Even if you are using Microsoft's system, those dos commands are more or less to understand. Many times we will need to use these commands, which are mostly convenient and good to use. Use, so you still have to look at what commands you can usually use. Here are 8 for everyone:
One, ping
It is used to check whether the network is smooth or the speed of the network connection. command. As an administrator or hacker living on the network, the ping command is the first DOS command that must be mastered. The principle that it uses is this: the machines on the network have uniquely determined IP addresses, and we give the target The IP address sends a data packet, and the other party returns a data packet of the same size. According to the returned data packet, we can determine the existence of the target host, and can initially determine the operating system of the target host. Let's take a look at some of its common operations. First look at the help, type in the DOS window: ping /? Enter. The help screen shown. Here, we only have some basic and useful parameters (the same below).
-t means that the packet will be sent to the destination IP without interruption until we force it to stop. Imagine if you use 100M broadband access and the target IP is a 56K kitten, then it will not take long for the target IP to drop because it can't bear so much data. Oh, an attack is as simple as that.
-l Defines the size of the sent packet. The default is 32 bytes. We can use it to define up to 65500 bytes. Combined with the -t parameter described above, there will be better results.
-n Defines the number of times a packet is sent to the destination IP. The default is 3 times. If the network speed is slow, 3 times is a waste of time for us, because now our purpose is only to determine whether the target IP exists, then it is defined as once.
Explain that if the -t parameter is used with the -n parameter, the ping command will be based on the following parameters, such as "ping IP -t -n 3", although the -t parameter is used. But not always pinging, but only pinging 3 times. In addition, the ping command does not have to ping the IP, you can also directly ping the host domain name, so you can get the host's IP.
Let's take an example to illustrate the specific usage.
Here, time=2 means that the time taken from the time the packet is sent to the time the packet is received is 2 seconds. From here, the speed of the network connection can be judged. The return value from the TTL can be used to preliminarily determine the operating system of the pinged host. The reason why the "predictive judgment" is because the value can be modified. Here TTL=32 means the operating system may be win98.
(Small knowledge: If TTL=128, the target host may be Win2000; if TTL=250, the target host may be Unix)
As for using the ping command, you can quickly find the LAN fault. You can quickly search for the fastest QQ server, you can ping other people … … these are played by everyone.
Second, nbtstat
This command uses NetBIOS on TCP/IP to display protocol statistics and current TCP/IP connections. With this command you can get the NETBIOS information of the remote host, such as the username, The working group, the MAC address of the network card, and so on. Here we need to understand a few basic parameters.
-a Using this parameter, as long as you know the machine name of the remote host, you can get its NETBIOS information (the same below).
-A This parameter also gets the NETBIOS information of the remote host, but you need to know its IP.
-n Lists the NETBIOS information of the local machine.
When you get the IP or machine name of the other party, you can use the nbtstat command to get the other party's information further, which increases the insurance factor of our invasion.
A lot of people have tried Windows To Go and found that no matter how the U disk is formatted, the U
Recently, many users have reflected that using the u disk to make a u disk boot disk, a blue screen
The recycle bin in the system can be used to temporarily store unwanted files in the computer. It ca
Recently, many users are reflecting that every time you turn on the machine, you must always press f
How to solve the problem when Thunder downloads to 99%?
How to prohibit others from accessing the computer C drive?
Identify virus hidden processes
What drivers are needed to successfully install the system
Cut off all black/guest/intrusion paths from the registry
QQ mailbox mail attachment can not be downloaded how to solve?
How to solve the slow loading of u disk?
What problems may exist in the notebook wireless network connection
Windows and linux dual system delete linux
The source and processing method of shutting down the host computer noise
What should I do if I watch a video card with a Win7 computer?
Cleverly hide the drive in Windows system
Grasp the twelve elements and teach you to easily choose a mail server
Win8 one pass: associated Sina Weibo to people application
Win10 official version of the registry how to open win10 registry permissions set graphic tutorial
Several configurations for nginx upstream
Win10 system restores the traditional Win7 control panel method
Super QQ Group Member Extractor (without group) User Guide
Win8 uses Windows update cleanup tool to clean up system disk garbage