Top Commands Mostly Used By System Administrator.

Top Commands Mostly Used By System Administrator.

1) IPconfig
IPCONFIG
Simply entering ipconfig at the command line will return basic addressing information for your system, including the adapter name, IP address, subnet mask, and default gateway.

2) IPconfig /all
IPCONFIG/ALL
Shows all networking information for the system, including host name, node type, adapter names, MAC addresses, DHCP lease information, etc.

3) Ping
PING
Ping command to verify that a host can be reached over the network. This command is useful for diagnosing host and network connectivity problems. The device sends a series of ICMP echo (ping) requests to a specified host and receives ICMP echo responses.

4) Ping "Website-name"
PING TO WEBSITE

 This above command used to find the IP address associated with The Specific Website. eg: 10.24.126.25 is the IP address for Website Intranet.indusind.com

5) Tracert "IP address"
TRACE COMMAND

Tracert command-line utility that you can use to trace the path that an Internet Protocol (IP) packet takes to its destination.

6) Netstat
NETWORK STATISTICS

The netstat Command is used to display very detailed information about how your computer is communicating with other computers or network devices. Specifically, the netstat command can show details about individual network connections, overall and protocol-specific networking statistics, and much more, all of which could help troubleshoot certain kinds of networking issues.

7) Nbtstat -a "Remote-Host"
NBT COMMAND
The nbtstat command displays information about the NetBIOS over TCP (NBT) connection for the Filer. It displays the IP address associated with the interfaces, the broadcast IP mask, the IP addresses of the WINS servers in use, and information about the registered NetBIOS names for the filer.

8) Nslookup
NSLOOKUP

 nslookup command is used to querying the DNS ( Domain Name System) to option host name (domain name) or IP address. Nslookup command is used to resolve DNS. Nslookup command used to troubleshoot forward and reverse DNS lookup.

9) Route Print
ROUTE PRINT

A route (path) to a specific Network ID in the inter-network.

10) Net config "[Server\Workstation]"
NETCONFIG

net config displays a list of configurable services.
server : Displays and allows you to make changes to the settings for the Server service while the service is running.
workstation: Displays and allows you to make changes to the settings for the Workstation service while the service is running.

11) Net User
NETUSER

 Net User Command shows the Accounts Present in the System.

12) Net User "Account" *
NETUSER


This command is used to change the Password for Specific Account. Before Executing it you must open CMD with Administrative Privileges.

13) DriverQuery
DRIVERQUERY

This Command Used to Display the List of Drivers installed on the System with Given Name, Date and Time.

14) TaskList
TASKLIST

 This command used to Show List of Processes along with Their Name, Process ID and Memory Usage.

15) Taskkill /pid "1234"
TASKILL

We can kill a process from GUI using Task manager. If you want to do the same from command line., then taskkill is the command you are looking for. This command has got options to kill a task/process either by using the process id or by the image file name.

16) Wmic Bios Get command


wmic command

Short for 
WMI consolewmic is a command line command to query WMI entries, we can use this command to get the system details like serialnumber, version, status etc as shown in image below.



Please Share If you like
Thank You :-)


Comments

  1. Hello Mr.Author,
    Thank you well for sharing the big blast to us... It's extraordinarily helpful and informative.
    Please keep blogging new updates.

    Reliable dedicated hosting

    ReplyDelete
  2. Businesses are, in today’s information economy, wide open to internal and external threats. Each possible entry and exit are potential points of vulnerabilities. Serious Security Alarm systems Werribee

    ReplyDelete

Post a Comment

Popular posts from this blog

RTR using Falcon Crowdstrike

SECURITY OPERATION CENTRE

Damn Vulnerable Web Application - Part 1

Cyber Threat Intelligence

Collective Intelligence Framework v3 - Part 1

Top 20 Subdomains Search Engines

Collective Intelligence Framework v3 - Part 2

Security Architecture for Startup

TrickBot Malware Family - A Deep Dive using Falcon Crowdstrike