Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Windowns command

2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

# 1 1:

Net use\\ ip\ ipc$ "" / user: "" establish an empty IPC link

Net use\\ ip\ ipc$ "password" / user: "user name" to establish an IPC non-empty link

Net use h:\\ ip\ c $"password" / user: "user name" is directly logged in and mapped to the other party C: to the local H: grep,awk,sed,pxe,kickstart,puppet,crontab,kvm

Net use h:\\ ip\ c$ after login, map each other C: to the local H: openstack,lvs,piranha,keepalived Hangzhou Golden Card Hi-Tech Co., Ltd.

Net use\\ ip\ ipc$ / del remove the IPC link

Net use h: / del removes the mapping from the other party to the local H:

Net user username password / add establish user

Net user guest / active:yes activate guest user

Net user to see which users there are.

Net user account name View the properties of the account

Net localgroup administrators user name / add adds "user" to the administrator to give it administrator privileges. Note: add s to the plural after administrator.

Net start to see which services are enabled

The net start service name enables the service (e.g. net start telnet, net start schedule)

Net stop service name stop a service

Net time\\ Target ip to check each other's time

Net time\\ Target ip / set sets the local computer time to synchronize with the time of the "target IP" host, plus the parameter / yes to cancel the confirmation message

Net view to see which shares are enabled on the local LAN

Net view\\ ip to see which shares are enabled on the other party's LAN

Net config display system network settings

Net logoff disconnected sharing

Net pause service name pauses a service

Net send ip "text message" sends messages to each other.

Types and information of network connections in use within the net ver LAN

Net share to view locally opened shares

Net share ipc$ enables ipc$ sharing

Net share ipc$ / del delete ipc$ share

Net share c$ / del delete C: share

Net user guest 12345 changes the password to 12345 after logging in with guest.

Net password password change system login password

Netstat-a to check which ports are open, usually netstat-an

Netstat-n to view the network connection of the port, commonly used netstat-an

Netstat-v to view the work in progress

Netstat-p protocol name example: netstat-p tcq/ip to view a protocol usage (view tcp/ip protocol usage)

Netstat-s to view the usage of all protocols in use

If one of the ports of nbtstat-An ip is open, you can check the user name of the last login of the other party (user name before 03)-Note: parameter-A should be capitalized.

Tracert-the parameter ip (or computer name) tracks the route (packet), and the parameter "- w digit" is used to set the timeout interval.

Ping ip (or domain name) sends data with a default size of 32 bytes to the other host. The parameter: "- l [space] packet size"; "- n times of data sent"; "- t" refers to ping all the time.

Ping-t-l 65550 ip ping of death (sending files greater than 64K and ping all the time becomes the ping of death)

Ipconfig (winipcfg) is used for windows NT and XP (windows 9598) to view the local ip address. The parameter "/ all" available for ipconfig displays all configuration information.

Tlist-t shows the process in a tree line list (an additional tool for the system, which is not installed by default, in the Support/tools folder of the installation directory)

Kill-F process name plus-F parameter to force the termination of a process (an additional tool for the system, which is not installed by default, is in the Support/tools folder of the installation directory)

After adding the-F parameter to the del-F file name, you can delete read-only files. / AR, / AH, / AS, / AA means to delete read-only, hidden, system, and archived files, respectively. / AMUR, / AMUH, / AMUS, / AMUE A means to delete files other than read-only, hidden, system and archive. For example, "DEL/AR *. *" deletes all read-only files in the current directory, and "DEL/A-S *. *" deletes all files in the current directory except system files.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report