ARP (Address Resolution Protocol)
Displays and modifies the IP-to-Ethernet or token ring physical address translation tables used by address resolution protocol (ARP) This command is available only if the TCP/IP protocol has been installed
arp -a [inet_addr] [-N [if_addr]]aThis option is very useful for alot of things, some too advanced than me It is very useful in detecting if someone has connected to your computer with Back-Orifice or Netbus It will list your open ports, connected ports, and a bunch of other things Using the following command will show you possible connections from someone else accessing your HD netstat -a -n Below are a list of other options of Netstat
netstat (shows some of your connections and listening ports
netstat -a (displays ALL connections & listening ports
netstat -e (display eithernet statistics, can be combined with -s
netstat -n (display addresses and port numbers in numerical form
netstat -p (shows connections for protocol specified by TCP,UDP, or IP
netstat -r (display the routing table
netstat -s (display per protocol stats default is TCP,UDP and IP
interval (redisplays selected stats by pausing every few seconds
Ping can be used several different ways to achieve a number of things Lets say for example you know someone may be online hiding from you and you already know their IP address Well when you ping them, you will know if they are online or not I am not going into all the types of ping options, however I will list them You can play with them yourself Open a DOS window and type "ping" and hit enter, and the following options will be presented
ping -a (resolves host name from IP or vice versa
ping -t (pings target IP until you stop it
ping -n (to specify number of times you send echo request
ping -l (to specify the size of the buffer packet
ping -f (to specify not to fragment the buffer packet
ping -i (TTL, "time to live"
ping -v (TOS, "type of service"
ping -r (record route for count hops
ping -s (timestamp for count hops
ping -j (loose source route to specified host-list
ping -k (strict source route to specified host-list
ping -w (timeout in milliseconds to wait for each reply from echo sent
aThis program should be your default telnet program There are not really any options with this particular DOS program However, you can play around with this using Wingates for doorways to help hide your IP Now I won't pretend to tell you I have this one all figured out, as I work at it everyday It is great practise to telnet to a server just to see how it works and how some systems react This is the very basic Telnet program, and if you like, there are other programs for telnet based in windows
aThis option is excellent in my opinion You can type the command "tracert<hostnamecom> or tracert <IP> and see the route it takes across the internet to reach the specified host I like using the IP option to look at unknown IP addresses, it will usually trace it across the net, while resolving to the host name Excellent for looking at proxy IP's and finding out their resolved host names Tracert has fewer options than ping It can be used alone as above, or can be used with the following options added
tracert -d (do not resolve IP to host name
tracert -h (maximum number of hops to search for host
tracert -j (loose source route along host-list
tracert -w (wait timeout in milliseconds for each reply