netsh advfirewall set all state off - to off firewall netsh advfirewall set all state on - to on firewall wmic cpu - to see cpu information wmic bios get serial number - to get serial number wmic computersystem get totalphysicalmemory - to get physical memory number wmic nic get macaddress - to get mac address wmic partition get name,size,type - to get partition details wmic process list brief - to see running program wmic process where name="name of the program.extension name" call terminate - to close a program wmic product get name,version - to get microsoft verified softwares vol (Drive Name like C,D) - to see serial number and the drive in it winver - windows 11 chkdsk - to see bad file getmac - to get mac address of pc systeminfo - to get system info diskpart - disk list disk - disk info select disk disk detail exit - to exit net user - to see users on pc net user (name) (password) /add - to create a new user with passwd net user (name) / del - to delete a user on pc net user (name) /active:yes - to active user net user (name) /active:no - to inactive user net user (name) * - to change/ remove passwd from user copy con (Any name) Write anything ctrl + z and hit enter echo (anyhting) >(name) ctrl + c - skip cipher /e - to encrypt anything cipher /d - to decrypt anything attrib +h +s +r - to hide a file attrib -h -s -r - to unhide a file netsh wlan show profiles - to see connected wifi netsh wlan show all - to see all wifi netsh wlan show profile (wifi name) key=clear - to see connected wifi details netsh wlan delete profile name=(wifi name) - to disconnect any wifi ipconfig-to see pc ip tracert
Mastering Linux Security and Hardening - Second Edition: Protect your Linux systems from intruders, malware attacks, and other cyber threats, 2nd Edition
Kali Linux - An Ethical Hacker's Cookbook - Second Edition: Practical recipes that combine strategies, attacks, and tools for advanced penetration testing, 2nd Edition
Java Professional Interview Guide: Learn About Java Interview Questions and Practise Answering About Concurrency, JDBC, Exception Handling, Spring, and Hibernate
Hacking with Kali Linux: A Step by Step Guide to Learn the Basics of Linux Penetration. What A Beginner Needs to Know About Wireless Networks Hacking and Systems Security. Tools Explanation Included