Visit complete Cyber Security roadmap

← Back to Topics List

Common Commands

In this guide, we will cover essential common commands you need to know when starting your journey in cyber security. By becoming proficient in these commands, you will be able to navigate, analyze, and manage different aspects of systems and networks. The list will cover command prompts, shell commands, and other tools.

Please note this guide assumes you already have basic knowledge of command line interfaces (CLI)

Operating System Commands

These commands are useful for managing and understanding your operating system and its components.

Windows

  • ipconfig: Display the IP configuration for all network interfaces on the device.

  • netstat: Display active network connections, listening ports, and routing tables.

  • systeminfo: Display detailed information about the computer’s hardware and software configuration.

  • nslookup: Look up the IP address of a domain or host.

  • ping: Send a series of network packets to test network connectivity.

Linux/Unix/MacOS

  • ifconfig: Display the IP configuration for all network interfaces on the device.

  • netstat: Display active network connections, listening ports, and routing tables.

  • uname -a: Display detailed information about the operating system.

  • dig: Look up the IP address of a domain or host.

  • ping: Send a series of network packets to test network connectivity.

File System Commands

These commands are useful for navigating and managing file systems on your device.

Windows

  • dir: List files and directories in the current directory.

  • cd: Change the current directory.

  • copy: Copy files from one location to another.

  • move: Move files from one location to another.

  • del: Delete specified files.

Linux/Unix/MacOS

  • ls: List files and directories in the current directory.

  • cd: Change the current directory.

  • cp: Copy files from one location to another.

  • mv: Move files from one location to another.

  • rm: Delete specified files.

Network Analysis Commands

These commands are useful for analyzing and troubleshooting network connections.

  • traceroute (Linux/Unix/MacOS) / tracert (Windows): Display the route and transit delay of packets across a network.

  • tcpdump (Linux/Unix/MacOS) / Wireshark (Windows): Capture and analyze network traffic.

Cyber Security Tools

  • nmap: Scan networks and hosts for open ports and network services.

  • Metasploit: A penetration testing framework that simplifies the discovery and exploitation of vulnerabilities.

  • John the Ripper: A password-cracking tool that automatically detects and cracks multiple password formats.

  • Wireshark: A network protocol analyzer that captures and analyzes network traffic.

  • Aircrack-ng: A suite of tools for auditing wireless networks.

By familiarizing yourself with these common commands and tools, you’ll have a solid foundation to build upon in your cyber security journey. As you progress, you will encounter more advanced tools and techniques, so keep learning and stay curious!

Found any mistakes? Help us improve by updating the file here..

Community

roadmap.sh is the 6th most starred project on GitHub and is visited by hundreds of thousands of developers every month.

Roadmaps Best Practices Guides Videos Store YouTube

roadmap.sh by Kamran Ahmed

Community created roadmaps, articles, resources and journeys to help you choose your path and grow in your career.

© roadmap.sh · FAQs · Terms · Privacy

ThewNewStack

The leading DevOps resource for Kubernetes, cloud-native computing, and the latest in at-scale development, deployment, and management.