Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

A complete Collection of commands in Local area Network

2025-03-26 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/02 Report--

Net view can see all the machines in the local area network, and then you can see it in PING. This method may be stupid, but it is very useful.

Lan dos command set

Net use\ ip\ ipc$ "" / user: "" establish an empty IPC link

Net use\ ip\ ipc$ "password" / user: "user name" to establish an IPC non-empty link

Net use h:\ ip\ c $"password" / user: "user name" is directly logged in and mapped to the other party. C: to the local is H:

Net use h:\ ip\ c$ after login, map the other party C: to the local H:

Net use\ ip\ ipc$ / del remove the IPC link

Net use h: / del removes the mapping from the other party to the local H:

Net user username password / add establish user

Net user g

St / active:yes Activation g

St user

Net user to see which users there are.

Net user account name View the properties of the account

Net localgroup istrators user name / add adds "user" to the administrator to give it administrator privileges. Note: add s to the plural after istrator.

Net start to see which services are enabled

The net start service name enables the service (e.g. net start telnet,net start schedule)

Net stop service name stop a service

Net time\ Target ip to check each other's time

Net time\ Target ip / set sets the local computer time to synchronize with the time of the "target IP" host, plus the parameter / yes to cancel the confirmation message

Net view to see which shares are enabled on the local LAN

Net view\ ip to see which shares are enabled on each other's local area network

Net config display system network settings

Net logoff disconnected sharing

Net pause service name pauses a service

Net send ip "text message" sends messages to each other.

Types and information of network connections in use within the net ver LAN

Net share to view locally opened shares

Net share ipc$ enables ipc$ sharing

Net share ipc$ / del delete ipc$ share

Net share c$ / del delete C: share

Net user g

St 12345 uses g

After logging in, st users change their password to 12345.

Net password password change system login password

Netstat-a to check which ports are open, usually netstat-an

Netstat-n to view the network connection of the port, commonly used netstat-an

Netstat-v to view the work in progress

Netstat-p protocol name example: netstat-p tcq/ip to view a protocol usage (view tcp/ip protocol usage)

Netstat-s to view the usage of all protocols in use

If one of the ports of nbtstat-An ip is open, you can check the user name of the last login of the other party (user name before 03)-Note: parameter-A should be capitalized.

Tracert-the parameter ip (or computer name) tracks the route (packet), and the parameter "- w digit" is used to set the timeout interval.

Ping ip (or domain name) sends data with a default size of 32 bytes to the other host. The parameter: "- l [space] packet size"; "- n times of data sent"; "- t" refers to ping all the time.

Ping-t-l 65550 ip ping of death (sending files greater than 64K and ping all the time becomes the ping of death)

Ipconfig (winipcfg) is used for windows NT and XP (windows 9598) to view the local ip address. The parameter "/ all" available for ipconfig displays all configuration information.

Tlist-t shows the process in a tree line list (an additional tool for the system, which is not installed by default, in the Support/tools folder of the installation directory)

Kill-F process name plus-F parameter to force the termination of a process (an additional tool for the system, which is not installed by default, is in the Support/tools folder of the installation directory)

After adding the-F parameter to the del-F file name, you can delete read-only files. / AR, / AH, / AS, / AA means to delete read-only, hidden, system, and archived files, respectively. / AMUR, / AMUH, / AMUS, / AMUE A means to delete files other than read-only, hidden, system and archive. For example, "DEL/AR." Deletes all read-only files in the current directory, "DEL/A-S." Deletes all files except system files in the current directory

# 2:

Del / S / Q directory or use: rmdir / s / Q directory / S to delete the directory and all subdirectories and files under the directory. At the same time, use the parameter / Q to cancel the deletion operation and delete it directly when the system confirms it. (the two commands have the same effect)

Move drive letter\ path\ File name to be moved path to the mobile file\ after the file name is moved, the prompt to cancel the confirmation that the same file exists in the mobile directory will be directly overwritten with the parameter / y.

Fc one.txt two.txt > 3st.txt compares the two files and outputs the differences to the 3st.txt file. ">" and "> >" are redirect commands.

At id opens a scheduled task that has been registered

At / delete stops all scheduled tasks. With parameter / yes, it stops without confirmation.

At id / delete to stop a registered scheduled task

At views all scheduled tasks

At\ ip time program name (or a command) / r run a program at a certain time and restart the computer

Finger username @ host to see which users have logged in recently

Telnet ip port is far away and login server, default port is 23

Open ip connects to IP (command after telnet login)

Telnet will enter the local telnet by typing telnet directly on the local machine.

Copy path\ file name 1 path\ file name 2 / y copy file 1 to the specified directory as file 2, use the parameter / y to cancel and confirm that you want to rewrite an existing directory file

Copy c:\ srv.exe\ ip*$ copy the local c:\ srv.exe to the other party's * *

Cppy 1st.jpg/b+2st.txt/a 3st.jpg hides the contents of 2st.txt into 1st.jpg to generate a new 3st.jpg file. Note: 2st.txt file header should be blank in three rows, parameter: / b refers to binary file, / a refers to ASCLL format file.

Copy\ ip\ $\ svv.exe c:\ or: copy\ ip*$*. Copy the srv.exe files (all files) under the i$ share of the other party to local C:

The target address of the file or directory tree to be copied by xcopy\ the directory name copies the file and the directory tree, and the same file will not be prompted to overwrite with the parameter / Y

Tftp-I own IP (meat machine IP when using meat machine as springboard) get server.exe c:\ server.exe, download the server.exe of "IP" to the target host c:\ server.exe parameter:-I means to transfer in binary mode, such as when transferring exe files, if you do not add-I, transfer in ASCII mode (transfer text file mode)

After tftp-I IP put c:\ server.exe logs in, upload the local c:\ server.exe to the host

The ftp ip port is used to upload files to the server or perform file operations. The default port is 21. Bin refers to binary transfer (executable file feed); defaults to ASCII format transfer (when text files)

Route print shows IP routes, which will mainly show network address Network addres, subnet mask Netmask, gateway address Gateway addres, interface address Interface

Arp looks at and processes the ARP cache. ARP means name resolution and is responsible for parsing an IP into a physical MAC address. Arp-a will display all the information

Start program name or command / max or / min opens a new window and maximizes (minimizes) running a program or command

Mem to view cpu usage

Attrib file name (directory name) view the properties of a file (directory)

Attrib file name-A-R-S-H or + A + R + S + H removes (adds) the archive, read-only, system, hidden attribute of a file, or adds as an attribute with +

Parameters: / Q shows which user the file and directory belong to, / dir C shows the creation time of the file, / dir A shows the time when the file was last accessed, and / TRAV W was last modified.

Date / t, time / t use this parameter, that is, "DATE/T" and "TIME/T" will only display the current date and time, without having to enter a new date and time

Set specifies the environment variable name = the character to assign to the variable sets the environment variable

Set displays all current environment variables

Set p (or other characters) displays all environment variables that currently begin with the character p (or other characters)

Pause pauses the batch program and displays: press any key to continue.

If performs conditional processing in a batch program (see if commands and variables for more instructions)

The goto tag directs the cmd.exe to the tagged line in the batch program (the label must be on a separate line and begin with a colon, for example: ": start" tag)

Call path\ batch filename calls another batch program from the batch program (see call /? for more instructions)

For executes a specific command on each file in a set of files (see for commands and variables for more instructions)

Echo on or off turns echo on or off. Only use echo without parameters to display the current echo settings.

Echo information displays information on the screen

Echo Information > > pass.txt saves the Information to the pass.txt file

Findstr "Hello" aa.txt looks for the string hello in the aa.txt file

Find a file by find filename

Title title name change CMD window title name

Color color values set the foreground and background colors of the cmd console; 0 = black, 1 = blue, 2 = green, 3 = light green, 4 = red, 5 = purple, 6 = yellow, 7 = white, 8 = gray, 9 = light blue, A = light green, B = light green, C = light red, D = lavender, E = light yellow, F = bright white

Prompt name changes the command prompt displayed by cmd.exe (change C:\, D:\ unified to: EntSky\)

# 3 3:

Ver displays version information under the DOS window

Winver pops up a window showing version information (memory size, system version, patch version, computer name)

Format drive letter / FS: type format disk, type: FAT, FAT32, NTFS, for example: Format D: / FS:NTFS

Md directory name create directory

Directory replacement file for the replace source file to replace the file

Ren original file name new file name rename file name

Tree displays the directory in a tree structure, and the file names in the folder are listed with the parameter-f

The type file name displays the contents of the text file

More file name displays the output file screen by screen

Command = character to be locked by doskey

Doskey to unlock command = lock command provided for DOS (edit the command line, re-invoke the win2k command, and create a macro). For example: lock dir command: doskey dir=entsky (cannot use doskey dir=dir); unlock: doskey dir=

Taskmgr call-up Task Manager

Chkdsk / F D: check disk D and display status report; add parameter / f and fix errors on disk

Tlntadmn telnt service admn, type tlntadmn, select 3, and then select 8, you can change the telnet service default port 23 to any other port

Exit exits the cmd.exe program or currently, using parameter / B exits the current batch script instead of cmd.exe

Path path\ the file name of the executable sets a path for the executable.

Cmd launches a win2K command interpretation window. Parameters: / eff, / en turn off and enable command extension. For more details, please see cmd /?

Regedit / s registry file name is imported into the registry; parameter / S refers to quiet mode import without any prompt

Regedit / e registry file name export registry

The cacls filename parameter displays or modifies a file access control list (ACL) for NTFS format. Parameters: / D user name: set to deny a user access; / P user name: perm to replace the specified user's access rights; / G user name: perm gives the specified user access rights; Perm can be: n none, R read, W write, C change (write), F full control; for example: cacls D:\ test.txt / D p setting d:\ test.txt deny p user access.

Cacls filename View the list of access user permissions for the file

REM text content adds annotations to batch files

Netsh view or change local network configuration

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report