Best CMD Commands Used By Hackers

Posted by

Willing to become a hacker or security expert? There are a whole lot of things to consider. In this article, we have shared some of the most used CMD Commands. So, let’s check out the best CMD Commands Used In Hacking.

Well, if you have been using Windows operating system for a while, then you might be well aware of CMD or Command Prompt. It’s one of the most powerful tools in Windows which is used to operate a wide range of tasks. It’s basically a command-line interpreter that can be used to access the core features of Windows.

Command Prompt is indeed a useful feature, but hackers often use it for the wrong purpose. The command prompt is also used by security experts as well to find potential security loopholes. So, if you are willing to become a hacker or security expert, then this post might help you.

Best CMD Commands Used In Hacking in 2020

In this article, we are about to share some of the best CMD commands that are widely used in Hacking purposes. So, let’s check out the list of best CMD commands for Windows 10 computers.

1. ping

PING Command
PING Command

This command uses your internet connection in order to send some packets of data to a specific web address then these packets are sent back to your PC. The test simply shows the amount of time it took to reach the specific address. In simple words, it helps you to know if the host you pinging is alive.

You can use the Ping command whenever you need to verify that the host computer can connect to the TCP/IP network and its resources.

For example, you can type in Command prompt ping 8.8.8.8 which belongs to Google.

You can replace “8.8.8.8” to “www.google.com” or something else which you want to ping.

2. nslookup

nslookup Command
nslookup Command

It is a network administration command-line tool that helps you to obtain domain name or IP address mapping for any specific DNS record. Suppose you have a website URL but want to know its IP Address, you can simply type in CMD

nslookup www.google.com (Replace Google.com with your website URL of which you want to find the IP address)

3. tracert

tracert command
tracert command

You can say Trace Route like its name it allows users to trace the route than an IP packed has taken to reach a destination. The command calculates and displays the amount of time each hop took to reach a destination. You just need to type

tracert x.x.x.x (if you know the IP Address) or else you can type tracert http://www.google.com (If you don’t know the IP address)

4. arp

This command helps you to modify the ARP cache. You can run an arp-a command on each computer to see whether the computers have the correct MAC address listed for each other to ping each other succeed on the same subnet.

This command also helps users to find out if anyone has done arp poisoning in their LAN.

You can try typing arp-a in command prompt.

5. ipconfig

ipconfig command
ipconfig command

This is the command which shows every useful thing. It will show you IPv6 address, temporary IPv6 address, IPv4 address, Subnet Mask, Default gateway and all other things that you want to know.

You can type in command prompt “ipconfig” or "ipconfig/all"

6. netstat

netset command
netstat command

If you want to find out who is establishing a connection with your computer then you might try typing in command prompt “netstat -a” it will display all the connection and you will get to know about the active connections and listening ports.

Type in command prompt "netstat -a"

7. Route

route print command
route print command

It is a command which is used to view and manipulate the IP routing table in the Microsoft Windows operating system. This command will show you routing table, metric and interface.

You can type in command prompt "route print"

8. Net View

net view command
net view command

This command displays the whole list of resources, computers or domains that are shared by the specified computer.

You can type in command prompt "net view x.x.x.x or computername"

9. Net User

Well, this command is used to modify changes to user accounts on a computer. You can add, remove users with the help of this command

You can use these commands while using net user

net user [<UserName> {<Password> | *} [<Options>]] [/domain] net user [<UserName> {<Password> | *} /add [<Options>] [/domain]] net user [<UserName> [/delete] [/domain]]

10. Net Use

This command is been used to connect, remove, and configure connections to shared resources like network printers and other mapped drives. The use of this command is a little bit complicated. So, we recommend you to visit the Microsoft site to get full details on how to use this command.

11. Tasklist

Task kill command
Task kill command

This command opens up an entire task manager on the command prompt. Users just need to enter the tasklist on CMD and they will see the list of all running processes. You can figure out all the wrongs with these commands.

Moreover, the command can also be used when you need to forcefully close any process. For example, if you want to kill PID 1532 process then you can enter the command: taskkill /PID 1532 /F

12. iexplore

As we all know, hackers often try to execute some apps, such as web browsers. So, hackers use the iexplore option to execute apps and web pages. For example, if you enter iexplore http://www.spyboy.blog on the command prompt, it will open the URL in Internet Explorer.

Not only these, but you can even use iexplore <IP address> to find sites running on any particular IP address. The command is used in multiple ways by the hackers.

13. Pathping

Well, pathping command is pretty much similar to the tracert, but it shows more detailed information. The commands take a few moments to complete as it analyzes the route taken and computes packet loss. On Windows command prompt, just type in the following command

pathping www.spyboy.blog (Replace spyboy.blog with the one that you want to ping)

14. Getmac

getmac command
getmac command

This is another CMD Commands Used In Hacking. As we all know, MAC addresses are assigned by the manufacturer and stored on the hardware. With each network connected adapters, you get a separate MAC address. For instance, your Ethernet, WiFi would have a separate MAC address. So, getmac command is used to fetch the MAC address stored in the device’s hardware.

15. Netsh

With netsh command, you can configure almost every part of your network adapter. The great thing about the network shell command is that it provides more detailed information about your network adapters compared to all others listed in the article.

If you just enter the netsh command, it will list all routing and DHCP related commands that you need for diagnostic purposes.

So, above are the 15 best CMD commands used in hacking. I hope you like the post! Share it with your friends too. Leave a comment below if you want to add any command in the list.

Feel free to leave a comment below or reach me on Instagram @iamshubhamkumar__.

 

 

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.