Is Hacking with CMD can be done?
In order to ensure you are not a victim of hacking activities, it is necessary to be conversant with these commands. Hackers can control the target sytem by using remote MS-DOS commands.
For example, IPconfig and Netstat commands are used to display networking information. IPconfig displays IP address, subnet mask, default gateway, and DNS. Netstat displays network connections of the target system.
ARP is used to monitor the networking stats and connections. It is used to get the MAC Address of a certain IP address. ARP gives a clear picture of computers connected to a particular network. Hackers use it to identify a target system.
Nslookup resolves DNS to IP address. if you know the website URL, you can check the IP address by using the nslookup command.
Ping is used to test whether a particluar host is alive or reachable across the netwrok.Tracert, on the other hand determines the route taken by packets across an IP network showing you the hops that a packet will travel to reach its final destiantion, which is very important information. Route displays the routing table, gateway, interface and metric.
Neuser is used to display user account on the computer and to reset windows user password without knowing windows old password. To do this, you need administrative rights. Net view displays computers in a current domain and their shared resources.
Nbtstat helps find the computer name of a certain IP address.
Having all the information that above remote commands dsiplays, helps the hacker gain access to target computer.