Windows several common Network command parsing: Ping, Telnet, ssh, ftp/sftp, netstat, tracert, ARP

Source: Internet
Author: User
Tags ftp client file transfer protocol

1. Ping

Network layer protocol, can only determine whether the host connection between, can not determine whether the port is open.

2. Telnet

The application layer protocol is the standard protocol and main form of the Intenet telnet service. Login account password and data plaintext transmission, not encrypted.

Window for security reasons, generally disable this command, you need to install (Control Panel-Program-Open or close the window function, and then specifically to find out how to set) Click here to find out more

If Telnet is installed, it can be used to test whether the port is open: Telnet ip:port

3. SSH (Secure Shell)

The security protocol based on the application layer and the transport layer is the same as the function. However, due to the transmission encryption, the data is compressed and other advantages, is widely used. SSH was originally a program on a UNIX system, and later expanded quickly to other operating platforms.

Here are a few tools to recommend:

SECURECRT: Charge, to find a cracked version, seemingly not very good to get, good experience.

Putty: Light, but not too much.

BVSSH: I'm using it, and it's good, and there's an SFTP window open.

4, Ftp/sftp

File Transfer Protocol for the application layer files Transfer Protocol, Secure file Transfer Protocol

The port used to send the command is typically 21, and the port used to transmit the data is 20

FTP is a specific application of TCP/IP, which works on the seventh layer of the OSI model, on the fourth layer of the TCP model, the application layer, using TCP instead of UDP, so that the FTP client has to go through a well-known "three handshake" process before establishing a connection with the server. The significance of this is that the connection between the client and the server is reliable, and it is a connection oriented, which provides a reliable guarantee for the data transmission.

A more in-depth look here

5, Netstat

Network status commands, view all network connections, view port usage, view the processes that occupy ports, and so on.

6, Tracert

Track routing information, using this command to find out all the ways that data travels from the local machine to the target host. After adding an IP, you can know all the information.

7. ARP (Address Resolution Protocol)

View the appropriate MAC address for the IP address.

How to use: Arp-a IP Displays the current ARP cache table for all interfaces.

Arp attack is to realize ARP spoofing by fake IP address and MAC address, can generate a large amount of ARP traffic in the network to block the network, the attacker can change the IP-MAC entry in the target host ARP cache as long as the persistent ARP response packet is issued, causing network interruption or man-in-the-middle attack.

Windows several common Network command parsing: Ping, Telnet, ssh, ftp/sftp, netstat, tracert, ARP

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.