Several commands related to network security are: Ping winipcfg tracert netat netstat
1. Ping: This is one of the most useful commands in the TCP/IP protocol.
It sends a series of data packets to another system, and the system itself sends a response. This utility is useful for searching remote hosts. The result returned by this utility indicates whether the system can reach the host, how long does it take for the host to send a returned packet.
Usage: Ping [-T] [-A] [-N count] [-l size] [-F] [-I TTL] [-V TOS]
[-R count] [-s count] [[-J host-list] [-K host-list]
[-W timeout] destination-list
Options:
-T ping the specifed host until interrupted. (ping the host until it is stopped)
-A resolve addresses to hostnames. (convert the IP address to the host name)
-N count Number of echo requests to send. (number of response requests)
-L size send buffer size. (package size)
-F set don't fragment flag in packet. (the information package contains no fragments)
-I TTL time to live. (time)
-V tos type of service. (service type)
-R count Record Route for Count hops.
-S count timestamp for Count hops.
-J host-list loose source route along host-list.
-K host-list strict source route along host-list. (strict ...... Alas, how to translate ...... Forget it)
-W timeout in milliseconds to wait for each reply. (timeout time)
For example, you may know a command # Ping-F-s 65000 ***. ***. ***. * ** or the command we used in the previous phase when we ping the moles (of course, this will only cause our own network congestion ).
In fact, this command is mainly used to check the response speed of the other party. If the result obtained by Ping is request time out. I'm afraid you don't need to look for this host at all. It's not within your range.
2. winipcfg:
This is a small tool for viewing your own IP address. Win98 comes with it. In NT, you can see the IP address in the network monitor. There is also a small utility called ...... It's like ipconfig. It's useless. You forget it ...... This kind of stuff is actually quite a lot on the Internet, but since it is "self-built", it is not necessary to ask, not to mention whether there is a trojan in the hacker's stuff downloaded on the internet is unknown, if you are not running on your own "aiji", isn't it impossible to work? -- Ha, sorry, I ran the question, but -- then I ran two sentences: I could upload some common and classic tools to the Internet as a backup, if you want to work in an Internet cafe or a company, you can download a complete toolkit.
This is quite simple. Just type the command in DOS without any parameters.
3. tracert: a utility used to verify the path to the remote host.
Usage: tracert [-D] [-H maximum_hops] [-J host-list] [-W timeout] target_name
Parameters:
-D do not resolve addresses to hostnames. (do not convert the IP address to the host name)
-H maximum_hops maximum number of hops to search for target. (maximum number of traces)
-J host-list loose source route along host-list.
-W timeout wait timeout milliseconds for each reply. (Time Out Time)
The simplest use is tracert hostname, where hostname is the computer name or the IP address of the computer whose path you want to track. Tracert will return the various IP addresses of data packets to reach the destination. Do you know how to use it?
Let me explain a little: trace the route to 210.142.192.130, up to 30:
The first line: * & ^ % & * I just went out from here (Oh, I really don't want to say ^ & ^)
Row 4: Are you about to go abroad?
Row 9: Ah! This is the location of the Japanese devils ......
4. Net: This is a great thing. If it doesn't work, please open your eyes.
The syntax of this command is: available Commands include:
Net accounts net help net share
Net computer net helpmsg Net start
Net config net localgroup net statistics
Net config Server Net Name net stop
Net config workstation net pause net time
Net continue net print net use
Net file net send net user
Net group net session net View
NET Help Services list network services that can be started by users.
NET Help syntax explains how to read the net help syntax.
NET Help Command more is used to display help on screen.
I will not explain it one by one. This will make my fingers tired. Let's talk about the two common commands.
A.net View
The syntax of this command is: Net view [computername/domain [: domainname]
Net view/Network: NW [computername]
. Net view is used to display a list of shared resources on a computer. When you use this command without the option,
It displays the list of computers in the current domain or network.
Computername refers to the computer on which you want to browse shared resources.
/Domain: domainname specifies the domain in which the user wants to browse a valid computer. If the domain name is omitted,
All the domains on the local area network are displayed.
/Network: NW displays all available servers on the NetWare network. If a calculation is specified
Machine name, the available resources on the computer in the NetWare network will be displayed.
For example, if you know that resources are shared on a remote computer, run
Net view ***.
B .net use
The syntax of this command is: net use [devicename *] [computernamesharename [volume] [password *]
[/User: [domainname] username]
[[/Delete] [/persistent: {Yes No}]
Net use [devicename *] [password *] [/Home]
Net use [/persistent: {Yes No}]
. Net use is used to connect a computer to a shared resource, or to disconnect a computer from a shared resource.
Connection. When this command is used without the option, it lists the computer connections.
Devicename specifies a name to connect to the resource, or specify the device to be disconnected. There are two types
Device Name: disk drive (D: to Z :) and printer (LPT1: To lpt3 :). Input
An asterisk instead of a specified device name can be assigned with the next available device name.
Computername refers to the name of the computer that controls shared resources. If the computer name contains null characters,
Enclose the double backslash () and computer name in quotation marks. Computer Name
It can contain 1 to 15 characters.
Sharename refers to the Network Name of the shared resource.
Volume specifies the NetWare volume on a server. Users must install Netware's customer service
(Windows NT Workstation) or Netware gateway service (Windows NT Service)
And connect it to the NetWare server.
Password refers to the password required to access shared resources.
* Prompt the password. The password is not displayed when you enter the password at the password prompt.
/User specifies a different user name for the connection.
Domainname specifies another domain. If the default domain is used, the current logon domain is used.
Username specifies the username to log on.
/Home connects users to their home directories.
/Delete cancels a network connection and deletes the connection from the permanent connection list.
/Persistent controls the use of permanent network connections. The default value is the recently used setting.
Yes, save them when the connection is generated, and restore them the next time you log on.
No. Do not save the existing connection or subsequent connection; the existing connection will be
Restore. You can use the/delete option to delete a permanent connection.
PS:
In the browser, enter file: // ***. *** C $
Then, the shared C drive content on the Internet will be displayed, as shown on the FTP site in the browser. You may try again ......
5. At: scheduled to run certain commands and programs on a specific date and time.
Before running the AT command, you must start the Schedule service. Look, I have to sell it now. I just learned the net command, but I didn't elaborate on this start command. Let's look at the Help file and find out how to use various commands.
C: "Net start schedule
Schedule is starting the service .....
The schedulw service is successfully started.
At [computername] [[ID] [/delete]/Delete [/Yes]
At [computername] time [/interactive]
[/Every: Date [,...]/next: Date [,...] "command"
Computername specifies the remote computer. If this parameter is omitted
The command is scheduled to run on the local machine.
Id specifies the identification number for the scheduling command.
/Delete: delete a scheduled command. If the identifier is omitted, all
All commands are deleted.
/Yes is used to delete all jobs and you do not want to confirm the deletion.
Information.
Time specifies the time when the command is run.
/Interactive allows a job to interact with users through the desktop during running.
/Every: Date [,...] specifies the day of each week or month (or a few days) to run the command.
If the date is omitted, the task runs on the current day of each month by default.
/Next: Date [,...] specifies to run the command on the next specified date (for example, next Wednesday.
If the date is omitted, the task runs on the current day of each month by default.
"Command" is the Windows NT command or batch file to be run.
If you know how to use ATTS, you can see how to run ntsrv.exe on a remote NTSS:
1. Use the Administrator to log on to the target server by using net use X. x. x. xipc $ "adminpwd"/User: "adminuser" (for details, see How To Get In NT in killusa)
2 Use ntsrv.exe to start remote: netsvc x. x schedule/start
3. Use at.exeto run the program on the remote server at a specified time. Of course, the fastest run is the most ideal. Therefore, you can use letmein.exe to get the server time, and then:
At x. x 00:00 ntsrv.exe/port: 64321
At, you need to change the specific time taken back by using letmein.exeto adjust the volume. After the meeting, start netbus.exe on the slave node, type the IP address or hostname of the target server, and connect! For example, in the first method, if you want to run something like a virus on the target server, you can use the NetBus upload function to upload various "dabuwan" to the target server, use NetBus's "Start Program" and type the complete path! The second method is to use the "app redirect" function of Netbus to start the remote Telnet Service, as follows: In NetBus, click "app redirect", type "C: 》winntsystem32cmd.exe", and the port is: 4321, the service is started, and then run: nc x. x. x. X 4321 indicates that the connection is successful when a DOS Startup screen is displayed:
Microsoft (r) Windows NT (TM)
(C) Copyright 1985-1996 Microsoft Corp.
C:
Note: Here is a short article about copying killusa-don't ask me for a fee ^
6. netstat is a utility used to observe the network connection status.
It can check the current connection status of the IP address. After determining that your basic level of communication is in progress, you need to verify the service on the system. This service includes checking the incoming traffic and/or verifying that you are creating a session with a remote site, which can easily do this. You can also see many tools such as x-netstat on the Internet, which are more intuitive and have no functions. The specific usage of this command is as follows:
Displays protocol statistics and current TCP/IP network connections. (display protocol and current network connection)
Netstat [-A] [-E] [-N] [-S] [-P proto] [-R] [interval]
-A displays all connections and listening ports. (All connections and listening ports are displayed)
-E displays Ethernet statistics. This may be combined with the-S
Option. (displays the Ethernet connection. It can be used with-S)
-N displays addresses and port numbers in numeri