Roadmap to becoming a developer in 2022
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 

3.0 KiB

Common Commands

In this guide, we will cover essential common commands you need to know when starting your journey in cyber security. By becoming proficient in these commands, you will be able to navigate, analyze, and manage different aspects of systems and networks. The list will cover command prompts, shell commands, and other tools.

Please note this guide assumes you already have basic knowledge of command line interfaces (CLI)

Operating System Commands

These commands are useful for managing and understanding your operating system and its components.

Windows

  • ipconfig: Display the IP configuration for all network interfaces on the device.

  • netstat: Display active network connections, listening ports, and routing tables.

  • systeminfo: Display detailed information about the computer's hardware and software configuration.

  • nslookup: Look up the IP address of a domain or host.

  • ping: Send a series of network packets to test network connectivity.

Linux/Unix/MacOS

  • ifconfig: Display the IP configuration for all network interfaces on the device.

  • netstat: Display active network connections, listening ports, and routing tables.

  • uname -a: Display detailed information about the operating system.

  • dig: Look up the IP address of a domain or host.

  • ping: Send a series of network packets to test network connectivity.

File System Commands

These commands are useful for navigating and managing file systems on your device.

Windows

  • dir: List files and directories in the current directory.

  • cd: Change the current directory.

  • copy: Copy files from one location to another.

  • move: Move files from one location to another.

  • del: Delete specified files.

Linux/Unix/MacOS

  • ls: List files and directories in the current directory.

  • cd: Change the current directory.

  • cp: Copy files from one location to another.

  • mv: Move files from one location to another.

  • rm: Delete specified files.

Network Analysis Commands

These commands are useful for analyzing and troubleshooting network connections.

  • traceroute (Linux/Unix/MacOS) / tracert (Windows): Display the route and transit delay of packets across a network.

  • tcpdump (Linux/Unix/MacOS) / Wireshark (Windows): Capture and analyze network traffic.

Cyber Security Tools

  • nmap: Scan networks and hosts for open ports and network services.

  • Metasploit: A penetration testing framework that simplifies the discovery and exploitation of vulnerabilities.

  • John the Ripper: A password-cracking tool that automatically detects and cracks multiple password formats.

  • Wireshark: A network protocol analyzer that captures and analyzes network traffic.

  • Aircrack-ng: A suite of tools for auditing wireless networks.

By familiarizing yourself with these common commands and tools, you'll have a solid foundation to build upon in your cyber security journey. As you progress, you will encounter more advanced tools and techniques, so keep learning and stay curious!