Eight DOS commands are required!

Source: Internet
Author: User
Tags ftp commands net time remote ftp server strong password
Eight DOS commands are required! Reprinted

1. Ping

It is used to checkNetworkCommand to determine whether the connection is smooth or the network connection speed. As a manager living on the Internet

For the administrator or hacker, the ping command is the first DOS command that must be mastered. It uses the following principle:

Each machine on the network has a unique IP address. When we send a packet to the target IP address, the other party will return the packet.

Return a data packet of the same size. Based on the returned data packet, we can determine the existence of the target host.

Determine the target hostOperating System. Next let's take a look at some of its common operations. Let's take a look at the help, in DOS

In the window, type Ping /? Press enter ,. . Here, we only master some basic useful

).

-T indicates that data packets are continuously sent to the target IP address until we force it to stop. Imagine if you use

M of broadband access, and the target IP address is 56 K of the kitten, so it will not take long, because the target IP address cannot afford this

A single attack is just as simple as dropping data.

-L defines the size of the sent data packet. The default value is 32 bytes. We can use it to define a maximum of 65500 bytes.

. It works better with the-t parameter described above.

-N indicates the number of data packets sent to the target IP address. The default value is 3. If the network speed is slow

It also wastes a lot of time, because our goal is to determine whether the target IP address exists.

For once.

Note: If the-t parameter and the-n parameter are used together, the ping command uses the following parameters as the standard.

For example, "Ping IP-T-N 3", although the-t parameter is used, but not always Ping, but only Ping

3 times. In addition, the ping command does not have to ping the IP address or directly ping the host domain name.

The IP address of the host.

The following is an example to illustrate the specific usage.

Here time = 2 indicates that the time taken from sending a data packet to receiving the returned data packet is 2 seconds.

The size of the network disconnection speed. From the returned value of TTL, You Can preliminarily determine the operating system of the host to be pinged.

This is because this value can be modified. Here, TTL = 32 indicates that the operating system may be Win98.

(TIPS: If TTL = 128, the target host may be Win2000; If TTL = 250, the target host

The host may be Unix)

You can use the ping command to quickly find lan faults and quickly search for the fastest QQServer, Yes

Ping other people ...... All of this depends on everyone.

Ii. NBTSTAT

This command uses NetBIOS on TCP/IP to display protocol statistics and current TCP/IP connection.

Obtain the NetBIOS of the remote host.InformationSuch as the user name, the working group, and the MAC address of the NIC. Here

It is necessary to understand several basic parameters.

-A uses this parameter to obtain its NetBIOS message if you know the name of the remote host machine.

Information (the same below ).

-The parameter A can also obtain the NetBIOS information of the remote host, but you need to know its IP address.

-N: lists the NetBIOS information of the local machine.

When the IP address or machine name of the other party is obtained, you can use the nbtstat command to obtain the other party's

Information, which increases the insurance coefficient of our intrusion.

Iii. netstat

This is a command used to view the network status, which is easy to operate and powerful.

-A: view all open ports on the local machine to effectively detect and prevent Trojans.

Service and other information, 4.

Here we can see that the local machine is open to FTP service, Telnet service, mail service, Web Service, and so on. Usage

: Netstat-a ip address.

-R: lists the current route information and tells us the gateway, subnet mask, and other information of the local machine. Usage:

Netstat-r IP address.
Iv. tracert

Trace route information. You can use this command to find all the data transmitted from the local machine to the target host

This helps us understand the network layout and structure. 5.

It indicates that the data is transmitted from the local machine to the machine at 192.168.0.1 without any intermediate transfer.

The two machines are in the same LAN. Usage: tracert IP.

V. net

This command is the most important part of a network command. You must thoroughly understand the usage of each of its sub-commands.

The functions provided by Microsoft are too powerful. This is the best intrusion tool that Microsoft provides for us. First, let me

Let's take a look at the sub-commands they all have. Type net /? Press enter 6.

Here, we will focus on several common subcommands for intrusion.

Net View

Use this command to view shared resources of the remote host. The command format is net view \ IP.

Net use

A shared resource of the remote host is projected as a local drive letter, which is easy to use on the graphic interface. Command Format

Is net use X: \ IP \ sharename. The above indicates that the shared IP address 192.168.0.5ip is named magic's directory.

It is a local Z disk. Set up an IPC $ connection with 192.168.0.7 (net use \ IP \ IPC $

"Password"/User: "name "),

After the IPC $ connection is established, you can upload the file: Copy nc.exe \ 192.168.0.7.

\ Adminscripts: Upload the nc.exe file under the directory to the remote host.

The intrusion can be achieved.

Net start

Use it to start services on the remote host. After you establish a connection with the remote host

The service is not started, and what do you want to do with it? Use this command to start it. Usage: Net

Start servername, 9. the telnet service is successfully started.

Net stop

What should I do if I find that a service on the remote host is out of the way after the intrusion? Use this command to stop.

Same as net start.

Net user

View account-related information, including creating accounts, deleting accounts, viewing specific accounts, activating accounts, and accounts

Disabled. This is very beneficial to our intrusion, and most importantly, it provides a prerequisite for us to clone accounts. Type

You can view all users, including disabled. The following is a separate explanation.

1. Net user ABCD 1234/Add: create an account with the username ABCD and password 1234. The default value is

Group members.

2. Net user ABCD/DEL: Delete the user whose user name is ABCD.

3. Net user ABCD/active: No. Disable the user whose user name is ABCD.

4. Net user ABCD/active: Yes. Activate the user whose user name is ABCD.

5. Net user ABCD: view the situation of users whose user name is ABCD.

Net localgroup

View all information related to the user group and perform related operations. Enter the net localgroup without parameters, that is

List all current user groups. During the intrusion process, we generally use it to escalate an account

Administrator group account, so that we can use this account to control the entire remote host. Usage: Net

Localgroup groupname username/Add.

Now we have added the newly created user ABCD to the Administrator Group. At this time, the ABCD user has

It's a super administrator, huh, you can use net user ABCD to view his status, and compare it with figure 10.

You can see it. However, this is too obvious, and the network management system can leak flaws at first glance, so this method can only

We have to know how to deal with cainiao network management. The current method is to use other tools and means to clone

Super administrator. If you are interested, refer to section 30th of the black line of defense 《

From the perspective of understanding the long account.

NET Time

This command can view the current time of the remote host. If your goal is to enter the remote host,

You may not be able to use this command. But a simple intrusion is successful. Are you just looking at it? We need to enter

Step-by-Step penetration. Even the current time of the remote host needs to be known, because the time and other means are used (

To implement scheduled startup of a command and program, laying the foundation for further intrusion. Usage: Net

Time \ IP.

Sat.

The purpose of this command is to arrange to execute a specific command and program in a specific period or time (know the net

Is time important ?). When we know the current time of the remote host, we can use this command

Execute a program and command at a certain time (such as two minutes later. Usage: at Time Command

\ Computer.

Enables the telnet service on the computer named a-01 at 06:55 (Net start Telnet here)

That is, the command to enable the telnet service ).
7. FTP

Are you familiar with this command? There are many FTP hosts open on the network, a large part of which

It is anonymous, that is, anyone can log in. Now, if you scan a host that opens the FTP service

(Usually machines with port 21 enabled). What if you still don't use FTP commands? The basic information is given below.

.

First, enter FTP in the command line and press Enter. The FTP prompt appears. At this time, you can type "help" to view the help

(Any doscommand can use this method to view its help ).

You may have seen how to use so many commands? In fact, we can't use that much, just master a few basic

Enough.

The first step is the login process, which requires the use of open, directly enter "Open Host IP Address

Press enter on the FTP port. Generally, the default port is 21, which can be left empty. Then enter a valid user name and password.

The anonymous FTP is used as an example.

The username and password are both FTP and are not displayed. When *** logged in is prompted

. The user is shown as anonymous because the logon is anonymous.

Next we will introduce how to use specific commands.

Like the doscommand, DIR is used to view the file on the server. Press Dir and press enter to view the ftp

Files on the server.

CD to enter a folder.

Get to download the file to the local machine.

Put: upload files to the remote server. It depends on whether the remote FTP server has granted you the writable permission, as shown in figure

If you can, well, you will not be able to make the most of it.

Delete deletes files on the remote FTP server. This must also ensure that you have the write permission.

Bye exits the current connection.

Same as quit.
  

8. Telnet

Powerful remote login commands, which almost all intruders like to use, have tried and tested. Why? It

The operation is simple, just like using your own machine, as long as you are familiar with the doscommand

After connecting to the remote machine, you can use it to ** everything you want. The following describes how to use it.

Enter Telnet and press enter, and then type help to view the help information.

Enter the open IP address at the prompt and press Enter. the login window appears, asking you to enter a valid user name.

And password. Any password entered here is not displayed.

After you enter the correct username and password, you have successfully established a telnet connection. At this time, you are on the remote host.

With the same permissions as this user, you can use the doscommand to achieve what you want. Here I use

Level administrator permission to log on.

So far, the introduction of the network doscommand has come to an end. The purpose of this introduction is only to give the cainiao network administrator

Understanding and understanding the importance of network doscommands. In fact, network-related DOS commands are far from

Here, we hope to help cainiao network management. Learning DOS is a good choice for network administrators.

With great help, I was particularly familiar with some network doscommands.

In addition, it should be clear that anyone who wants to enter the system must have a valid user name and password (

The Access Vulnerability is almost extinct.) even if you only have a small permission for your account, you can use it.

To achieve the final goal. Therefore, it is best to eliminate empty passwords and add a strong password to your account.

To defend against weak password intrusion.

Finally, it is most important to cultivate a good security awareness.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.