Commands Used In Hacking

Windows is most intense GUI based working framework. You can without much of a stretch install any product, as indicated by your need in windows based PC. The command prompt is one the most effective tool in windows. You can do anything with the Command prompt. In this article, we will give you a rundown of best CMD Commands Used In Hacking. On the off chance that you wanna be a programmer take in these orders precisely.

Commands Used In Hacking :


Nslookup is a network administration command line that is utilized for questioning the Domain Name System (DNS) to get the IP address mapping or domain name. nslookup command had the wide assortment of functionalities.

Also Read: Fake Facebook Mark Zuckerberg Accounts Tried To Scam Users For Cash use

This command is broadly used to expel, connect and configure the association on shared assets like printers, mapped drives, network printers and then some. The utilization of this command is smidgen muddled. Thus, we prescribe you to visit the Microsoft site to get full subtle elements on the most proficient method to utilize this command. user

On the off chance that you at any point forgot your Windows login password, at that point you can use this command to reset Windows user password. You can likewise include new clients or change existing clients utilizing net user command. view

To utilize this command enter net view xxxx (IP address) or your PC name. This command will drill down the whole rundown of resources, domains, and PCs that are shared by the predetermined PC.

Type in command prompt “net view x.x.x.x or computername”

This command will enable you to know whether the host you pinging is alive, which implies on the off chance that it is up at the time of executing the “ping” command. With this command, you can know the amount of time it took to achieve the particular address.


Using this command you will be able to find the routing table, gateway, interface and metric.

Type in command prompt “route print


This command will give you the bounces that a packet will go to achieve its final goal. This command is extremely useful in the event that you know the route a packet takes before it goes to the objective box.

Type in command prompt tracert x.x.x.x. or else tracert


NetBIOS name tables for both the local computer and remote computers, and the NetBIOS name cache. nbtstat permits a refresh of the NetBIOS name cache and the names enrolled with Windows Internet Name Service (WINS). Utilized without parameters, nbtstat shows help.

nbtstat [/a <remoteName>] [/A <IPaddress>] [/c] [/n] [/r] [/R] [/RR] [/s] [/S] [<Interval>]


Using this command you will show you a lot of useful things like your IP, Gateway, DNS in use, etc


The netstat command will help you to discover who is establishing up an association with your PC. You will become more acquainted with about the dynamic associations and listening ports which will be helpful commands Used In Hacking. To utilize this command.

Type in command prompt netstat -a