Sunday, 15 July 2018

Top 10+ Best CMD Commands Used In Hacking 2018


We all know that Command Prompt is one of the most powerful tools in Windows which is well known by CMD. Today we are going to share top CMD or MS-DOS commands which you must know if you want to be a hacker. Therefore, if you have just made a mind of becoming a hacker then you could learn to utilize these ten best CMD commands used in hacking.

10+ Best CMD Commands Used In Hacking 2018

We all know that Command Prompt is one of the most powerful tools in Windows which is well known by CMD. It is the command-line interpreter on Windows OS. With the help of CMD, you can do almost anything with your PC/laptop. We can’t explain what exactly CMD can do! However, hackers or some professional users know how to make full use of Command Prompt.

Here in this article, we are going to show you the list of best CMD commands which are used by hackers. Therefore, if you have just made a mind of becoming a hacker then you could learn to utilize these ten best CMD commands used in hacking.

#1 ping

This command uses your internet connection in order to send some packets of data to a specific web address then these packets are sent back to your PC. The test simply shows the amount of time it took to reach the specific address. In simple words, it helps you to know if the host you pinging is alive.

You can use Ping command whenever you need to verify that the host computer can connect to the TCP/IP network and its resources.

For example, you can type in Command prompt ping 8.8.8.8 which belongs to Google.

You can replace “8.8.8.8” to “www.google.com” or something else which you want to ping.

#2 nslookup

It is a network administration command-line tool which helps you to obtain domain name or IP address mapping for any specific DNS record. Suppose you have a website URL but want to know its IP Address, you can simply type in CMD

nslookup www.google.com (Replace Google.com with your website URL of which you want to find the IP address)

#3 tracert

You can say Trace Route like its name it allows users to trace the route than an IP packed has taken to reach a destination. The command calculates and displays the amount of time each hop took to reach a destination. You just need to type

tracert x.x.x.x (if you know the IP Address) or else you can type tracert www.google.com (If you don’t know the IP address)

#4 arp

This command helps you to modify ARP cache. You can run arp-a command on each computer to see whether the computers have the correct MAC address listed for each other to ping each other successfully on the same subnet.

This command also helps users to find out if anyone has done arp poisoning in their LAN.

You can try typing arp-a in command prompt.

#5 ipconfig

This is the command which shows every useful thing. It will show you IPv6 address, temporary IPv6 address, IPv4 address, Subnet Mask, Default gateway and all other things that you want to know.

You can type in command prompt “ipconfig” or “ipconfig/all

#6 netstat

If you want to find out who is establishing a connection with your computer then you might try typing in command prompt “netstat -a” it will display all the connection and you will get to know about the active connections and listening ports.

Type in command prompt “netstat -a

#7 Route

It is a command which is used to view and manipulate the IP routing table in the Microsoft Windows operating system. This command will show you routing table, metric and interface.

You can type in command prompt “route print.”

#8 Net View

This command displays the whole list of resources, computers or domains that are shared by the specified computer.

You can type in command prompt “net view x.x.x.x or computername

#9 Net User

Well, this command is used to modify changes to use accounts on a computer. You can add, remove users with the help of this command

You can use these commands while using net user

net user [<UserName> {<Password> | *} [<Options>]] [/domain] net user [<UserName> {<Password> | *} /add [<Options>] [/domain]] net user [<UserName> [/delete] [/domain]]

#10 Net Use

This command is been used to connect, remove and configure connections to shared resources like network printers and other mapped drives. The use of this command is a little bit complicated. So, we recommend you to visit the Microsoft site to get full details on how to use this command.

#11 Tasklist

This command opens up an entire task manager on the command prompt. Users just need to enter tasklist on CMD and they will see the list of all running process. You can figure out all the wrongs with this commands.

Moreover, the command can also be used when you need to forcefully close any process. For example, if you want to kill PID 1532 process then you can enter the command: taskkill /PID 1532 /F

#12 iexplore

As we all know, hackers often try to execute some apps, such as the web browsers. So, hackers use the iexplore option to execute apps and web pages. For example, if you enter iexplore www.google.com on the command prompt, it will open the URL in Internet Explorer.
Not only these, but you can even use iexplore <IP address> to find sites running on any particular IP address. The command is used in multiple ways by the hackers.

So, above are the 10 best CMD commands used in hacking. You can actually explore the lot more than this, we have listed A-Z CMD commands in one of our articles! I Hope you like the post! Share it with your friends too. Leave a comment below if you want to add any command in the list.

Related Posts:

  • Here is the list of all Windows CMD commands sorted alphabetically along with exclusive CMD commands pdf file for future reference for both pro and newbies. Command Prompt and CMD Commands are unknown territories for most… Read More
  • Microsoft Just Added This Extraordinary New Feature To Windows 10 We all know very well that the tech giant Microsoft’s latest operating system, of course, the Windows 10 has undergone some changes since it was released. Now according to the latest reports, the tech giant Microsoft just … Read More
  • WhatsApp Starts Labelling Forwarded Messages Do you usually send a “good morning” message to one person and then forward the same message to other WhatsApp contacts? So I have bad news for you. The WhatsApp Beta began to warn if a message is forwarded and this appear… Read More
  • How To Create a Virus That Disable All Hard Disks Note:- This virus can permanently damage your computer so use it at your own risk, as we are not responsible for any damage occur. As this is only for knowledge and security purposes and to make you aware of these viruses.… Read More
  • How To Wirelessly Share Data Between Pc & Android Mobile Today we are going to share a trick on how to wirelessly share data between Pc and Android Mobile. We are going to share two working methods which you can use to wirelessly share data between PC and Android mobile. Our sm… Read More

0 comments:

Post a Comment