Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

100 commands commonly used under windows cmd

2025-01-30 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Gpedit.msc-- Group Policy

2. Sndrec32--- tape recorder

3. Nslookup---IP address detector is a command-line tool to monitor whether the DNS server in the network can correctly implement domain name resolution. It can be used in Windows NT/2000/XP, but it is not integrated in Windows 98.

4. Explorer--- opens the explorer

5. Logoff--- logout command

6. Shutdown---60 second countdown shutdown command

7. Lusrmgr.msc-- native users and groups

8. Services.msc- local service settings

9. Oobe/msoobe / aMel-check if XP is activated

10. Notepad---, open your notepad

11. Cleanmgr--- garbage sorting

12. Net start messenger-- starts messenger service

13. Compmgmt.msc- computer management

14. Net stop messenger-- stops messenger service

15. Conf---- starts netmeeting

16. Dvdplay---DVD player

17. Charmap--- startup character mapping table

18. Diskmgmt.msc- disk Management Utility

19. Calc---- starts the calculator

20. Dfrg.msc--- disk Defragmenter

21. Chkdsk.exe--Chkdsk disk check

twenty-two。 Devmgmt.msc- device Manager

23. Regsvr32 / u * .dll-- stops running the dll file

24. Drwtsn32-- Systems Doctor

25. Rononce-PMurray shuts down for 15 seconds

twenty-six。 Dxdiag--- checks DirectX information

twenty-seven。 Regedt32--- Registry Editor

twenty-eight。 Msconfig.exe- system configuration Utility

twenty-nine。 Rsop.msc--- Group Policy result set

thirty。 Mem.exe--- displays memory usage

thirty-one。 Regedit.exe-- registry

thirty-two。 Winchat---XP has its own local area network chat

thirty-three。 Progman--- Program Manager

thirty-four。 Winmsd--- system Information

thirty-five。 Perfmon.msc-- computer performance Monitoring Program

thirty-six。 Winver--- checks the Windows version

thirty-seven。 Sfc / scannow-- scan error and recovery

thirty-eight。 Taskmgr-- Task Manager (2000/xp/2003

thirty-nine。 Winver--- checks the Windows version

forty。 Wmimgmt.msc-- Open windows Management Architecture (WMI)

forty-one。 Wupdmgr---windows updater

forty-two。 Wscript---windows script hosting Settings

forty-three。 Write---- WordPad

forty-four。 Winmsd--- system Information

forty-five。 Wiaacmgr--- Scanner and camera Wizard

forty-six。 Winchat---XP has its own local area network chat

forty-seven。 Mem.exe--- displays memory usage

forty-eight。 Msconfig.exe- system configuration Utility

forty-nine。 Mplayer2--- simple widnows media player

fifty。 Mspaint--- drawing board

fifty-one。 Mstsc---- remote Desktop connection

fifty-two。 Mplayer2--- Media player

fifty-three。 Magnify--- magnifying glass utility

fifty-four。 Mmc---- opens the console

fifty-five。 Mobsync--- synchronization command

fifty-six。 Dxdiag--- checks DirectX information

fifty-seven。 Iexpress---*** binding tool, the system comes with 58. Fsmgmt.msc-- shared folder Manager

fifty-nine。 Utilman--- accessibility Manager

sixty。 Diskmgmt.msc- disk Management Utility

sixty-one。 Dcomcnfg--- opens the system component service

sixty-two。 Ddeshare--- opens DDE sharing settings

sixty-three。 Osk----, open the on-screen keyboard.

sixty-four。 Odbcad32---ODBC data Source Manager

sixty-five。 Oobe/msoobe / aMel-check whether XP is activated or not. Logoff--- logout command

sixty-six。 Notepad---, open your notepad.

sixty-seven。 Tools Wizard for nslookup--- Network Management

sixty-eight。 Ntbackup--- system backup and restore

sixty-nine。 Narrator--- screen "narrator"

seventy。 Ntmsmgr.msc-- Mobile Storage Manager

seventy-one。 Ntmsoprq.msc- mobile storage administrator operation request

seventy-two。 The netstat-an-- (TC) command checks the interface

seventy-three。 Syncapp--- creates a briefcase

seventy-four。 Sysedit--- system configuration Editor

seventy-five。 Sigverif--- file signature verifier

seventy-six。 Ciadv.msc-- Index Service Program

seventy-seven。 Shrpubw--- creates a shared folder

seventy-eight。 Secpol.msc-- Local Security Policy

seventy-nine。 Syskey--- system encryption, once encrypted can not be unlocked, protect the double password of windows xp system

eighty。 Services.msc- Local Service Settings

eighty-one。 Sndvol32--- volume control program

eighty-two。 Sfc.exe--- system File Checker

eighty-three。 Sfc / scannow-windows file protection

eighty-four。 Ciadv.msc-- Index Service Program

eighty-five。 Introduction to tourstart--xp (roaming xp program that appears after installation)

eighty-six。 Taskmgr--- Task Manager

eighty-seven。 Eventvwr--- event Viewer

eighty-eight。 Eudcedit--- word-making program

eighty-nine。 Compmgmt.msc- computer management

ninety。 Packager--- object wrapper

ninety-one。 Perfmon.msc-- computer performance Monitoring Program

ninety-two。 Charmap--- startup character mapping table

ninety-three。 Cliconfg---SQL SERVER client Network Utility

ninety-four。 Clipbrd--- Clipboard Viewer

ninety-five。 Conf---- starts netmeeting

ninety-six。 Certmgr.msc-- Certificate Management Utility

ninety-seven。 Regsvr32 / u * .dll-- stops running the dll file

ninety-eight。 Regsvr32 / u zipfldr.dll-- cancels ZIP support

ninety-nine。 Cmd.exe---CMD command prompt

one hundred。 Chkdsk.exe--Chkdsk disk check

Disk operation

Fdisk implied parameter / mbr reconstruction master boot record fdisk / mbr rebuild master boot record

Fdisk adds the / cmbr parameter after DOS7.0 to reconstruct the master boot record of the subsequent hard disk when multiple physical hard drives are attached, such as fdisk / cmbr 2, which can rewrite the master boot record of the second hard disk. (be very careful when using it to avoid damaging the good hard disk boot record.)

Format parameter: / Q Quick format / u unrecoverable / autotest does not prompt / s to create MS-DOS boot disk format c: / Q / u / autotest

Directory operation

DIR [directory name or file name] [/ S] [/ W] [/ P] [/ A] lists directory parameters: / s look up subdirectories / w only show file names / p pages / a show hidden files DIR format.exe / s find the format.exe file of the disk and report the location

MD (MKDIR) [directory name] create directory MKDIR HELLOWORLD create HELLOWORLD directory

CD (CHDIR) [directory name] PS: you can use relative or absolute directories to enter the directory CD AA to enter the AA directory under the current folder, cd. Enter the previous folder cd\ to return to the root directory; cd c:\ windows enter the c:\ windows folder

RD (RMDIR) [directory name] Delete directory RD HELLOWORLD delete HELLOWORLD directory

File operation

Delete the directory and its files: rmdir [directory name or file name] [/ S] [/ W] [/ P] [/ A]. For example, rmdir c:\ qqdownload/s deletes the qqdownload directory of disk C.

Del [directory name or file name] [/ f] [/ s] [/ Q] delete parameter: / f delete read-only file / s delete all contents of the directory and its underneath / Q do not confirm before deletion

Del c:\ del / s / Q automatically deletes the del directory of disk c.

Copy [source file or directory] [destination directory] copy the file copy d:\ pwin98. C:\ presetup copies all the files of the pwin98 of disk d to the presetup of disk C.

Attrib [parameter] [source file or directory] file attribute operation command, attrib command can list or modify file attributes on disk, including document (A), read-only (R), hidden (H), system (S), for example: attrib-h-r-s io.sys will remove the read-only, hidden and system attributes of the DOS system file io.sys file after executing this command. At this point you will be able to see the io.sys file directly through the dir command. Attrib + h + r + s autoexec.bat will add the above attributes to the automatic batch file.

Memory operation

Debug debug memory parameter-w [file name] write binary file-o [address 1] [address 2] output memory-Q exit exp:o 70 10 [return] o 71 01

[return] 01 [return] Q [return] DOS change the value of the corresponding location where the BIOS password is stored in CMOS by writing 70h/71h PORT to clear the AWARD BIOS password. Debug can also crack the hard disk protection card, but it can only be used in pure DOS.

Partition operation

The partition of a disk is generally divided into four partitions. the disk partition is composed of primary partition, extended partition and logical partition.

Both PQ and Acronis Disk Director can resize partitions and merge without losing data. In XP systems, if you use PQ,WIN7 systems, you can use Acronis Disk Director to operate basically the same. You can go to online tutorials to have a look. You can resize partitions without reinstalling the system, but it is recommended that you back up the data before adjusting. After all, the operation of the hard disk directly has a certain degree of danger.

Other actions

Net use ipipc$ "" / user: "" establish an empty IPC link

Net use ipipc$ "password" / user: "user name" to establish an IPC non-empty link

Net use h: ipc$ "password" / user: "user name" is mapped to the other party after logging in directly. C: to the local is H:

Net use h: after ipc$ login, map the other party C: to the local H:

Net use ipipc$ / del remove IPC link

Net use h: / del removes the mapping from the other party to the local H:

Net user username password / add establish user

Net user guest / active:yes activate guest user

Net user to see which users there are.

Net user account name View the properties of the account

Net localgroup administrators username / add adds "user" to the administrator to give it administrator privileges

Net start to see which services are enabled

The net start service name enables the service (e.g. net start telnet, net start schedule)

Net stop service name stop a service

Net time target ip to check each other's time

Net time target ip / set sets the local computer time to synchronize with the time of the "target IP" host, plus the parameter / yes to cancel the confirmation message

Net view to see which shares are enabled on the local LAN

Net view ip to check which shares are enabled in each other's local area network.

Net config display system network settings

Net logoff disconnected sharing

Net pause service name pauses a service

Net send ip "text message" sends messages to each other.

Types and information of network connections in use within the net ver LAN

Net share to view locally opened shares

Net share ipc$ enables ipc$ sharing

Net share ipc$ / del delete ipc$ share

Net share c$ / del delete C: share

Net user guest 12345 changes the password to 12345 after logging in with guest.

Net password password change system login password

Netstat-a to check which ports are open, usually netstat-an

Netstat-n to view the network connection of the port, commonly used netstat-an

Netstat-v to view the work in progress

Netstat-p protocol name example: netstat-p tcq/ip to view the usage of a protocol

Netstat-s to view the usage of all protocols in use

If one of the ports of nbtstat-An ip is open, you can check the user name of the last login of the other party.

Tracert-the parameter ip (or computer name) tracks the route (packet), and the parameter "- w digit" is used to set the timeout interval.

Ping ip (or domain name) sends data with a default size of 32 bytes to the other host. The parameter: "- l [space] packet size"; "- n times of data sent"; "- t" refers to ping all the time.

Ping-t-l 65550 ip ping of death (sending files greater than 64K and ping all the time becomes the ping of death)

Ipconfig (winipcfg) is used for windows NT and XP (windows 9598) to view the local ip address. The parameter "/ all" available for ipconfig displays all configuration information.

Tlist-t shows the process in a tree line list (an additional tool for the system, which is not installed by default, in the Support/tools folder of the installation directory)

Kill-F process name plus-F parameter to force the termination of a process (an additional tool for the system, which is not installed by default, is in the Support/tools folder of the installation directory)

After adding the-F parameter to the del-F file name, you can delete read-only files. / AR, / AH, / AS, / AA means to delete read-only, hidden, system, and archived files, respectively. / AMUR, / AMUH, / AMUS, / AMUE A means to delete files other than read-only, hidden, system and archive. For example, "DEL/AR." Deletes all read-only files in the current directory, "DEL/A-S." Deletes all files except system files in the current directory

Del / S / Q directory or use: rmdir / s / Q directory / S to delete the directory and all subdirectories and files under the directory. At the same time, use the parameter / Q to cancel the deletion operation and delete it directly when the system confirms it. (the two commands have the same effect)

Move drive letter path the file name to be moved the path to store the mobile file after the file name is moved, the prompt to confirm the existence of the same file in the mobile directory will be canceled with the parameter / y and will be overwritten directly

Fc one.txt two.txt > 3st.txt compares the two files and outputs the differences to the 3st.txt file. ">" and "> >" are redirect commands.

At id opens a scheduled task that has been registered

At / delete stops all scheduled tasks. With parameter / yes, it stops without confirmation.

At id / delete to stop a registered scheduled task

At views all scheduled tasks

At ip time program name (or a command) / r run a program at a certain time and restart the computer

Finger username @ host to see which users have logged in recently

Telnet ip port is far away and login server, default port is 23

Open ip connects to IP (command after telnet login)

Telnet will enter the local telnet by typing telnet directly on the local machine.

Copy path file name 1 path file name 2 / y copy file 1 to the specified directory as file 2, use the parameter / y to cancel to confirm that you want to rewrite an existing directory file

Copy c:srv.exe ipadmin$ copy the local c:srv.exe to the other party's admin

Copy 1st.jpg/b+2st.txt/a 3st.jpg hides the contents of 2st.txt into 1st.jpg to generate a new 3st.jpg file. Note: 2st.txt file header should be blank in three rows, parameter: / b refers to binary file, / a refers to ASCLL format file.

Copyipadmin$ svv.exe c: or: copyipadmin$. Copy the srv.exe file (all files) under the other party's admini$ share to the local C:

File or directory tree to be copied by xcopy destination address directory name copy file and directory tree, overwrite the same file without prompting with parameter / Y

Use the parameter / e to copy the subdirectories under the directory to the destination address.

Tftp-I own IP (meat machine IP when using meat machine as springboard) get server.exec:server.exe login, download the server.exe of "IP" to the target host c:server.exe parameter:-I means to transfer in binary mode, such as when transferring exe files, if you do not add-I, transfer in ASCII mode (transfer text file mode)

After tftp-I IP put c:server.exe login, upload the local c:server.exe to the host

The ftp ip port is used to upload files to the server or perform file operations. The default port is 21. Bin refers to binary transfer (executable file feed); defaults to ASCII format transfer (when text files)

Route print shows IP routes, which will mainly show network address Network addres, subnet mask Netmask, gateway address Gateway addres, interface address Interface

Arp looks at and processes the ARP cache. ARP means name resolution and is responsible for parsing an IP into a physical MAC address. Arp-a will display all the information

Start program name or command / max or / min opens a new window and maximizes (minimizes) running a program or command

Mem to view cpu usage

Attrib file name (directory name) view the properties of a file (directory)

Attrib file name-A-R-S-H or + A + R + S + H removes (adds) the archive, read-only, system, hidden attribute of a file, or adds as an attribute with +

Parameters: / Q shows which user the file and directory belong to, / dir C shows the creation time of the file, / dir A shows the time when the file was last accessed, and / TRAV W was last modified.

Date / t, time / t use this parameter, that is, "DATE/T" and "TIME/T" will only display the current date and time, without having to enter a new date and time

Set specifies the environment variable name = the character to assign to the variable sets the environment variable

Set displays all current environment variables

Set p (or other characters) displays all environment variables that currently begin with the character p (or other characters)

Pause pauses the batch program and displays: press any key to continue.

If performs conditional processing in a batch program (see if commands and variables for more instructions)

The goto tag directs the cmd.exe to the tagged line in the batch program (the label must be on a separate line and begin with a colon, for example: ": start" tag)

The call path batch filename calls another batch program from the batch program (see call /? for more instructions)

For executes a specific command on each file in a set of files (see for commands and variables for more instructions)

Echo on or off turns echo on or off. Only use echo without parameters to display the current echo settings.

Echo information displays information on the screen

Echo Information > > pass.txt saves the Information to the pass.txt file

Findstr "Hello" aa.txt looks for the string hello in the aa.txt file

Find a file by find filename

Title title name change CMD window title name

Color color values set the foreground and background colors of the cmd console; 0 = black, 1 = blue, 2 = green, 3 = light green, 4 = red, 5 = purple, 6 = yellow, 7 = white, 8 = gray, 9 = light blue, A = light green, B = light green, C = light red, D = lavender, E = light yellow, F = bright white

Prompt name changes the command prompt displayed by cmd.exe (change C:, D: unified to: EntSky)

Ver displays version information under the DOS window

Winver pops up a window showing version information (memory size, system version, patch version, computer name)

Format drive letter / FS: type format disk, type: FAT, FAT32, NTFS, for example: Format D: / FS:NTFS

Md directory name create directory

Directory replacement file for the replace source file to replace the file

Ren original file name new file name rename file name

Tree displays the directory in a tree structure, and the file names in the folder are listed with the parameter-f

The type file name displays the contents of the text file

More file name displays the output file screen by screen

Command = character to be locked by doskey

Doskey to unlock command = lock command provided for DOS (edit the command line, re-invoke the win2k command, and create a macro). For example: lock dir command: doskey dir=entsky (cannot use doskey dir=dir); unlock: doskey dir=

Taskmgr call-up Task Manager

Chkdsk / F D: check disk D and display status report; add parameter / f and fix errors on disk

Tlntadmn telnt service admn, type tlntadmn, select 3, and then select 8, you can change the telnet service default port 23 to any other port

Exit exits the cmd.exe program or currently, using parameter / B exits the current batch script instead of cmd.exe

The file name of the path path executable sets a path for the executable.

Cmd launches a win2K command interpretation window. Parameters: / eff, / en turn off and enable command extension. For more details, please see cmd /?

Regedit / s registry file name is imported into the registry; parameter / S refers to quiet mode import without any prompt

Regedit / e registry file name export registry

The cacls filename parameter displays or modifies a file access control list (ACL) for NTFS format. Parameters: / D user name: set to deny a user access; / P user name: perm to replace the specified user's access rights; / G user name: perm gives the specified user access rights; Perm can be: n none, R read, W write, C change (write), F full control; for example: cacls D: est.txt / D pub setting d: est.txt deny pub user access.

Cacls filename View the list of access user permissions for the file

REM text content adds annotations to batch files

Netsh view or change local network configuration

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report