7 Best CMD Commands Used In Hacking, The Ultimate Guide

Best CMD Commands Used In Hacking

Best CMD Commands Used In Hacking

Windows is most powerful GUI based operating system. You can easily install any software, according to your need in windows based PC. Command prompt is one the most powerful tool is windows. You can do anything with the command prompt.

DOS operating system – you can perform any task with the help of command. DOS is the first command based operating system from the Microsoft. DOS was fully command based operating system.

In this article, we are going to provide you a list of best CMD commands used in Hacking. If you wanna be a hacker learn these commands very carefully. Let’s drive it.

Best CMD Commands Used In Hacking

1. Ping

This command allows you to determine TCP/IP, networks and IP address. It also determines the issues with network and assists in resolving them.

ping x.x.x.x (where x – x is the IP address). You can try pinging, which is Google default IP address. Or you can “ping www.google.com” (this is the website you want to ping, if you don’t know the IP address).

2. nslookup

Nslookup is a network administration command line that is used for querying the Domain Name System (DNS) to obtain the IP address mapping or domain name.

For instance: ‘nslookup www.google.com’ (this command allows you to find IP address of www.google.com).

Yeah! You can also find out the IP address of specific Mail Servers through nslookup.

nslookup (press enter)

set type=mx (press enter again)


This command will give you the mail server of IP of google.com/yahoo.com.

3. tracert

tracert is a command-line utility that records the route through the internet between your computer and a specified destination computer. It calculates and displays the amount of time each hop took.

tracert x.x.x.x (x is the IP address)

or, ‘tracetrt www.google.com‘ (if you want to know the IP address of www.google.com).

4. arp

arp command will show you the arp table. This command also helps you to find out if someone has made up poisoning in your LAN using this command.

arp -a

5. route

route command will show you the routing table, gateway, interface and metric.

route print

6. ipconfig

This is of the most important command, it will show you a lot of useful things, for instance – your IP, Gateway, DNS in use etc.

ipconfig or ipconfig/all

Also, if you are using dynamic IP address and want to change it, then type.

ipconfig/release (this will release your IP address)

ipconfig/renew (this will renew your IP address)

7. Netstat CMD command

This command allows you to find out, who is establishing a connection with your computer. This command provides the information about all active connection and listings ports.

netstat-a (display all connections).

netstat-n (sorts connection in numerical order).

netstat-b (display executable. This is browser name).

Did you find this article helpful? Do let me know if we have missed any best hacking CMD commands via comment box.


Leave a Reply
  1. I think what you published was actually very logical.
    But, consider this, what if you wrote a catchier post title?
    I mean, I don’t wish to tell you how to run your website, however
    what if you added a post title that makes people desire more?

    I mean 7 Best CMD Commands Used In Hacking, The Ultimate Guide is a little vanilla.

    You should look at Yahoo’s home page and watch how they
    create post headlines to get viewers to click. You might add
    a video or a picture or two to grab people excited about what you’ve written. In my opinion,
    it could make your website a little livelier.

  2. We’re a group of volunteers and opening a brand new scheme in our community.

    Your site provided us with valuable information to work on. You’ve performed an impressive process and our entire
    community will probably be thankful to you.

  3. Pretty nice post. I just stumbled upon your blog and wanted to say
    that I’ve truly enjoyed surfing around your blog posts.

    In any case I’ll be subscribing to your feed and I hope you write again soon!

    my site game wm casino online (sg918kiss.com)

  4. Does your website have a contact page? I’m having a tough
    time locating it but, I’d like to send you an email.
    I’ve got some ideas for your blog you might be interested in hearing.
    Either way, great site and I look forward to seeing it expand over time.

    Visit my blog post; Rhino Spark

  5. An impressive share! I’ve just forwarded this onto a coworker who
    has been doing a little homework on this. And he actually bought me
    dinner due to the fact that I discovered it for him… lol.
    So allow me to reword this…. Thanks for the meal!!
    But yeah, thanks for spending some time to discuss this matter here on your blog.

    my homepage cara id test wukong333

  6. Hi, Neat post. There is a problem with your site in internet
    explorer, could check this… IE still is the marketplace chief and a big component to folks will omit your great writing
    due to this problem.

    Feel free to surf to my blog post – Monique

  7. It’s actually a cool and useful piece of info. I’m satisfied that you
    shared this helpful info with us. Please keep us informed like this.
    Thank you for sharing.

    Also visit my website; game sky777 download (Carmella)

  8. Hello there, simply became alert to your weblog via Google, and found that it is truly informative.
    I am gonna watch out for brussels. I’ll be grateful should you
    continue this in future. Numerous other people shall be benefited from your writing.

    Also visit my homepage ::

109 Pings & Trackbacks

  1. Pingback:

  2. Pingback:

  3. Pingback:

  4. Pingback:

  5. Pingback:

  6. Pingback:

  7. Pingback:

  8. Pingback:

  9. Pingback:

  10. Pingback:

  11. Pingback:

  12. Pingback:

  13. Pingback:

  14. Pingback:

  15. Pingback:

  16. Pingback:

  17. Pingback:

  18. Pingback:

  19. Pingback:

  20. Pingback:

  21. Pingback:

  22. Pingback:

  23. Pingback:

  24. Pingback:

  25. Pingback:

  26. Pingback:

  27. Pingback:

  28. Pingback:

  29. Pingback:

  30. Pingback:

  31. Pingback:

  32. Pingback:

  33. Pingback:

  34. Pingback:

  35. Pingback:

  36. Pingback:

  37. Pingback:

  38. Pingback:

  39. Pingback:

  40. Pingback:

  41. Pingback:

  42. Pingback:

  43. Pingback:

  44. Pingback:

  45. Pingback:

  46. Pingback:

  47. Pingback:

  48. Pingback:

  49. Pingback:

  50. Pingback:

  51. Pingback:

  52. Pingback:

  53. Pingback:

  54. Pingback:

  55. Pingback:

  56. Pingback:

  57. Pingback:

  58. Pingback:

  59. Pingback:

  60. Pingback:

  61. Pingback:

  62. Pingback:

  63. Pingback:

  64. Pingback:

  65. Pingback:

  66. Pingback:

  67. Pingback:

  68. Pingback:

  69. Pingback:

  70. Pingback:

  71. Pingback:

  72. Pingback:

  73. Pingback:

  74. Pingback:

  75. Pingback:

  76. Pingback:

  77. Pingback:

  78. Pingback:

  79. Pingback:

  80. Pingback:

  81. Pingback:

  82. Pingback:

  83. Pingback:

  84. Pingback:

  85. Pingback:

  86. Pingback:

  87. Pingback:

  88. Pingback:

  89. Pingback:

  90. Pingback:

  91. Pingback:

  92. Pingback:

  93. Pingback:

  94. Pingback:

  95. Pingback:

  96. Pingback:

  97. Pingback:

  98. Pingback:

  99. Pingback:

  100. Pingback:

  101. Pingback:

  102. Pingback:

  103. Pingback:

  104. Pingback:

  105. Pingback:

  106. Pingback:

  107. Pingback:

  108. Pingback:

  109. Pingback:

Leave a Reply

Your email address will not be published.

facebook messennger encryption

How To Encrypt Your Facebook Messages (Chats) And Send Self-destruct Messages

parallel space

How To Use Parallel Space To Run Multiple Social Accounts On One Device?