1. Ping
Network layer protocol, can only determine whether the host connection between, can not determine whether the port is open.
2. Telnet
The application layer protocol is the standard protocol and main form of the Intenet telnet service. Login account password and data plaintext transmission, not encrypted.
Window for security reasons, generally disable this command, you need to install (Control Panel-Program-Open or close the window function, and then specifically to find out how to set) Click here to find out more
If Telnet is installed, it can be used to test whether the port is open: Telnet ip:port
3. SSH (Secure Shell)
The security protocol based on the application layer and the transport layer is the same as the function. However, due to the transmission encryption, the data is compressed and other advantages, is widely used. SSH was originally a program on a UNIX system, and later expanded quickly to other operating platforms.
Here are a few tools to recommend:
SECURECRT: Charge, to find a cracked version, seemingly not very good to get, good experience.
Putty: Light, but not too much.
BVSSH: I'm using it, and it's good, and there's an SFTP window open.
4, Ftp/sftp
File Transfer Protocol for the application layer files Transfer Protocol, Secure file Transfer Protocol
The port used to send the command is typically 21, and the port used to transmit the data is 20
FTP is a specific application of TCP/IP, which works on the seventh layer of the OSI model, on the fourth layer of the TCP model, the application layer, using TCP instead of UDP, so that the FTP client has to go through a well-known "three handshake" process before establishing a connection with the server. The significance of this is that the connection between the client and the server is reliable, and it is a connection oriented, which provides a reliable guarantee for the data transmission.
A more in-depth look here
5, Netstat
Network status commands, view all network connections, view port usage, view the processes that occupy ports, and so on.
6, Tracert
Track routing information, using this command to find out all the ways that data travels from the local machine to the target host. After adding an IP, you can know all the information.
7. ARP (Address Resolution Protocol)
View the appropriate MAC address for the IP address.
How to use: Arp-a IP Displays the current ARP cache table for all interfaces.
Arp attack is to realize ARP spoofing by fake IP address and MAC address, can generate a large amount of ARP traffic in the network to block the network, the attacker can change the IP-MAC entry in the target host ARP cache as long as the persistent ARP response packet is issued, causing network interruption or man-in-the-middle attack.
Windows several common Network command parsing: Ping, Telnet, ssh, ftp/sftp, netstat, tracert, ARP