0% found this document useful (0 votes)
13 views7 pages

Passive Attack Networking Commands

Uploaded by

aloneliya64
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views7 pages

Passive Attack Networking Commands

Uploaded by

aloneliya64
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Networking Commands

The below-mentioned commands are some of the most useful commands


required to troubleshoot network problems and configure network settings.

1. IPCONFIG

The IPCONFIG network command provides a comprehensive view of


information regarding the IP address configuration of the device we are
currently working on.

The IPConfig command also provides us with some variation in the primary
command that targets specific system settings or data, which are:
 IPConfig/all - Provides primary output with additional information
about network adapters.

 IPConfig/renew - Used to renew the system’s IP address.

 IPConfig/release - Removes the system’s current IP address.

Command to enter in Prompt - ipconfig

NSLOOKUP

The NSLOOKUP command is used to troubleshoot network connectivity issues


in the system. Using the nslookup command, we can access the information
related to our system’s DNS server, i.e., domain name and IP address.

Command to enter in Prompt - nslookup

3. HOSTNAME
The HOSTNAME command displays the hostname of the system. The
hostname command is much easier to use than going into the system settings to
search for it.

Command to enter in Prompt - hostname

4. PING
The Ping command is one of the most widely used commands in the prompt
tool, as it allows the user to check the connectivity of our system to another
host.

This command sends four experimental packets to the destination host to check
whether it receives them successfully, if so, then, we can communicate with the
destination host. But in case the packets have not been received, that means, no
communication can be established with the destination host.

5. TRACERT

The TRACERT command is used to trace the route during the transmission of
the data packet over to the destination host and also provides us with the “hop”
count during transmission.

Using the number of hops and the hop IP address, we can troubleshoot network
issues and identify the point of the problem during the transmission of the data
packet.

Command to enter in Prompt- tracert IP-address OR tracert


www.destination_host_name.com
6. NETSTAT

The Netstat command as the name suggests displays an overview of all the
network connections in the device. The table shows detail about the connection
protocol, address, and the current state of the network.

Command to enter in Prompt - netstat

7. ARP(Address Resolution Protocol)


The ARP command is used to access the mapping structure of IP addresses to
the MAC address. This provides us with a better understanding of the
transmission of packets in the network channel.

8. SYSTEMINFO

Using the SYSTEMINFO command, we can access the system’s hardware and
software details, such as processor data, booting data, Windows version, etc.

9. getmac
It will give you the MAC address of the network interface. People might use

this to control which device can connect to the network. Each device has a

unique MAC address and it is assigned by the manufacturer, store in the device

hardware. You can observe in below image 3 different mac address is assigned

to the different media.

10. PathPing
Earlier, I talked about the Ping utility and the Tracert utility, and the similarities
between them. As you might have guessed, the PathPing tool is a utility that
combines the best aspects of Tracert and Ping.

Entering the PathPing command followed by a host name initiates what looks
like a somewhat standard Tracert process. Once this process completes
however, the tool takes 300 seconds (five minutes) to gather statistics, and then
reports latency and packet loss statistics that are more detailed than those
provided by Ping or Tracert.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy