Console commands Flashcards
sudo
Allows for superuser access
ifconfig
You can use the ifconfig command to assign an address to a network interface and to configure or display the current network interface configuration information
ipconfig
internet protocol config, provides the user with IP, subnet mask, and default gateway for each network adapter by default the /all option
route
defines the paths a data packet takes through networks
- Can also be used to add or remove routes. Used by local host to determine where to send traffic.
ping
verifies connectivity and latency
- Sends an internal control message protocol (ICMP) echo request to a host and listens for the reply.
- If the echo is received, it will display the time it took and the time to live (TTL) left.
- Useful for troubleshooting!
nslookup
helps resolve a name associated with an ip lookup
traceroute or tracert
used to trace a route an IP packet takes to a destination
- Displays each hop (next router) in a numerical list with the hop’s IP address and the time it takes to receive the packet
- traceroute
for Linux or tracert
for windows
- Need admin privileges
tracepath
can be used by a regular user, as opposed to a superuser
- Same as traceroute, but with regular privileges
whois
provides information on who a domain belongs to.
- Primarily used in Linux. Certain pieces of information are private.
ARP
Address resolution protocol displays the IP to physical (MAC) address mappings for hosts that have been discovered in the ARP cache
- The hosts must be connected to the local network
netstat
network statistics. displays information about active ports and their state and can be useful in troubleshooting
nslookup
name server lookup displays information for displaying DNS info and troubleshooting DNS problems. Useful for displaying names to IP address mappings.
dig
domain information groper is used for displaying DNS info and troubleshooting. Is a replacement for nslookup
scp
security copy protocol is used to securely copy files between servers leveraging SSH for authentication and encryption.
ftp
File transfer protocol copies the file from one host to another host. Uses TCP.