Command Prompt is a powerful tool that an Operating System offers to its users. It is the portal through which anything can be accessed and controlled on your PC or laptop. It exists across operating systems like Windows, Mac, Linux, etc. But today, we are going to look at the lesser-known commands that can be used while you try your hand at hacking.
10 Best CMD Hacking Commands
But before we start off, you will have to learn how to enable NetBios.
- Simply open your Network Connection and select Properties.
- Under that, choose TCP/IP, and then select Properties again.
- Proceed to press the Advanced and WINS tab respectively, and finally select Default for NetBIOS.
- That is it. You are set to use NetBIOS on the Command Prompt now.
This command is used to reset the Windows operating system’s user password in case it has been forgotten, or just unknown.
net user USERNAME NEWPASS
(Replace USERNAME with the user name on the PC, and NEWPASS with the new password. Press enter to execute it.)
If you are getting access denied message then run command prompt as administrator.
This command is to be used when checking if the host that you are pinging is live or offline. If it is live, it means that the host is working at the time the ping command is executed. You can execute this in two ways:
ping x.x.x.x (where x is the IP address).
For example, you can ping 188.8.131.52 which will let you know if Google is live
Or, in case you do not know the IP address of the host, you can also input the web address. For example:
This is a popular command executed when trying to resolve DNS into IP. For example, when you know the URL of a website but not the IP address, this command will help you to find the IP address of a website. For example,
This will return the IP of the given website.
Another useful functionality of this command is for when you want to find out the IP address of specific mail servers. For example, if you wish to check the servers of Yahoo, just input:
nslookup (press enter)
set type=mx (press enter)
This lets the user obtain information on the jumps that a packet of data goes through before reaching the final destination. Basically it traces the route that a packet takes as it is trying to reach where it is supposed to go.
The syntax for this is
tracert x.x.x.x (with x being the IP address)
Again, in case you do not know the IP for the website you wish to trace.
Arp stands for address resolution protocol. Executing this command displays and modifies the entries in the ARP cache, which contains one or more tables that are used to store IP addresses. This command is useful when you are trying to figure out if anyone’s altered arp in your LAN by using this very command.
Route command displays information regarding the routing table, gateway information, interface, and metrics.
This command is possibly one of the most frequently executed ones because it is so helpful regarding retrieving various information regarding your network. It provides information on your IP address, Gateway, the DNS you are using and such.
ipconfig /all (when trying to retrieve information for all networks)
In case you have dynamic IP but wish to change it, just execute
ipconfig /release (which will release the IP)
ipconfig /renew (which will proceed to renew your IP)
Execute this command to know more about the resources, computers or domains that are currently being shared by the Windows device you are using.
net view x.x.x.x (with x being the IP address)
net view computername
This command displays information regarding your network connection.
Used for specifically showing all the listening ports and connection with DNS names.
Used for specifically displaying all the open connections with IP addresses.
Used to display information from both the above commands.
net view x.x.x.x (x is the IP address)
net view computer-name will then list the available sharing folders on the target box.
This command is meant to be executed when you wish to open the Windows task manager on the Command Prompt. It displays all the processes being run on the device.
Additionally, you can use the command ‘taskkill’ if you wish to specifically end a process that could be unresponsive or is taking up too much resource. For example, let’s kill PID 724.
taskkill /PID 724 /F
This is a universal addition to everything. By executing this command following another command in the line, it displays the functionality of the first command. For example, execute
to know the function of whattevercommand. Another syntax of this command is
So there you have it, simple but very efficient commands to be executed whenever you need information and commands that will aid you when trying to understand the networking better, or for your hacking needs.