A, ping
it is used to check regardless of whether the network or even the network connection velocity easy buy. As being a network administrator residing in or hackers, ping command is the first to understand the DOS command, making use of the principle of it is this: has the only device around the network to determine the IP deal with of your target we IP tackle to send a packet, the person would return a packet of comparable size, based on the returned data packet we are able to ascertain the presence of the target host, can initially figure out the target host working program. Here is a look at a number of its normal operations. Take a look at the help it, in the DOS window,
Office Pro Plus 2007, type: ping /? Enter. Shown using the support display screen. Here, we only have some simple parameters could be helpful towards the (same).
-t IP mentioned it will continuously send data packets towards the target, till we force it to stop. Imagine,
Windows 7 Professional Key, in the event you use 100M of broadband accessibility, plus the target IP is 56K cat, then just before long, the target IP can't afford to because so much information and dropped calls, Oh, an attack on this type of simple fact.
-l defines the dimension of deliver packets, default is 32 bytes, we use it to make the most effective definition to 65500 bytes. Described above mixed with the use of-t parameter, would be better, oh.
-n define IP to send data packets towards the target amount, the default is 3. In the event the network is gradual, 3 occasions for us have wasted a good deal of time, mainly because now our goal is only to determine whether there's target IP, then defined as being a bar.
explain,
Microsoft Office Ultimate 2007, if the-t parameter and the-n parameter with each other with, ping command to be positioned behind the regular parameters, for instance Even though the use of the-t parameter, although not often ping down, but only ping 3 times. Additionally, ping command doesn't have to ping IP, ping the host title can also, to ensure that you may obtain the host IP.
Below we give an instance to illustrate the particular use.
this time = 2, mentioned data packets to obtain from the issue of data packets used to return time is two seconds, from here you can actually figure out the size of the network connection velocity. The return value from the TTL can be ping the host to figure out the first running system,
Buy Windows 7, say Here TTL = 32 the operating system could possibly be win98.
(Tip: If TTL = 128, then the target host might be Win2000; if TTL = 250, then the target host could be Unix)
; Concerning using ping command to speedily find local area network failures, you possibly can swiftly hunt for the quickest QQ server can ping other people to perform attacks on ... ... all of us rely on these to play.
Second, nbtstat
the command makes use of the TCP / IP NetBIOS on display protocol statistics and existing TCP / IP connection, use this command you can obtain the remote host's NETBIOS details such as consumer identify, belongs towards the Working Group, NIC's MAC tackle. Here we have the should comprehend several simple parameters.
-a use of this parameter, as long as you realize the name of your remote host machine, you'll be able to get it NETBIOS specifics (beneath).
-A this parameter may also be considered a remote host NETBIOS info, but you must know its IP.
-n lists the nearby machine's NETBIOS information and facts.
while acquiring one other facet in the IP or machine name in the time, you may use the nbtstat command to get additional information around the other facet,
Office 2007 Professional Plus, and this adds to our invasion for the insurance aspect.
three, netstat
This can be a command to view network position, simple and potent.
-a watch of all open ports on the local device can efficiently detect and avoid Trojan horse, to understand the machine by opening the support along with other information and facts, as demonstrated in Figure four.
here we can see the neighborhood device and opening up FTP solutions, Telnet services, mail services, Web services. Use: netstat-a IP.
-r lists the existing routing specifics, tell us the neighborhood device gateway, subnet mask, along with other information and facts. Utilization: netstat-r IP.
four, tracert
trace route details,