Command prompt:
User interface screen for an operating system or program.
Command line:
known as a console user interface means interacting with a computer program with the successive lines of text (command lines).
Opening command prompt:
In start type cmd or click windows+R button type cmd then it opens.
Type systeminfo in the command prompt we can see the complete information about the system with command line.
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDzpS4gddhCajOgJYN-g9fb1Nb36DBy3NVfAudnvivXWnb2xAbMQ2cKKSFSYg1EmNch9F4b24b_0H4hErMrz1D5xTPK75Uc129yGiDRAt0obzaORHhjoOKQHCHaocwpNhgOfArVIMvYv8/s640/Screenshot_33.png)
IP address and DNS of a computer:
Trace the time to go to a server:
Find mac address of all network devices:
Changing ip address:
netsh interface ipv4 set address name="INTERFACE NAME"static IP_ADDRESS SUBNET_MASK GATEWAY
Dir:
Displays all files and folders in the current directory.
ipconfig:
Current address our system is using.
Currently open ports and related ip addresses.
Creation of a text file from command prompt:
Now, open c drive in that users than sps folder we can see file name with data.
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZbnYWtLSKbX-BTs_moJ8rsdNQn9hobOZYmA3Ode_TxbueUhTXXaxGk_vqRcww6XsXRMQVtB5dJKFVFD8lk0TWxWo-yMR5WdyyHQeoDcpWNHgUZyHI6KbaSn8trPvsJkw7bd0NcWkCUmw/s640/Screenshot_19.png)
Trace to encrypt the data:
Now go to c drive then users and go to sps we can see a text file with name file.txt
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheSDW64jhuaaP4UqJ7i2O4yMUKMGS1cRGGmZR0P9-RRxje6QhoPE0HbgAnwxp3Jjkhmw1SBFWOxkqH5oAu4UVTcDS0KbIblJivT8e9yZHvfRJmFlGKK8ALV5-iUDSjvdXxIsWa_BXH7CY/s640/Screenshot_11.png)
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAr7PBXj7wD3KFc3P_N13q5It4XldkgBTPDnQ5hEYNhmGKtY_VJeykmq8dvf-1D1JOTaxvMFCDmQ7_Uq8HS6E5errFt6YCFjeMdIgcL2PSDQ7vRZHKrpMb2akE0ALgx-2ZvQcS1Jw2JNs/s640/Screenshot_12.png)
Trace to decrypt the data:
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3aBEi6SdnDrQTmfxzOb12L2nDMjlB-xqOApGcr-3uWXdY3xmiUrZWgKOv6h1xlnEHkJGidkjQ38A6T3LMb1Oe2yXRFBxuj25AprcMoQCQknVYP7eGNJVqC8EeslaxX_jz7yHnmNwkmMo/s640/Screenshot_14.png)
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZbnYWtLSKbX-BTs_moJ8rsdNQn9hobOZYmA3Ode_TxbueUhTXXaxGk_vqRcww6XsXRMQVtB5dJKFVFD8lk0TWxWo-yMR5WdyyHQeoDcpWNHgUZyHI6KbaSn8trPvsJkw7bd0NcWkCUmw/s640/Screenshot_19.png)
Copied all the files which we have seen in command prompt to a text file.
Now go to c drive then users and go to sps we can see a text file with name file.txt
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheSDW64jhuaaP4UqJ7i2O4yMUKMGS1cRGGmZR0P9-RRxje6QhoPE0HbgAnwxp3Jjkhmw1SBFWOxkqH5oAu4UVTcDS0KbIblJivT8e9yZHvfRJmFlGKK8ALV5-iUDSjvdXxIsWa_BXH7CY/s640/Screenshot_11.png)
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAr7PBXj7wD3KFc3P_N13q5It4XldkgBTPDnQ5hEYNhmGKtY_VJeykmq8dvf-1D1JOTaxvMFCDmQ7_Uq8HS6E5errFt6YCFjeMdIgcL2PSDQ7vRZHKrpMb2akE0ALgx-2ZvQcS1Jw2JNs/s640/Screenshot_12.png)
Trace to decrypt the data:
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3aBEi6SdnDrQTmfxzOb12L2nDMjlB-xqOApGcr-3uWXdY3xmiUrZWgKOv6h1xlnEHkJGidkjQ38A6T3LMb1Oe2yXRFBxuj25AprcMoQCQknVYP7eGNJVqC8EeslaxX_jz7yHnmNwkmMo/s640/Screenshot_14.png)