Cool CMD Commands For Hacking
Cool CMD Commands For Hacking
CMD is the command-line interpreter on Windows OS, with the help of achieving
anything on your PC/Laptop. However, hackers are advanced users who know how
to use Command Prompt to their full benefit. Hence, here is a list of CMD
commands for hacking.
Table of Contents:
1. Ping
2. nslookup
3. tracert
4. arp
5. route
6. ipconfig
7. netstat
8. Net User
9. Net View
10.Tasklist
11.iexplore
12.Pathping
13.Net Use
14.Getmac
15.Netsh
1. Ping
This command helps you see if the host you are pinging is alive, which ensures it’s
ready when the ping command is executed.
Code:
2. nslookup
This command has several features. One is for DNS IP resolution.
Code:
nslookup www.google.com
Code:
3. tracert
It helps you to follow the route when a packed IP is ready to hit a target. The
command estimates and demonstrates the time it takes for the hop to reach a
destination.
Code:
4. arp
This command shows you the arp table. However, you can check if anyone has
poisoned arp on your LAN using this command.
Code:
arp -a
5. route
This command will display the routing table, portal, interface, and metric.
Code:
route print
6. ipconfig
This command gives you all the valuable information such as an address, Firewall,
DNS, etc. This command will send all this detail. However, you will have it for all
networks.
Code:
Code:
netstat or netstat-a(this will display you listening ports and connections with DNS
names) netstat-n(this tells you all the open IP addresses) netstat-an(this is a
combination of both)
8. Net User
This command changes the windows user password without the knowledge of the
previous password.
Code:
9. Net View
This command shows the complete list of computers, services, or domains used by
your computer.
Code:
10. Tasklist
This command opens the command prompt for an entire Task Manager. Users
merely need to enter a CMD task list, and the list of all operational tasks are
displayed.
For instance, if you want to destroy PID 1532, then use the command.
Code:
11. iexplore
Hackers use iexplore to run web pages and applications.
You can even use iexplore <IP address> in order to locate web pages they work on
some single IP address.
12. Pathping
The pathping command is much like the tracert but provides more detail. It takes
some time to complete the commands while evaluating the direction and measuring
the failure of packets.
Code:
14. Getmac
Getmac command is used to access the MAC address. For instance, you have a
separate MAC address on your Ethernet, WLAN. The Getmac command is then
used to access the MAC address in the hardware of the computer.
15. Netsh
With netsh command, you can program almost every aspect of your network
adapter.
Therefore, here are the best CMD commands used for hacking. There are many
more commands to explore; we have just listed a few of them for your reference.