There are a wide range of port scanners available for free. If PING cannot reveal a name, Traceroute will possibly deliver the name of the last or second last station to the attacker, which may enable conclusions concerning the name of the provider used by the attacker and the region from which the attacks are coming.Īfter you have determined that your target system is alive the next important step would be to perform a port scan on the target system. Both the IP address as well as the domain name (if available) is displayed. Tracer connects to the computer whose IP has been entered and reveals all stations starting from your Internet connection. To perform a tracert follow the procedure below. Tracert helps you to find out some information about the systems involved in sending data (packets) from source to destination. Tracert is another interesting tool available to find more interesting information about a remote host. Nmap also contains an option to perform ping sweeps. Though Ping sweep is similar to ping but reduces the time involved in pinging a range of IP addresses. Ping sweep also uses ICMP to scan for live systems in the specified range of IP addresses. If you are undetermined about your target and just want a live system, ping sweep is the solution for you. Unfortunately, there are several IP addresses that cannot be converted into domain names.įor more parameter that could be used with the ping command, This means that the attacker logged on using “”. To ping a remote host follow the procedure below.Ĭlick Start and then click Run.
#CMD HACKING OVER WIFI WINDOWS#
Ping sends out ICMP Echo packets to the target host, if the target host is alive it would respond back with ICMP Echo reply packets.Īll the versions of Windows also contain the ping tool. Ping uses ICMP (Internet Control Messaging Protocol) to determine whether the target host is reachable or not. Pinging is normally the first step involved in hacking the target. You will often have information on the provider the attacker uses e.g.: Ping will search the domain name and reveal it. Open the DOS shell and enter the following PING command: PING stands for “ Packet Internet Groper” and is delivered with practically every Internet compatible system, including all current Windows versions. You can use PING to convert the address into a domain name in WINDOWS: The Domain Name Service (DNS) protocol reveals the matching domain name. The numerical address like 212.214.172.81 does not reveal much.
The IP address gives the attacker’s Internet address. To find active IP addresses outside your subnet, use the Ping Scan.ĪRP-Scan Command To Scan The Local Network Devices cannot hide from ARP packets like they can hide from Ping. The ARP Scan shows all active devices even if they have firewalls. Since ARP is non-routable, this type of scanner only works on the local LAN (local subnet or network segment).
#CMD HACKING OVER WIFI MAC#
The ARP Scan (also called ARP Sweep or MAC Scanner) is a very fast ARP packet scanner that shows every active IPv4 device on your Subnet. The Arp-scan command uses the Address Resolution Protocol (ARP) to identify all active network assets that may not typically be recognised by network scanning devices
Host Discovery, Port Scanning, OS Command Execution.
Supported Forward & Reverse socks5 Proxy Server.Supported Forward & Reverse TCP Tunneling.