0% found this document useful (0 votes)
281 views2 pages

List of Commands For Hacknet

Uploaded by

정캐미
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
281 views2 pages

List of Commands For Hacknet

Uploaded by

정캐미
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

LIST OF COMMANDS FOR HACKNET

Command Example Description


help help 2 This command helps the user to navigate between the different pages
of the help menu. There are three pages that is reached by replacing the
[PAGE NUMBER] with 1, 2 or 3.
scp [filename] scp encrypt.dec bin/ Downloads the selected file to the main server you are connected from.
The downloaded files are by default placed in the ~/home directory.
Programs (.exe), System files (.sys) are placed in ~/bin and ~/system
respectively.
scan scan This command will scan the computers that are connected to Machine
you are currently accessing. This command requires admin access on
the accessed Machine.
rm [filename] [*] rm * to remove all rm filename.txt This command is to remove files within the current directory. Using the
suffix "*" will remove all files from the current directory. This command
cannot however delete the folders within the directory.
ps ps Shows the current processes that are running. It also displays a number
for each process, which is called the PID
kill kill [PID] It is used to kill a process that is running. The PID of any process is
added after the command to remove or abort the process.
Example: kill 102
cd cd .. cd PRIVATE The command is used to navigate between the folders of the machine.
There are two variations on how to use this command. One is to
navigate into a directory, and the other is to navigate out of the current
directory. Adding the folder name as a suffix will allow the user to
navigate into a directory. However, adding two dots as the suffix allows
the user to navigate out of the folder.
mv [FILE] [DESTINATION] Example for renaming: mv The command is used to move or rename a file in the current working
home/FOF_screenplay.doc directory.
home/FOF231_screenplay2.dec

Example for moving: mv


home/FOF_screenplay.doc
bin/FOF_screenplay.doc
Command Example Description
connect [ip/hostname] connect 23.56.59.102 This command is used to connect to different machines with an IP or
Domain.
probe probe This commands scans the ports that are open and are vulnerable. This
also shows if there is a firewall and a proxy system present.
exe exe Shows the available programs, even the ones hidden that are able to be
executed. All executables are to be present within the ~/bin folder to be
executed.
dc or disconnect dc This command disconnects the connected computer. This command
also gets rid of active tracers.
cat [filename] cat screenplay.doc Shows the content of the selected file.
openCDTray openCDTray The command opens the CD tray of the physical computer. This is an
Easter egg.
closeCDTray closeCDTray The command closes the CD Tray of the physical computer. This is an
Easter egg.
reboot [optional: -i] reboot -i The Command reboots the connected computer within a period of 5
seconds. Adding a suffix after the commands forces the connected
computer to be rebooted instantly.
replace [filename] replace [filename] "target" "replacement" This command is to replace the text in a file. The file may or may not be
specified if the file is currently open. If not specified, the command
assumes the open file to be the working file. The target and the
replacement should be written in between the quotes for long text.
analyze analyze This command is to analyze the firewall to find a password that allows
the user to bypass the firewall of the connected computer. 6 passes are
usually required to acquire the password of the firewall.
solve solve [Firewall Solution] This command is user to enable the traffic of the computer after
supping a password that is found using the "analyze" command.
ForkBomb ForkBomb Fills up the RAM of the target computer with garbage, crashing it.

PortHack PortHack Allows access to a system after opening all of the required ports
shell shell Starts up a shell, which can be used to overload a server's Proxy

tutorial tutorial Starts the tutorial sequence

You might also like