Practical DOS commands let you know what is a simple "hacking"

  


One, ping

ping command It is used to check whether the network is smooth or the network connection speed command. As a person who is often confused with network administrators or hackers, the first DOS command to learn is ping. The principle it uses is this: the machines on the network all have unique IP addresses. We send a packet to the destination IP address, and the other party will return a packet of the same size. We can judge based on the returned packet. Whether the target host exists or not, what operating system, etc. ……

-t means that the packet will be sent to the target IP without interruption until we force it to stop. Imagine if you use 100M broadband access and the target IP is a 56K kitten, then it will not take long for the target IP to drop because it can't bear so much data. Oh, an attack is as simple as that.

-l Defines the size of the sent packet. The default is 32 bytes. We can use it to define up to 65500 bytes. Combined with the -t parameter described above, there will be better results.

-n Defines the number of times a packet is sent to the destination IP. The default is 3 times. If the network speed is slow, 3 times is a waste of time for us, because now our purpose is only to determine whether the target IP exists, then it is defined as once.

Explain that if the -t parameter is used with the -n parameter, the ping command is based on the following parameters, such as “ping IP -t -n 3”, although the -t parameter is used. But not always pinging, but only pinging 3 times. In addition, the ping command does not have to ping the IP, you can also directly ping the host domain name, so you can get the host's IP.

Let's take an example to illustrate the specific usage.

Here, time=2 means that the time taken from the time the packet is sent to the time the packet is received is 2 seconds. From here, the speed of the network connection can be judged. The return value from the TTL can be used to preliminarily determine the operating system of the pinged host. The reason why it is said "previous judgment" is that this value can be modified. Here TTL=32 means the operating system may be win98.

(Small knowledge: If TTL=128, the target host may be Win2000; if TTL=250, the target host may be Unix)

As for using the ping command, you can quickly find the LAN fault. You can quickly search for the fastest QQ server, you can ping other people … … these are all * play by yourself.

Second, nbtstat

This command uses NetBIOS on TCP/IP to display protocol statistics and current TCP/IP connections. With this command you can get the NETBIOS information of the remote host, such as the username, The working group, the MAC address of the network card, and so on. Here we need to understand a few basic parameters.

-a Using this parameter, as long as you know the machine name of the remote host, you can get its NETBIOS information (the same below).

-A This parameter also gets the NETBIOS information of the remote host, but you need to know its IP.

-n Lists the NETBIOS information of the local machine.

When you get the IP or machine name of the other party, you can use the nbtstat command to get the other party's information further, which increases the insurance factor of our invasion.

3, tracert

Tracking routing information, use this command to find out all the ways that data is transmitted from the local machine to the target host, which is very helpful for us to understand the network layout and structure. . As shown in Figure 5.

This shows that the data is transferred from the local machine to the 192.168.0.1 machine, without any intermediate transfer, indicating that the two machines are in the same LAN. Usage: tracert IP.

Four, netstat

This is a command to view the status of the network, easy to use and powerful.

-a View all the open ports of the local machine, you can effectively find and prevent Trojans, you can know the information about the services opened by the machine, as shown in Figure 4.

Here you can see that the local machine is open with FTP service, Telnet service, mail service, WEB service, etc. Usage: netstat -a IP.

-r Lists the current routing information and tells us the gateway, subnet mask and other information of the local machine. Usage: netstat -r IP.

Copyright © Windows knowledge All Rights Reserved