Hacker Commands for XP
Results 1 to 6 of 6

Thread: Hacker Commands for XP

  1. #1

    Exclamation Hacker Commands for XP

    Ok now I went though the XP pro version and looked at some cool new things. I'm not sure that NT has these or even win2000 but I'm going to post these to let you know that their there. All of these are accessed through the command prompt, so all you have to do is open it up and type these commands. If your computer says can't find it because it's not there. There is a list of menu's to.

    1)nslookup-lookups host
    2)pathping-
    Usage: pathping [-g host-list] [-h maximum_hops] [-i address] [-n]
    [-p period] [-q num_queries] [-w timeout] [-P] [-R] [-T]
    [-4] [-6] target_name

    Options:
    -g host-list Loose source route along host-list.
    -h maximum_hops Maximum number of hops to search for target.
    -i address Use the specified source address.
    -n Do not resolve addresses to hostnames.
    -p period Wait period milliseconds between pings.
    -q num_queries Number of queries per hop.
    -w timeout Wait timeout milliseconds for each reply.
    -P Test for RSVP PATH connectivity.
    -R Test if each hop is RSVP aware.
    -T Test connectivity to each hop with Layer-2 priority tags.
    -4 Force using IPv4.
    -6 Force using IPv6.


    3)ping6-

    Usage: ping6 [-t] [-a] [-n count] [-l size] [-w timeout] [-s srcaddr] [-r] dest

    Options:
    -t Ping the specifed host until interrupted.
    -a Resolve addresses to hostnames.
    -n count Number of echo requests to send.
    -l size Send buffer size.
    -w timeout Timeout in milliseconds to wait for each reply.
    -s srcaddr Source address to use.
    -r Use routing header to test reverse route also.


    4)shutdown (this one allows you to shut down a remote machine, or do a restart but only works if you are connected dirrrr)
    -m \\computername
    Remote computer to shutdown/restart/abort

    5)tftp-

    Transfers files to and from a remote computer running the TFTP service.

    TFTP [-i] host [GET | PUT] source [destination]

    -i Specifies binary image transfer mode (also called
    octet). In binary image mode the file is moved
    literally, byte by byte. Use this mode when
    transferring binary files.
    host Specifies the local or remote host.
    GET Transfers the file destination on the remote host to
    the file source on the local host.
    PUT Transfers the file source on the local host to
    the file destination on the remote host.
    source Specifies the file to transfer.
    destination Specifies where to transfer the file.


    6)tracert6-

    Usage: tracert6 [-d] [-h maximum_hops] [-w timeout] [-s srcaddr] target_name

    Options:
    -d Do not resolve addresses to hostnames.
    -h max_hops Maximum number of hops to search for target.
    -w timeout Wait timeout milliseconds for each reply.
    -s srcaddr Source address to use.
    -r Use routing header to test reverse route also.



    7)finger-
    Displays information about a user on a specified system running the
    Finger service. Output varies based on the remote system.

    FINGER [-l] [user]@host [...]

    -l Displays information in long list format.
    user Specifies the user you want information about. Omit the user
    parameter to display information about all users on the
    specifed host.
    @host Specifies the server on the remote system whose users you
    want information about.



    9)arp-ok this one is really long but it has lots of things for example it allows a hacker to identify how many computers are on the network and identify every IP on that network. It can specify internet addresses. Also displays the arp entries.

    I'm sure there are more but all of these commands are spelled right. Have fun, besides you should know what hackers know.
    So for all the linux users what do you think of that...lol, just joking.
    Well the other commands are the originals nbtstat, nestat, ping, telnet, tracert, so hope it helps any questions let me know.
    Share on Google+

  2. #2
    Senior Member
    Join Date
    Sep 2001
    Posts
    412
    I don't know why there's a 6 after some of the commands you list, but these are all present in nt4/w2k. They're not really "hacker" tools, invaluable for a sysadmin though.
    Share on Google+

  3. #3

    yeah

    I just thought it was a catchy title and thanks for telling be that all of those commands are in Nt4/2000 I didn't know because I upgraded from 98. So that was interesting. I also don't know why there are a 6 after them, Microsoft does some weird things.
    Share on Google+

  4. #4
    Senior Member
    Join Date
    Sep 2001
    Posts
    1,027
    This is just a (educated) guess but I'd say the 6 is for IP v6 support...

    Ammo
    Share on Google+

  5. #5
    Yeah that's was a good guess I forgot to post it last night. But IPv6 still don't have a cool what that is. If anyone has another educated guess it would be good to hear.
    Share on Google+

  6. #6
    Senior Member
    Join Date
    Sep 2001
    Posts
    412
    ammo was right on the money first time - http://msdn.microsoft.com/downloads/...pv6/readme.asp
    Share on Google+

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •