Friday, February 28, 2014

Top 10 Important command prompt's commands

i know right what hacker still uses windows but if u are this post is for u

1. ipconfig :
                  This is the top most command for seeing the ip address,subnet mask and default gateway also includes display and flush DNS cache, re-register the system name in DNS..  This will most useful tool for viewing and troubleshooting TCP/IP problem.




  • To view ip ,subnet mask address : ipconfig
  • To view all TCP/IP information, use: ipconfig /all
  • To view the local DNS cache, use: ipconfig /displaydns
  • To delete the contents in the local DNS cache, use: ipconfig /flushdns 
  •  

2.systeminfo

Have a need to display operating system configuration information for a local or remote machine, including service pack levels? Then systeminfo is the tool to use. When I need to connect to a system that I am not familiar with, this is the first tool I run. The output of this command gives me all the info I need including: host name, OS type, version, product ID, install date, boot time and hardware info (processor and memory). Also knowing what hot fixes are installed can be a big help when troubleshooting problems. This tool can be used to connect to a machine remotely using the following syntax: SYSTEMINFO /S system /U user


3. tasklist and taskkill 

If you work with Task Manager (ctrl+alt+del) ,you can easily understand this.  Task list is list of task which are running on windows currently.  If you open any application,it will be added to task.

To List the Tasks type in cmd as :

          tasklist
 This will show the list of task which are running as shown in the picture




To stop the Process or task ,there is two methods :
Using Image Name:
   We can kill the task using its Image Name as follows:
                       tasklist /im notepad.exe

Using Process Id:
  we can stop the process using its process id as follows :
                tasklist /pid 1852




4. type
 type is used to read the text document in command prompt .  You can read multiple text in continuously

type filename.txt


5.netstat
Need to know who (or what) is making a connection to your computer? Then netstat is the tool you want to run. The output provides valuable information of all connections and listening ports, including the executable used in the connections. In additon to the above info, you can view Ethernet statistics, and resolve connecting host IP Addresses to a fully qualified domain name. I usually run the netstat command using the -a (displays all connection info), -n (sorts in numerical form) and -b (displays executable name) switches.


6.net command
Although this tool is more known as a command, the net command is really like a power drill with different bits and is used to update, fix, or view the network or network settings.
It is mostly used for viewing (only services that are started), stopping and starting services:
    • net stop server
    • net start server
    • net start (display running services)
and for connecting (mapping) and disconnecting with shared network drives:
    • net use m: \\myserver\sharename
    • net use m: \\myserver\sharename /delete
Other commands used with net command are, accounts (manage user accounts), net print (manage print jobs), and net share (manage shares).
Below are all the options that can be used with the net command.
[ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP |HELPMSG | LOCALGROUP | PAUSE | PRINT | SESSION | SHARE | START |STATISTICS | STOP | TIME | USE | USER | VIEW ]

7 - nslookup - With the Internet, DNS (Domain Name Service) is the key for allowing us to use friendly names when surfing the web instead of needing to remember IP Addresses. But when there are problems, nslookup can be a valuable tool for testing and troubleshooting DNS servers.
Nslookup can be run in two modes: interactive and noninteractive. Noninteractive mode is useful when only a single piece of data needs to be returned. For example, to resolve google.com:






To use the interactive mode, just type nslookup at the prompt. To see all available options, type help while in interactive mode.






Don't let the help results intimidate you. Nslookup is easy to use. Some of the options I use when troubleshooting are:
set ds (displays detailed debugging information of behind the scenes communication when resolving an host or IP Address).
set domain (sets the default domain to use when resolving, so you don't need to type the fully qualified name each time).
set type (sets the query record type that will be returned, such as A, MX, NS)
server NAME (allows you to point nslookup to use other DNS servers than what is configured on your computer)
To exit out of interactive mode, type exit .

8 - ping and tracert - These tools can be helpful with connectivity to other systems. Ping will test whether a particular host is reachable across an IP network, while tracert (traceroute) is used to determine the route taken by packets across an IP network.
To ping a system just type at the prompt: ping www.google.com. By default, ping will send three ICMP request to the host and listen for ICMP “echo response” replies. Ping also includes switches to control the number of echo requests to send (-n ), and to resolve IP addresses to hostname (-a ).
To use tracert, type at the prompt: tracert www.google.com. You can force tracert to not resolve address to hostnames by using the -d switch, or set the desired timeout (milliseconds) for each reply using -w switch.


9 - gpresult - Used mostly in environments that implement group poicies, gpresults (Group Policy Results) verifies all policy settings in effect for a specific user or computer. The command is simple to use, just enter gpresults at the prompt. It can also be used to connect to computers remotely using the /S and /U switches.

10 - netsh - Without a doubt the most powerful command line tool available in Windows. Netsh is like the swiss army knife for configuring and monitoring Windows computers from the command prompt. It capabilities include:

  • Configure interfaces
  • Configure routing protocols
  • Configure filters
  • Configure routes
  • Configure remote access behavior for Windows-based remote access routers that are running the Routing and Remote Access Server (RRAS) Service
  • Display the configuration of a currently running router on any computer
Some examples of what you can do with netsh:
  • Enable or disable Windows firewall:
netsh firewall set opmode disable
netsh firewall set opmode disable
  • Enable or disable ICMP Echo Request (for pinging) in Windows firewall:
netsh firewall set icmpsetting 8 enable
netsh firewall set icmpsetting 8 disable
  • Configure your NIC to automatically obtain an IP address from a DHCP server:
netsh interface ip set address "Local Area Connection" dhcp
(For the above command, if your NIC is named something else, use netsh interface ip show config and replace the name at Local Area Connection).
As you can see netsh can do alot. Instead of re-inventing the wheel, check out the following Microsoft article for more info on netsh.

Lawsuit against Google over Gmail faces hurdle, U.S. judge says

An employee answers phone calls at the switchboard of the Google office in Zurich August 18, 2009. REUTERS/Christian Hartmann

(Reuters) - A U.S. judge on Thursday said some plaintiffs accusing Google of improperly scanning their email faced a significant hurdle in their attempt to move forward with the lawsuit as a class action.

Litigation brought by nine plaintiffs, some Gmail users, some not, was consolidated before U.S. District Judge Lucy Koh in San Jose, California, last year. The plaintiffs maintain Google violated several laws, including federal anti-wiretapping statutes by systematically crossing the "creepy line" to read private email messages in order to profit, according to court documents.

The case is being closely watched as it could alter how tech companies provide email service.
Koh must decide whether the lawsuit can proceed as a class action, which would allow the plaintiffs to sue as a group and give them more leverage to extract a larger settlement. However, at a hearing on Thursday, Koh said plaintiff attorneys faced a "huge hurdle" to show that non-Gmail users were entitled to class action status.

Google argues in court papers that the identity of impacted non-Gmail users can only be ascertained by sending an email notice to all non-Gmail users whose addresses are on file in Google's systems, and then sifting through the responses. That kind of procedure would be unprecedented and unworkable, Google argued.

Koh did not issue a formal ruling on Thursday. A group of media companies, including Reuters, has asked Koh to make public several documents that both sides submitted to the court under seal. Koh has not yet ruled on that request.

The case in U.S. District Court, Northern District of California is In Re: Google Inc. Gmail Litigation, 13-md-2430.

British man charged with hacking Federal Reserve computers


(Reuters) - A British man has been charged with hacking into computer servers belonging to the U.S. Federal Reserve, and then widely disclosing personal information of people who use them.
Thursday's charges against Lauri Love were announced four months after he was arrested in England, and accused by U.S. and British authorities of hacking into various U.S. government computer systems, including those run by the military.

According to the latest indictment, Love, who is in his late-20s, worked with other hackers from October 2012 to February 2013 to infiltrate the Federal Reserve's system.
The Suffolk resident allegedly used a hacking method called a "sequel injection" to access names, email addresses and phone numbers, and then post the stolen information to a website he controlled after a prior hacking.

Prosecutors said Love boasted about his activity in a chatroom under names such as "peace" and "Smedley Butler," once saying he planned to "drop another little federal reserve bomb," meaning he would disclose confidential information.

"Lauri Love is a sophisticated hacker," U.S. Attorney Preet Bharara in New York said in a statement. "We place a high priority on the investigation and prosecution of hackers who intrude into our infrastructure and threaten the personal security of our citizens."
The extent of the theft was not immediately clear.

Last February, the Fed said one of its internal websites had been breached briefly, after a claim that hackers linked to the group Anonymous stole and published personal information on more than 4,000 U.S. bank executives.

Thursday's grand jury indictment charges Love with one count each of computer hacking and aggravated identity theft.

He faces a maximum of 10 years in prison on the hacking charge and another two years on the identity theft charge, if convicted.

A lawyer for Love could not immediately be reached. Jim Strader, a spokesman for the Federal Reserve Bank of Richmond, Virginia, declined to elaborate on the new charges. The U.K. Serious Frauds Office did not immediately respond to requests for comment.

In the earlier case, investigators said Love and three unnamed co-conspirators, including two in Australia and one in Sweden, infiltrated thousands of systems, including those of the Pentagon's Missile Defense Agency, the space agency NASA and the U.S. Environmental Protection Agency.
Criminal charges in that case were filed with the federal court in Alexandria, Virginia. Love has not entered a plea.

The New York case is U.S. v. Love, U.S. District Court, Southern District of New York, No. 14-cr-00126. The Virginia case is U.S. v. Love, U.S. District Court, Eastern District of Virginia, No. 13-mj-00657.

(Reporting by Jonathan Stempel in New York; Additional reporting by Jim Finkle in Boston and Guy Faulconbridge in London; Editing by James Dalgleish and Gunna Dickson)