Red/Blue Cheatsheet | NORI ZAMURAI
  • Introduction
  • Pentesting Cheatsheets
    • Reconnaissance
      • Other method
      • Nmap
    • Enumeration
      • DNS (53)
      • SSH (22)
      • FTP (21)
      • SMTP (25)
      • WEB (80,443)
      • POP3 (110)
      • SMB (139,445)
      • MySQL (3306)
    • Privilege Escalation
      • Linux
      • Windows
    • Shell
      • Reverse Shell
      • Upgrade Shell
      • Meterpreter
    • Password Crack
      • Hash Analysis
      • Bruteforce
    • Exploit
      • Search Exploit
      • Attacks
    • Paylaod
      • Msfvenom
    • File Transfer
    • Port Forwarding
    • Service Login and Interaction
  • Useful Commands
    • Linux Commands
    • Powershell
    • CMD
    • Python
    • Editor: Vi & Tmux
    • Metasploit
    • Powershell Empire
Powered by GitBook
On this page
  • Where
  • Dir
  • Findstr

Was this helpful?

  1. Useful Commands

CMD

Where

<Command Options>
/R: Recursively searches and displays the files that match the given pattern starting from the specified directory.

<Examples of Usage>
where /r . *.pdf
# search files recursively

Dir

<Command Options>
/B: Uses bare format (no heading information or summary).
/S: Displays files in specified directory and all subdirectories.

<Examples of Usage>
dir /b /s "directoryname"
# search directories recursively

Findstr

<Examples of Usage>
findstr /s /d:c:\windows /m mp3 *
# Look in C:\windows and its subdirectories for all files that contain the string "mp3"
PreviousPowershellNextPython

Last updated 5 years ago

Was this helpful?