100% found this document useful (4 votes)
5K views4 pages

Cool CMD Commands For Hacking

This document provides a list of 15 common command prompt (CMD) commands that can be used for hacking, along with brief descriptions and code examples for each one. The commands include ping, nslookup, tracert, arp, route, ipconfig, netstat, Net User, Net View, Tasklist, iexplore, Pathping, Net Use, Getmac, and Netsh. These commands allow users to view network configurations and connections, trace routes to destinations, manage tasks and processes, access device MAC addresses, and more. The document encourages hackers to learn these essential CMD commands to take full advantage of their capabilities on Windows systems.

Uploaded by

Idris Bala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (4 votes)
5K views4 pages

Cool CMD Commands For Hacking

This document provides a list of 15 common command prompt (CMD) commands that can be used for hacking, along with brief descriptions and code examples for each one. The commands include ping, nslookup, tracert, arp, route, ipconfig, netstat, Net User, Net View, Tasklist, iexplore, Pathping, Net Use, Getmac, and Netsh. These commands allow users to view network configurations and connections, trace routes to destinations, manage tasks and processes, access device MAC addresses, and more. The document encourages hackers to learn these essential CMD commands to take full advantage of their capabilities on Windows systems.

Uploaded by

Idris Bala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Cool CMD Commands for Hacking

CMD is the command-line interpreter on Windows OS, with the help of achieving
anything on your PC/Laptop. However, hackers are advanced users who know how
to use Command Prompt to their full benefit. Hence, here is a list of CMD
commands for hacking.

Table of Contents:

1. Ping
2. nslookup
3. tracert
4. arp
5. route
6. ipconfig
7. netstat
8. Net User
9. Net View
10.Tasklist
11.iexplore
12.Pathping
13.Net Use
14.Getmac
15.Netsh

1. Ping
This command helps you see if the host you are pinging is alive, which ensures it’s
ready when the ping command is executed.

Code:

ping 8.8.8.8(ping x.x.x.x) or ping www.google.com

2. nslookup
This command has several features. One is for DNS IP resolution.

Code:
nslookup www.google.com

The other feature of nslookup is to locate the IP of individual mail servers.

Code:

nslookup(enter) set type = mx(enter) yahoo.com

3. tracert
It helps you to follow the route when a packed IP is ready to hit a target. The
command estimates and demonstrates the time it takes for the hop to reach a
destination.

Code:

tracert x.x.x.x or tracert www.google.com

4. arp
This command shows you the arp table. However, you can check if anyone has
poisoned arp on your LAN using this command.

Code:

arp -a

5. route
This command will display the routing table, portal, interface, and metric.

Code:

route print

6. ipconfig
This command gives you all the valuable information such as an address, Firewall,
DNS, etc. This command will send all this detail. However, you will have it for all
networks.

Code:

ipconfig or ipconfig/all ipconfig/release (this will release IP) ipconfig/renew (this


will renew IP)
7. netstat
This command will display the status of the connection.

Code:

netstat or netstat-a(this will display you listening ports and connections with DNS
names) netstat-n(this tells you all the open IP addresses) netstat-an(this is a
combination of both)

8. Net User
This command changes the windows user password without the knowledge of the
previous password.

Code:

net user yourusername *

9. Net View
This command shows the complete list of computers, services, or domains used by
your computer.

Code:

net view x.x.x.x or computer name

10. Tasklist
This command opens the command prompt for an entire Task Manager. Users
merely need to enter a CMD task list, and the list of all operational tasks are
displayed.

For instance, if you want to destroy PID 1532, then use the command.

Code:

taskkill /PID 1532 /F

11. iexplore
Hackers use iexplore to run web pages and applications.

You can even use iexplore <IP address> in order to locate web pages they work on
some single IP address.
12. Pathping
The pathping command is much like the tracert but provides more detail. It takes
some time to complete the commands while evaluating the direction and measuring
the failure of packets.

Code:

pathping.google.com(change google.com with the one you want to ping with)

13. Net Use


This command is used to link, uninstall, and art up links to various services such as
network printers and other mapped drives.

14. Getmac
Getmac command is used to access the MAC address. For instance, you have a
separate MAC address on your Ethernet, WLAN. The Getmac command is then
used to access the MAC address in the hardware of the computer.

15. Netsh
With netsh command, you can program almost every aspect of your network
adapter.

Therefore, here are the best CMD commands used for hacking. There are many
more commands to explore; we have just listed a few of them for your reference.

You might also like