Fortune Telling Collection - Comprehensive fortune-telling - Encyclopedia of command character details
Encyclopedia of command character details
Mostly used in the network, the machines on the network have a unique IP address, that is, network packets, and each IP can accommodate a certain amount of data. If the data is larger than the IP capacity, there will be consequences of disconnection.
Basic introduction Chinese name: command character mbth: CMD Meaning: Connection speed Features: Live on the Internet Content: Packet Source: Packet We can introduce, collect commands, introduce 1, ping. It is a command to check whether the network is unblocked or the network connection speed. As an administrator or hacker living on the network, the ping command is the first DOS command that must be mastered. The principle it uses is this: all machines on the network have unique IP addresses. When we send a packet to the target IP address, the other party will return a packet of the same size. According to the returned data packet, we can determine the existence of the target host and preliminarily judge the operating system of the target host. Let's take a look at some common operations. Look at the help first, and enter: ping/? Get back in the car. Help screen displayed in. Here, we only need to master some basic and useful parameters (the same below). -t means that the packet will continue to be transmitted to the destination IP until we force it to stop. Imagine, if you use 100M broadband access and the target IP is a 56K kitten, it won't be long before the target IP will be disconnected because it can't carry so much data. Hehe, an attack is as simple as that. -l defines the size of the transmission packet, which is 32 bytes by default, and we can use it to define the maximum size as 65500 bytes. Combined with the -t parameter introduced above, the effect will be better. -n defines the number of times the packet is transmitted to the target IP, and the default is 3 times. If the network speed is slow, three times will waste us a lot of time, because now our purpose is only to judge whether the target IP exists, so we define it as once. It should be noted that if the -t parameter and the -n parameter are used together, the ping command is based on the following parameters, such as "pingIP-t-n3". Although the -t parameter is used, it is not always pinged, but only pinged three times. In addition, the ping command does not have to pingIP, but can also directly ping the host domain name, so that the IP of the host can be obtained. Here is an example to illustrate the specific usage. Here, time=2 means that the time from sending a packet to receiving and returning the packet is 2 seconds, from which the speed of network connection can be judged. The operating system of ping host can be preliminarily judged from the return value of TTL. The reason why we say "preliminary judgment" is because this value can be modified. TTL=32 here means that the operating system may be win98. (Little knowledge: If TTL= 128, the target host may be Win2000;; If TTL=250, the target host may be Unix. As for the ping command, you can quickly find the local network fault, quickly search the fastest QQ server, and ping others ... it's up to everyone to play. Second, the nbtstat command uses NETBIOS over TCP/IP to display protocol statistics and current TCP/IP connections. With this command, you can get NetBIOS information of the remote host, such as user name, workgroup, MAC address of network card, etc. It is necessary for us to know some basic parameters here. -a With this parameter, you can get the NETBIOS information of the remote host as long as you know its machine name (the same below). The -A parameter can also get NETBIOS information of the remote host, but you need to know its IP. -n Lists the NETBIOS information of the local computer. When we get the IP or machine name of the other party, we can use the NBTSTAT command to further get the information of the other party, which increases the insurance factor of our invasion. Stat This is a command to check the network status, which is simple and powerful. -a Check all the open connection ports of the local machine, which can effectively find and prevent Trojans and know the services opened by the machine, as shown in Figure 4. As you can see, there are FTP services, Tel services, mail services, WEB services and so on in the local machine. Usage: stat-aIP. -r lists the current routing information and tells us the gateway and subnet mask of the local machine. Usage: stat-rIP.
Tracert tracks routing information. Using this command, we can find out all the paths of data transmission from the local machine to the target host, which is very helpful for us to understand the network layout and structure. As shown in fig. 5. This means that the data is transmitted from the local machine to the machine of192.168.0.1without any intermediate transmission, which means that the two machines are in the same LAN. Usage: tracertIP Fifth, this command is the most important one in the network command, and we must thoroughly master the usage of each subcommand, because its function is so powerful that it is simply the best intrusion tool provided by Microsoft. First, let's see what subcommands it has. Type/? Input as shown in Figure 6. Here, we focus on several common subcommands of invasion. View uses this command to view all the shared resources of the remote host. The format of this command is view\IP. Use refers to a shared resource of a remote host as a local symbol, and the graphical interface is easy to use, hehe. The command format is usex:\IP\ShareName. The above directory named magic, which represents 192. 168.0.5IP sharing, is mapped to a local Z disk. The following shows that an IPC$ connection (use \ IP \ IPC $ "password"/user: "name") is established with 192. 168.0.7. After the IPC $ connection is established, hehe, you can upload files: copync.exe192. When you establish a connection with a remote host, what should you do if you find that any of its services are not started and you want to use that service? Just use this command to start it. Usage: startservername, as shown in figure 9, successfully started the tel service. What should I do if I find that a service of the remote host is in the way after S invasion? Stop with this command, and it's ok. Usage is the same as start. Users can view information related to accounts, including creating new accounts, deleting accounts, viewing specific accounts, activating accounts, disabling accounts, etc. This is very beneficial to our invasion, and most importantly, it provides a premise for us to clone accounts. Type user without parameters to view all users, including those who have been disabled. The following are explained separately. 1, userabcd 1234/add, create a new account with user name abcd and password 1234. By default, it is a member of the user group. 2. userabcd/del, delete the user whose user name is abcd. 3. userabcd/active: No, users with user name abcd are disabled. 4. userabcd/active: Yes, activate the user whose user name is abcd. 5. userabcd, check the situation of the user whose user name is abcd. The localgroup checks all information related to the user group and performs related operations. Type localgroup without parameters to list all current user groups. In the process of invasion, we usually use it to upgrade an account to an administrator group account, so that we can use this account to control the entire remote host. Usage: localgroupgroupnameusername/add. Now, we will add the newly created user abcd to the administrators group. At this point, abcd users are already super administrators. Hehe, you can use user ABCD to check his status again, and compare it with figure 10. But this is too obvious, the network manager can reveal a flaw as soon as he sees the user's situation, so this method can only deal with novice network managers, but we still need to know. The current method is to clone a super administrator with other tools and means, which is another story. Interested friends can refer to the article "Analyzing Long Accounts from Shallow to Deep" in the 30th issue of "Defense of Hackers". Time This command can view the current time of the remote host. If your goal is only to enter a remote host, then you may not need this command. But the simple invasion succeeded. Is it just a look? We need to penetrate further. Even the remote host needs to know the current time, because using time and other means (mentioned later) can realize the regular start of a command and program, laying a good foundation for our further invasion. Usage: time\IP. The function of at command is to arrange the execution of specific commands and programs at a specific date or time (see the importance of time? )。 When we know the current time of the remote host, we can use this command to make it execute a program and command at a later time (for example, 2 minutes later). Usage: attimecommand\computer. It means that at 6: 55, let the computer named a-0 1 start the tel service (here starttel is the command to start the tel service).
Seven, ftp, are you familiar with this command? There are many ftp hosts on the Internet, most of which are anonymous, which means anyone can log in. Now, if you scan a host with an open ftp service (usually a machine with a port of 2 1), what if you can't use the ftp command yet? The following is the basic ftp command usage. First, enter ftp Enter at the command line, and an ftp prompt will appear. At this point, you can enter "help" to view the help (any DOS command can use this method to view its help). As you may have seen, how to use so many commands? Actually, it doesn't need that much It is enough to master a few foundations. The first is the login process, which is about to use open. Just enter "open host IP ftp connection port" at the prompt of FTP, and press enter. Generally, the default connection port is 2 1, so don't write it. Then enter a legal user name and password to log in. Take anonymous ftp as an example here. The user name and password are ftp, and the password is not displayed. When prompted to log in, the login was successful. Because the login here is anonymous, the user appears anonymous. Next, we will introduce the usage of specific commands. Dir, like DOS command, is used to view the files of the server. Press dir enter directly to see the files on this ftp server. Cd into the folder. Get downloads the file to the local machine. Upload files to a remote server. It depends on whether the remote ftp server grants you write permission. If there is, hehe, I won't say much about how to use it. Let's play freely. Delete Delete the files on the remote ftp server. This must also ensure that you have write permission. Bye exits the current connection. Resign. Same as above.
Eight, tel powerful remote login command, almost all intruders like to use it, tried and tested. Why? The operation is simple, just like using your own machine. As long as you are familiar with DOS commands and successfully connect to the remote machine as an administrator, you can do anything you want with it. The following is how to use it. First, type tel Enter, and then type help to view its help information. Then type openIP enter at the prompt, and the login window will appear, allowing you to enter a legal user name and password. Any password entered here will not be displayed. When the user name and password are correct, the tel connection is successfully established. At this point, you have the same permissions as this user on the remote host, and you can do whatever you want with DOS command. I logged in with super administrator privileges. At this point, the introduction of network DOS command has come to an end. The purpose of this introduction is only to impress novice network managers and let them know the importance of being familiar with and mastering network DOS commands. In fact, network-related DOS commands are far more than these. Here I just throw a brick to attract jade, hoping to help the majority of novice network management. Learning DOS well is of great help to a good network administrator, especially to master some network DOS commands. In addition, we should be clear that anyone who wants to access the system must have a legitimate user name and password (the loopholes in the input method are almost extinct), even if you have only a small authority to obtain an account, you can use it to achieve the ultimate goal. Therefore, resolutely put an end to empty passwords and add a strong password to your account, which is the best way to prevent the invasion of weak passwords. Finally, I sincerely say that it is most important to cultivate a good sense of security. Command Collection Start → Run → Command Collection
Winver- check the Windows version.
Wmimgmt.msc-Open Window Management Architecture (WMI).
Wupdmgr-windows updater
Wscript-Windows Script Host Settings
writting tablet
Winmsd- system information
Wiaacmgr-Scanner and Camera Wizard
Winchat-XP has a local network chat function. To show the memory usage.
Msconfig.exe- System Configuration Utility
Mplayer2-Simple widnowsmediaplayer
drawing board
MSTSC- Remote Desktop Connection
Mplayer2-Media Player
Magnifying glass tool
MMC- Open the console.
Synchronization command dxdiag- check DirectX information.
Drwtsn32-System Doctor
device manager
DFRG。 Disk defragmenter
Diskmgmt.msc-disk management tool
Open the system component service.
DDE sharing-opens the DDE sharing settings.
DVD playback -DVD player's messenger-Stop the messenger service.
Startmessenger-start the messenger service.
Notepad-Open Notepad.
NSLookup- Network Management Tools Wizard
NTBackup-system backup and restore
Narrator-screen "Narrator"
Ntmsmgr.msc-mobile storage manager
Ntmsoprq.msc-Mobile Storage Administrator Operation Request
Stat-an-(TC) command check interface syncapp-create briefcase.
System configuration editor
File signature verification program
Sndrec32-recorder
Shrpubw-Create Shared Folder
Secpol.msc-local security policy
Syskey-system encryption, once encrypted, it cannot be unlocked, which protects the double password of windowsxp system.
Services.msc-local service settings
Sndvol32-Volume Control Program
Sfc.exe system file checker
SFC/scannow-Windows file protection tsshutdn-60-second countdown shutdown command
Tourstart-xp xp introduces XP (roaming XP program after installation)
Taskmgr- Task Manager Event Viewer
Eudcedit- word formation program
Browser-Opens the browser.
Packager-Object Packaging
Perfmon.msc-computer performance monitoring program
Project Manager of regedit.exe Registration Center
Rsop.msc-group policy result set
Regedt32-Registry Editor
Rononce-p- 15 seconds off.
Regsvr32/u *。 Stop running the dll file.
Regsvr32/uZIPfldr.dll-Cancel zip support for cmd.exe-cmd command prompt.
Chkdsk.exe-Chkdsk disk check
Certmgr.msc-certificate management utility
Calc- start the calculator.
Charmap- Starts the character mapping table.
Cliconfg-SQL Server client network utility
Clipbook viewer
Conf- start the meeting.
Master of Computer Management
Cleanmgr-garbage disposal
Ciadv.msc-indexing service OSK- open the on-screen keyboard.
Odbcad32-ODBC data source manager
Oobe/msoobe/a- check whether XP is activated.
Lusrmgr.msc-local users and groups
LOGOFF-logout command iexpress-Trojan binding tool, the system comes with Nslookup-IP address detector fsmgmt.msc-shared folder manager utilman-auxiliary tool manager gpedit.msc-
- Related articles
- Free fortune telling life ups and downs _ free fortune telling life details
- Among the twelve constellations, what are the four constellations with the purest feelings?
- Fortune-telling _ Yi Xue numerology Teacher Tang
- A film starring Daniel Wu, whose content is that Daniel Wu is an ugly man and a lucky man in a conspiracy.
- /kloc-Can you tell your fortune at the age of 0/8? Can zhi Hu _ 18 be a fortune teller? Zhihu.
- Kneel down and ask the master to tell the fortune of the boy born at 1 am on June 1988, and support 20 points. It's urgent, so thank you
- Chen Zehui female 44-year-old fortune teller.
- Lvliang fortune teller _ Lvliang fortune teller.
- Sichuan dialect fortune-telling encyclopedia download _ Sichuan dialect fortune-telling encyclopedia download mobile version
- What does good fortune in fortune telling mean?