Professional Documents
Culture Documents
10 Best CMD Commands Used in Hacking
10 Best CMD Commands Used in Hacking
10 Best CMD Commands Used in Hacking
hacking- 2018
Top CMD or MS-DOS prompt commands which
every hacker should know
If you have been following Techworm regularly, chances are you are a very
versatile hacker in your own right and don’t need to know these commands. But
many of our readers who are beginners and want to learn to hack always ask us
for the top Dos Prompt (C:/ or CMD commands in Windows 10/7/8.1) they
should know. So here goes.
CMD is a powerful tool which lets you do almost anything with your PC/laptop.
There are common commands like CD.. and MD etc which you probably know so
we won’t get into that. Here are some really useful things a hacker can do with
CMD commands.
First, open your Network Connection and right click and select Properties.
Then Select TCP/IP and click Properties again. Now Click
on Advanced and WINS tab. Select Default for NeBIOS.
Now back to the main Local Area Connection window, select File and Print
Sharing for Microsoft Networks and hit enter.
This is just to make sure you have NetBIOS enabled. We will have some fun
with NetBIOS on CMD. In case you don’t know how to get CMD by clicking the
Windows icon at the left-hand bottom of your screen in all Windows versions
and click on Start. Press run from the start, then type “cmd” without quotes.
Now here are the important commands which every wannabe
hacker should know:
1) ping : This command will allow you to know if the host you pinging is alive,
which means if it is up at the time of executing the “ping” command.
ping x.x.x.x (x is the IP address). You can try pinging 8.8.8.8 which belongs to
Google
or
Now, another really nice function of nslookup is to find out IP of specific Mail
Severs
Code:
nslookup (enter)
3) tracert : This command will give you the hops that a packet will travel to
reach its final destination. This command is really helpful if you know the route
a packet takes before it goes to the target box.
or
4) arp : This command will show you the arp table. You can find out if anyone
has done arp poisoning in your LAN using this command.
Code:
arp -a
5) route : This command will show you the routing table, gateway, interface
and metric.
Code:
route print
6) ipconfig : This command will show you a lot of useful things like your IP,
Gateway, DNS in use, etc. This command will give all that info but for all
networks, you might have it.
Code:
ipconfig
or
Code:
ipconfig /all
Also, in case you have a dynamic IP and want to change it, then type…
Code:
ipconfig /release (this will release your IP)
Code:
netstat
or
Code:
netstat -a (this will show you all the listening ports and connection with DNS
names)
netstat -n (this will show you all the open connection with IP addresses)
netstat -an (this will combined both of the above)
net view x.x.x.x or computername (will list the available sharing folders on the
target box)
8) netuser: This command reset Windows User Password without Knowing Old
Password.
9) Net View: This command displays the whole list of resources, computers or
domains that are shared by the specified computer.
code:
net view x.x.x.x or computername
10) Tasklist: This command opens up an entire task manager on the command
prompt. Users just need to enter tasklist on CMD and they will see the list of all
running process.
For eg; If you want to kill PID 1532 process then you can enter the command-
Code:
taskkill /PID 1532 /F
Here are some additional CMD commands which will help you in
hacking-
Code:
net use \ipaddressipc$ “” /user:administrator
Now if you want to connect to the target and browse the entire C drive,
then use this command:
Code:
net use K: \computernameC$
(this will create a virtual drive on your “my computer” folder)
Please note that this command will only work if the target PC/laptop has not set
an Administrator Password.
Quote:
whatevercommand /help
or
Quote:
whatevercommand /?
Hope you liked the CMD commands listed above. If you have found any
command other than those listed above, kindly note them in the comments for
our other readers.