Windows/cmd: Unterschied zwischen den Versionen

Aus SchnallIchNet
Wechseln zu: Navigation, Suche
(Die Seite wurde neu angelegt: „== extract a CAB-file == expand <source>.cab -f:<files> <destination> e.g. expand test.cab -f:* . -f for specifying a file/files to be extracted: -f:*.dl…“)
 
 
(15 dazwischenliegende Versionen desselben Benutzers werden nicht angezeigt)
Zeile 1: Zeile 1:
== extract a CAB-file ==
+
 
 +
== recover passwort win 7/8 ==
 +
 
 +
# Use recovery mode to start CMD from CD
 +
# move c:\windows\system32\Utilman.exe to c:\windows\system32\_Utilman.exe
 +
# copy c:\windows\system32\cmd.exe to c:\windows\system32\Utilman.exe
 +
# reboot
 +
# at loginscreen click 'erleichterte bedienung'
 +
# finally a cmd comes up and do:
 +
 
 +
net user administrator *
 +
 
 +
enter new password (or leave empty) 2 times for the user.
 +
perhaps you will have to activate the user:
 +
 
 +
net user administrator /active:yes
 +
 
 +
 
 +
== get service list ==
 +
 
 +
net start
 +
 
 +
print a list of all '''started''' services
 +
 
 +
sc queryex type= service state= all
 +
sc query type= service state= all
 +
 
 +
print list of all services and their state
 +
 
 +
 
 +
== force GPO refresh without reboot ==
 +
 
 +
gpupdate /force
 +
 
 +
 
 +
== extract a CAB-file (Win7) ==
  
 
  expand <source>.cab -f:<files> <destination>
 
  expand <source>.cab -f:<files> <destination>
Zeile 8: Zeile 43:
  
 
-f for specifying a file/files to be extracted: -f:*.dll will extract all dll-files
 
-f for specifying a file/files to be extracted: -f:*.dll will extract all dll-files
 +
 +
 +
== 'mount' folder as drive ==
 +
 +
to get a local folder mapped as a drive in windows
 +
 +
subst X: C:\users\USERNAME\test
 +
 +
this creates a drive X in explorer wich maps to C:\users\USERNAME\test<br />
 +
this mapping is gets lost on shutdown.
 +
 +
 +
to make mapping permanent add to you registry:
 +
 +
<pre>
 +
Windows Registry Editor Version 5.00
 +
 +
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\DOS Devices]
 +
"X:"="\\??\\C:\\users\\USERNAME\\test"
 +
</pre>
 +
 +
 +
== Show WLAN Passwords ==
 +
 +
netsh wlan show profile
 +
 +
then
 +
 +
netsh wlan show profile WiFi-name key=clear
 +
 +
 +
== Check/Set MTU ==
 +
 +
Check MTU Settings:
 +
 +
netsh interface ipv4 show subinterface
 +
 +
Set MTU to 1300 for example:
 +
 +
netsh interface ipv4 set subinterface <Name of Interface> mtu=1300 store=persistent
 +
 +
 +
== set DNS resolvers ==
 +
 +
wmic nicconfig where (IPEnabled=TRUE and DHCPEnabled=FALSE) call SetDNSServerSearchOrder ("8.8.8.8","8.8.4.4")
 +
 +
 +
== IPv6  (XP) ==
 +
 +
[http://www.colorconsole.de/cmd/en/Windows_XP/netsh/interface/ipv6.htm Found VIA]
 +
 +
 +
=== Install IPv6 ===
 +
 +
netsh int ipv6 install
 +
 +
 +
=== Uninstall IPv6 ===
 +
 +
netsh int ipv6 uninstall
 +
 +
 +
== IPv6 (>= Vista/Win7) ==
 +
 +
ipv6 related commands
 +
[http://www.colorconsole.de/cmd/en/Windows_Vista/netsh/interface/ipv6.htm Found VIA]
 +
 +
 +
=== Show configuration ===
 +
 +
netsh interface ipv6 show
 +
 +
 +
=== Privacy extensions ===
 +
 +
netsh interface ipv6 set privacy [[state=]enabled|disabled]
 +
 +
 +
disable privacy extension persistent:
 +
 +
netsh interface ipv6 set privacy state=disabled store=active
 +
netsh interface ipv6 set privacy state=disabled store=persistent
 +
netsh interface ipv6 set global randomizeidentifiers=disabled store=active
 +
netsh interface ipv6 set global randomizeidentifiers=disabled store=persistent
 +
 +
 +
== get/kill login sessions ==
 +
 +
list sessions:
 +
 +
qwinsta /server:SERVERNAME
 +
 +
kill sessions:
 +
 +
rwinsta „Sitzungs-ID“ /server:SERVERNAME

Aktuelle Version vom 22. September 2017, 08:51 Uhr

recover passwort win 7/8

  1. Use recovery mode to start CMD from CD
  2. move c:\windows\system32\Utilman.exe to c:\windows\system32\_Utilman.exe
  3. copy c:\windows\system32\cmd.exe to c:\windows\system32\Utilman.exe
  4. reboot
  5. at loginscreen click 'erleichterte bedienung'
  6. finally a cmd comes up and do:
net user administrator *

enter new password (or leave empty) 2 times for the user. perhaps you will have to activate the user:

net user administrator /active:yes


get service list

net start

print a list of all started services

sc queryex type= service state= all
sc query type= service state= all

print list of all services and their state


force GPO refresh without reboot

gpupdate /force


extract a CAB-file (Win7)

expand <source>.cab -f:<files> <destination>

e.g.

expand test.cab -f:* .

-f for specifying a file/files to be extracted: -f:*.dll will extract all dll-files


'mount' folder as drive

to get a local folder mapped as a drive in windows

subst X: C:\users\USERNAME\test

this creates a drive X in explorer wich maps to C:\users\USERNAME\test
this mapping is gets lost on shutdown.


to make mapping permanent add to you registry:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\DOS Devices] 
"X:"="\\??\\C:\\users\\USERNAME\\test"


Show WLAN Passwords

netsh wlan show profile

then

netsh wlan show profile WiFi-name key=clear


Check/Set MTU

Check MTU Settings:

netsh interface ipv4 show subinterface

Set MTU to 1300 for example:

netsh interface ipv4 set subinterface <Name of Interface> mtu=1300 store=persistent


set DNS resolvers

wmic nicconfig where (IPEnabled=TRUE and DHCPEnabled=FALSE) call SetDNSServerSearchOrder ("8.8.8.8","8.8.4.4")


IPv6 (XP)

Found VIA


Install IPv6

netsh int ipv6 install


Uninstall IPv6

netsh int ipv6 uninstall


IPv6 (>= Vista/Win7)

ipv6 related commands Found VIA


Show configuration

netsh interface ipv6 show 


Privacy extensions

netsh interface ipv6 set privacy [[state=]enabled|disabled]


disable privacy extension persistent:

netsh interface ipv6 set privacy state=disabled store=active
netsh interface ipv6 set privacy state=disabled store=persistent
netsh interface ipv6 set global randomizeidentifiers=disabled store=active
netsh interface ipv6 set global randomizeidentifiers=disabled store=persistent


get/kill login sessions

list sessions:

qwinsta /server:SERVERNAME

kill sessions:

rwinsta „Sitzungs-ID“ /server:SERVERNAME