Preview

CMD Commands

Good Essays
Open Document
Open Document
752 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CMD Commands
Reg Command

WMIC

Adding Keys and Values:
C:\> reg add
[\\TargetIPaddr\][RegDomain]\[Key]

Fundamental grammar:
C:\> wmic [alias] [where clause] [verb clause] Add a key to the registry on machine
[TargetIPaddr] within the registry domain
[RegDomain] to location [Key]. If no remote machine is specified, the current machine is assumed. Useful [aliases]: process service share nicconfig startup useraccount qfe (Quick Fix Engineering – shows patches)

Export and Import:
C:\> reg export [RegDomain]\[Key]
[FileName]

Example [where clauses]: where name="nc.exe" where (commandline like "%stuff") where (name="cmd.exe" and parentprocessid!="[pid]") Export all subkeys and values located in the domain
[RegDomain] under the location [Key] to the file
[FileName]

Import all registry entries from the file [FileName]

Example [verb clauses]: list [full|brief] get [attrib1,attrib2…] call [method] delete Import and export can only be done from or to the local machine.

List all attributes of [alias]:
C:\> wmic [alias] get /?

Query for a specific Value of a Key:
C:\> reg query
[\\TargetIPaddr\][RegDomain]\[Key] /v
[ValueName]

List all callable methods of [alias]:
C:\> wmic [alias] call /?

C:\> reg import [FileName]

Query a key on machine [TargetIPaddr] within the registry domain [RegDomain] in location
[Key] and get the specific value [ValueName] under that key. Add /s to recurse all values.

Example:
List all attributes of all running processes:
C:\> wmic process list full
Make WMIC effect remote [TargetIPaddr]:
C:\> wmic /node:[TargetIPaddr]
/user:[User] /password:[Passwd] process list full

Windows
Command Line
Cheat Sheet
By Ed Skoudis
POCKET REFERENCE GUIDE http://www.sans.org Purpose
The purpose of this cheat sheet is to provide tips on how to use various Windows command that are frequently referenced in
SANS 504, 517, 531, and 560.
Process and Service Information
List all

You May Also Find These Documents Helpful

  • Good Essays

    High-level system overview with description of process. Include a sequence of operations and identify products and/or product presentations associated with the system.…

    • 414 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The Incident Command System (ICS) is composed of seven principals; standardization, functional specificity, manageable span of control, unit integrity, unified command, management by objectives, and comprehensive resource management. (Lindell, Perry, & Prater, 2007, p. 271). The basis of ICS is to promote agency interoperability by establishing framework for terminology, communications, and structure. Additionally, the system clearly defines all the roles each position has, groups individual/agencies of similar disciples together, and establishes a baseline span of control for effective management of personnel. Moreover, the system provides framework for establishing a unified command when an incident involves multiple agencies and/or stakeholders as well as effective method for tracking resources (personnel, equipment, facilities,…

    • 455 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Mission Command

    • 2076 Words
    • 9 Pages

    With German forces on the run following the Allied success at Normandy and the breakout and pursuit across France, Allied forces were staged to enter Germany in late summer 1944. Both Field Marshal Montgomery and General Bradley clamored to be given the priority of effort. General Eisenhower chose Montgomery’s Operation MARKET GARDEN as the plan for action. It called for airborne forces to open the route for a ground force to move more than sixty miles up a single road, ending up north of the Rhine River near Arnhem, Netherlands. By accomplishing this task, the German Ruhr industrial heartland would be within easy grasp. But the operation failed. The ground force did not make it to the last bridge; it was six more months before Allied forces crossed the Lower Rhine River near Arnhem. Between 17 and 26 September 1944, there were 17,000 Allied casualties including eighty percent of the 1st Airborne Division (UK). The historical evidence overwhelmingly shows that the British 1st Airborne Division lost the Battle of Arnhem because of poor planning. This paper will prove the failure of The Battle of Arnhem was not solely the fault of MG Roy Urquhart. Although this was his first command of such a division (being an "outsider") could he have not completed his wartime mission any better despite having inexperienced leaders planning airborne operations, bad intelligence, allowing the Air Force to plan the DZs based off what was best for the air movement plan and poor execution. This paper examines MG Urquhart, the commander of 1st Airborne Division (UK).…

    • 2076 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    •Name and describe the only language that computers understand and explain how the instructions that people write for computers get into that form…

    • 322 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Syniverse Command Center (SCC) has reached out to Josh ( on call duty manger) to request at Detailed engineering drawing for the Syniverse to Bluegrass circuit. Syniverse would like the information before the 10 am call this morning. Furthermore, Syniverse would also like a plan of action for this circuit.…

    • 51 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    File Processing Commands

    • 354 Words
    • 2 Pages

    What UID and PID have the highest amount of physical memory a process has used and is not swapped out? Show all processes and full output.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Clear the screen and use cat to display the contents of the file in the /etc/sysconfig/network. Capture the Element K desktop in the text box provided below.…

    • 269 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Analysis of 3m Command

    • 7306 Words
    • 30 Pages

    3M Singapore controls many market leading brands in their various markets, such as Post-It®, Scotch® Tapes, Scotch-Brite® and Command™. In this report, we will be focusing on the brand – Command™. We aim to address the problem of the erosion of Command™’s competitive advantage in its increasingly competitive industry by providing improved/new BTL strategies which Command can undertake.…

    • 7306 Words
    • 30 Pages
    Powerful Essays
  • Good Essays

    Unix File

    • 566 Words
    • 3 Pages

    In order to understand how to control access to a file in a system that supports 5,000 users to 4,990 of those users, a basic understanding of the file permissions of a file on a UNIX system is necessary. A user has the ability to perform three basic actions to a file, read, write and execute. These three actions will be represented by r, w, and x respectively. A UNIX system uses a combination of these characters to control the file permissions. The first three characters represent the owner’s permissions, the middle three characters represent the group’s permissions, and the last three characters represent others permission. A sample of file permission would look like the following:…

    • 566 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Unix/Linux

    • 2760 Words
    • 12 Pages

    Windows, a much younger operating system, released in 1985, has exponentially grown in popularity ever since. Windows popularity is the biggest reason that it suffers malicious attacks more than any other operating system available. The numerous attacks…

    • 2760 Words
    • 12 Pages
    Best Essays
  • Powerful Essays

    Differ Instruction

    • 869 Words
    • 4 Pages

    Many newcomers to soccer attribute its kickoff in America to Pele's signing with the Cosmos for 3 years and $3.5 million in 1975-admittedly a dramatic event that captured the attention of the world's sporting community.…

    • 869 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Note: All captures must be text only—DO NOT capture the NotePad++ application window or the command prompt window. Use copy and paste of text only.…

    • 1575 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    The majority of this world’s economy is dominated by two types, the Command System and the Market System. The command system is a command economy that is publicly owned and is controlled by a central authority. The market system is a market economy where there is free competition and prices are determined by the interaction of supply and demand. The market system is popular within the United States, while the command system is ranked at the top for countries like China and North Korea. What does this mean for the two economical systems?…

    • 1234 Words
    • 5 Pages
    Good Essays
  • Good Essays

    I once had a teacher who was big on following directions. He gave a very lengthy and extensive exam, which would take the entire class period to complete. Because we knew it was going to take every minute, we all started quickly without reading and following the directions. After grueling over the answers and working at a feverish pace, we began one by one getting to the final question, which wasn’t a question at all. It was a statement telling us to look at the top of the test paper. The statement said, "Directions: If you simply put your name on the paper and hand it in, you will receive 100 points for a perfect score. Needless to say, we all felt pretty stupid for having not followed the directions. We could have saved ourselves a lot of stress.…

    • 556 Words
    • 3 Pages
    Good Essays
  • Good Essays

    “Registration involves the process by which individuals or institutions list their names with an association or agency. It may be voluntary or mandatory. Education, training or bonding requirements are sometimes associated with registration.…

    • 848 Words
    • 4 Pages
    Good Essays