Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

GUJARAT FORENSIC SCIENCES UNIVERSITY

INSTITUTE OF MANAGEMENT & TRAINING

COURSE: MBA IN FORENSIC ACCOUNTING

Assignment

Subject : Digital Forensic Analysis and Legal Aspects Of Forensic


Accounting.

Semester – III

SUBMITTED TO SUBMITTED BY

Prof. Nilay Mistry Babli Yadav(24)

1
2
1. PING COMMAND

Ping is used to test the ability of one network host to communicate with another. Simply enter
the Ping command, followed by the name or the IP address of the destination host. Assuming
that there are no network problems or firewalls preventing the ping from completing, the
remote host will respond to the ping with four packets. Receiving these packets confirms that
a valid and functional network path exists between the two hosts.

3
2. NBT STAT COMMAND

NetBIOS over TCP/IP can occasionally break down. The NbtStat command can help you to
diagnose and correct such problems. The NbtStat -n command for example, shows the
NetBIOS names that are in use by a device. The NbtStat -r command shows how many
NetBIOS names the device has been able to resolve recently.

4
3. ARP COMMAND

ARP Command is a TCP/IP utility and Microsoft Windows command for viewing and
modifying the local Address Resolution Protocol (ARP) cache, which contains recently
resolved MAC addresses of Internet Protocol (IP) hosts on the network.

5
4. ASSOC COMMAND

ASSOC is a command that displays the program and/or functionality ASSOCiated with a
specific file type. This particular CLSID is frequently misrepresented by scammers as being a
unique identifier of the victim's system and/or a license ID for the Windows operating system.

6
5. DIR COMMAND

DIR is a command in various computer operating systems used for computer file and directory
listing. It is one of the basic commands to help navigate the file system. The command is
usually implemented as an internal command in the command-line interpreter.

7
6. NS LOOKUP

NS LOOKUP is a network administration command-line tool available in many computer


operating systems for querying the Domain Name System (DNS) to obtain domain name or IP
address mapping, or other DNS records. The name "NS LOOKUP" means "name server
lookup".

8
7. PATH PING COMMAND

Entering the PathPing command followed by a host name initiates what looks like a somewhat
standard Tracert process. Once this process completes however, the tool takes 300 seconds
(five minutes) to gather statistics, and then reports latency and packet loss statistics that are
more detailed than those provided by Ping or Tracert.

9
8. ROUTE COMMAND

IP networks use routing tables to direct packets from one subnet to another. The Windows
Route utility allows you to view the device’s routing tables. To do so, simply type Route
Print.The cool thing about the Route command is that it not only shows you the routing table,
it lets you make changes. Commands such as Route Add, Route Delete, and Route Change
allow you to make routing table modifications on an as needed basis.

10
9. SFC COMMAND

The sfc /scannow command will scan all protected system files, and replace corrupted files
with a cached copy that is located in a compressed folder at %WinDir%\System32\dllcache.
The %WinDir% placeholder represents the Windows operating system folder. ... Windows
Resource Protection did not find any integrity violations.

11
10. SYSTEM INFO COMMAND

The systeminfo command displays a list of details about your operating system, computer
hardware and software components. You see details such as the version of the operating system
installed on your computer, the status of your RAM or the processor that you have. There's also
some network information, like the IP and the MAC addresses of your network cards.

12
B

13

You might also like