, because now we de-de is only to determine whether the target IP is present, then it is defined as a time.

Note that if the-t parameter is used with the-n parameter, the ping command is placed on the back of the de parameter as standard, such as "Pingip-t-n3", although the-t parameter is used, but not always ping, but only ping3 times. In addition, the ping command does not have to PINGIP, you can directly ping the host domain name, so you can get the host Deip.

Let's give an example to illustrate the usage.

Here time=2 indicates that the de time from sending a packet to receiving a return packet is 2 seconds, from which the network connection speed de size can be judged. The return value from Ttlde can be initially judged by the ping host de operating system, which is said to be "preliminary judged" because this value is modifiable by the de. Here ttl=32 indicates that the operating system may be win98.

(Tip: If ttl=128, the target host might be Win2000; if ttl=250, the target host might be Unix)

As for the use of ping command to quickly find LAN fault, you can quickly search the fastest deqq server, you can ping others to attack ... It's all on the people's own play.

Third, Netstat

This is a power to view the network status of the de command, easy to operate.

-A view the local machine de all open ports, can effectively detect and prevent Trojans, can know the machine to open the De service and other information.

Here you can see that the local machine is open with FTP service, Telnet service, mail Service, Web service and so on. Usage: NETSTAT-AIP.

-R lists the current de routing information and tells us about the local Machine de Gateway, subnet mask, and so on. Usage: Netstat-rip.

Iv. tracert

Track routing information, using this command to find out all the ways that data travels from the local machine to the destination host, which is helpful for us to understand the network layout and structure.

This shows that the data is transferred from the local machine to the 192.168.0.1DE machine without any relay in the middle, indicating that the two machines are in the same LAN. Usage: Tracertip.

Five, net

This command is the most important de one in the network command, and it must be thoroughly mastered by de every sub-command de usage, because it is really too powerful, this is simply Microsoft provides us with the de best de-invasion tool. First let's see if it has those subcommands, type net/? Enter.

Here, we focus on several intrusion common de subcommand commands.

NetView

Use this command to view the remote host de so share the resource. The command format is NETVIEWIP.

Netuse

The remote host de a shared resource is mapped to the local site, the graphical interface for easy use, hehe. The command format is netusex:ipsharename. The above one indicates that the 192.168.0.5IPde share named MAGICDE directory is mapped to a local Dez disk. The following represents the establishment of a ipc$ connection with 192.168.0.7 (netuseipipc$ "password"/user: "name").

Established ipc$ connection, hehe, you can upload files: copync.exe92.168.0.7admin$, the local directory Denc.exe to the remote host, combined with the following to introduce to the de other DOS command can be implemented intrusion.

Netstart

Use it to start the de service on the remote host. When you establish a connection with a remote host, what if you find that the de service does not start and what do you want to do with the service? Just use this command to start it. Usage: netstartservername, the Telnet service was successfully started. Http://www.woaidiannao.com/html/qtgz/qtgz/974.html

Netstop

After the intrusion to find the remote host de a service in the wrong, what to do? Use this command to stop is OK, usage and netstart.

Netuser

View and account for de situations, including creating new accounts, deleting accounts, viewing specific accounts, activating accounts, disabling accounts, and more. This is very advantageous for our invasion de, the most important de, which provides a precondition for our cloning account. Type the denetuser without parameters to view all users, including the de that has been disabled. The following are explained separately.

1,netuserabcd1234/add, create a new user named ABCD with a password of 1234DE account, default to the user group member.

2,netuserabcd/del, delete the user named Abcdde user.

3,netuserabcd/active:no, disable the user named Abcdde user.

4,netuserabcd/active:yes, activate the user named Abcdde user.

5,NETUSERABCD, view the user name Abcdde User de case.

Netlocalgroup

View all and user groups about de information and perform related operations. Typing without parameters Denetlocalgroup lists all the current de user groups. During the intrusion process, we generally use it to promote an account to the Administrator group account, so that we can control the entire remote host with this account. Usage: Netlocalgroupgroupnameusername/add.

Now we put the new de user ABCD added to the Administrator group, the ABCD user is already a super administrator, hehe, you can use NETUSERABCD to check his de status. But this is too obvious, network management a look at the user situation can leak out flaws, so this method can only deal with rookie network management, but we have to know. Now de means are using other tools and means to clone a so that the network management can not see the de Super administrator, this is something. Interested de friends can refer to the "Hacker line of Defense" in the 30th phase de "Analytic long account," a text.

NetTime

This command allows you to view the current de time of the remote host. If your de target only goes into the remote host, then you may not be using this command. But the simple de invasion succeeded, is it just a look? We need further infiltration. This even the remote host current de time needs to know, because the use of time and other means (described later) can implement a command and Program de timed start, for our further intrusion lay a good foundation. Usage: NETTIMEIP.

VI, at

The de effect of this command is to schedule a particular de command and program to execute on a specific date or time (know Nettimede important?). When we know the current time of the remote host de, we can use this command to execute a program and command at a later time, such as 2 minutes later. Usage: Attimecommandcomputer.

Indicates that the Telnet service is turned on for the name A-01de computer at 6:55 (here netstarttelnet the Telnet service de command).

Vii. Telnet

Powerful de remote login command, almost all de intruders like to use it, always tried. Why? It is easy to operate, just like using your own de machine, as long as you are familiar with DOS commands, you can use it to do everything you want to do when you successfully connect a remote machine as a administrator. Here's how to use it, first type Telnet carriage return, and then type help to view its helpful information.

Then at the prompt type Openip carriage return, then there is a login window, let you enter a legitimate de user name and password, here Enter any password is not show de.

When you enter the user name and password are correct after the successful establishment of Telnet connection, this time you on the remote host with the same as the User de permissions, the use of DOS command can be implemented you want to do de things. Here I use the de Super admin permission to log in to de.

Up to this point, the Network DOS command de introduction is over, and here is an introduction to de-Meguro just gives rookie webmaster an impression of familiarity and mastery of the Network DOS command de importance. In fact, and network related Dedos command is far more than these, here is just a point, hope to the vast number of novice network management help. Learn dos well when good network management has a large de help, particularly de skilled mastered some network Dedos commands.

In addition, you should be aware that anyone who wants to enter the system, must have a legitimate de username and password (Input method vulnerability is almost extinct bar), even if you get the account de only a small de permission, you can also use it to achieve the final de-de. So resolutely eliminate the empty password, give yourself the de account plus a strong de password, is the best de defense weak password intrusion de method.

Eight, FTP

Are you familiar with this order? There are a lot of open DEFTPDE hosts on the network, a large part of which is anonymous de, which means anyone can log on. Now if you sweep to an open FTP Service de host (typically open a 21-port de machine), what if you do not yet use the FTPDE command? The basic DEFTP command usage is given below.

Type the FTP carriage return at the command line first, and the Ftpde prompt appears, and you can type "help" to view the assistance (any DOS command can use this method to view its help).

As you can see, how can you use so many commands? In fact, there is not so much to master a few basic de is enough.

The first is the landing process, which will be used to open, directly at the FTPDE prompt input "Open host Ipftp port" return, the general port by default is 21, can not write. Then enter the Legal de username and password to login, here with anonymous FTP as an example introduced.

The user name and password are both FTP, and the password is not shown in the DE. When prompted ****loggedin, it indicates the success of the landing. The user is shown as anonymous because it is logged anonymously.

The next step is to introduce the de-use method for the specific command.

Dir is the same as the DOS command, used to view the server de file, directly hit Dir Enter, you can see the de file on this FTP server.

CD into a folder.

Get download file to local machine.

Put to upload files to the remote server. This depends on whether the remote FTP server has given you the ability to write de permission, if you can, hehe, how to use it is not more said, we will freely play to it.

Delete Deletes the de file on the remote FTP server. This must also ensure that you have writable de permissions.

Bye exits the current connection.

Quit ditto.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.