Top 10 CMD Commands used in Hacking

Top 10 Commands used in Hacking

CMD or Command Prompt is the Command-line interpreter on Windows Operating System. It provides access to over 2000 commands in windows. Hackers uses this command-line interpreter to run commands and access information from a remote computer or other devices.

Today I’m sharing Top 10 CMD Commands used in Hacking. If you are a beginner and want to learn Hacking, you should know these most important CMD Commands Used in Hacking. If you haven’t tried some of them, just open your CMD, type command and see the result.

net use
net user

Let’s discuss about each command in short

1. Ping
Ping command is used to test the ability of the source computer to reach the destination computer. This command is usually used to verify the connection status of the source computer to the destination computer.

There are two ways to ping

i. if you know the IP address of the Destination
ping x.x.x.x (here x is the IP address you want to ping)

ii. if you know the IP address of the Destination
ping www.google.com (here www.google.com is the website you want to ping)

2. ipconfig
This command displays all current TCP/IP network configuration like DNS (Domain Name System) setting, subnet mask, IP address and Default gateway.

ipconfig /all: Displays the full TCP/IP configuration fo all adapters.
ipconfig renew: Renews DHCP configuration
ipconfig release: Send a message to DHCP to release current DHCP configuration.
flushdns : Flushes and resets the contents of the DNS client resolver cache (discard cache entry)
ipconfig display DNS: Display the contents of the DNS client resolver cache.

3. net use
This command is use to connect, remove, and configure connections to shared resources.

net use: to show detailed information about currently mapped resources like printers or drives.
netuse [device name]: to specify the drive letter or printer port you want to map.

4. net user
Use this command to create and modify user account on computer. Usually used by administrator to manage users.

net user [username [password | *] [options]] [/domain]
               username {password | *} /add [options] [/domain]
               username [/delete] [/domain]

5. tracert

This command is used to show the details about the path that a packet takes while traveling from source to destination.

tracert x.x.x.x (x is the IP address)
tracert www.google.com (www.google.com is the website)

6. netstat
This command is used to show the details about individual connections, network statistics and much more.

netstat -a: display active TCP connections
netstat -e: to show statistics about network connection
netstat -n: to show all the open connections with IP addresses

7. arp
This command is used to display and modify entries in the Address Resolution Protocol (ARP) cache. It will show one or more tables (called ARP tables) used to store IP addresses and their resolved token ring physical addresses.

arp -a: display the current ARP cache table for all interfaces

8. route
You can use route command to view, add and delete routes on from routing table

route print: print a route
route add: add a route
route delete: delete a route

9. nbtstat
The nbtstat command removes and corrects preloaded entries using a number of case-sensitive switches

nbtstat -a <remotename>: returns the local NetBIOS name table for that remote computer
nbtstat -a <remotename>: returns the remote machine’s name table given its IP address

10. nslookup
This command is an external command used to resolve external DNS into IP address.

Nsloolup [name]

These are the Top 10 CMD Commands used in Hacking. hope you’ll find this useful. If you know any important command not available in the list above, mention them in the comment.

Share this:

Post a Comment

Thanks for sharing your valuable feedback with us. Techmeastro strives to provide better information to its users. Keep visiting this website for more tech tips and tricks.

Copyright © Tech Tips and Tricks