Windows network security consultants and service providers can use free command-line tools as part of their ordinary information security routine. In this tip, information security consultant Kevin Beaver walks you through the different command-line tools that help you perform tasks at client sites such as displaying all DNS records for a specific domain or setting a static IP address on the default network interface.
There's a much under-hyped and overlooked set of Windows security tools that you should be taking advantage of as a Windows administrator. You've already paid for them but may not realize that you have them. I'm talking about a handful of nifty command-line tools that are extremely powerful in practically any information security context. If your experience goes back to the good old DOS days, you'll feel right at home. And if the command line is a little outside your comfort zone, relax -- what you need to know is really straightforward.
The following Windows command-line tools can be a big help. Hardly a day passes that I'm not using several of them. To get rolling, simply click Start/Run, run cmd.exe, and you're ready to start entering these commands.
Read more about administering Windows network security using command-line tools.
About the author:
Kevin Beaver is an independent information security consultant, speaker and expert witness with Atlanta-based Principle Logic LLC. He has nearly two decades of experience in IT and specializes in performing information security assessments regarding compliance and risk management. Kevin has authored/co-authored six books on information security including Hacking For Dummies and Hacking Wireless Networks For Dummies (Wiley) as well as The Practical Guide to HIPAA Privacy and Security Compliance (Auerbach). He's also the creator of Security On Wheels, information security audio programs providing security learning for IT professionals on the go. Kevin can be reached at firstname.lastname@example.org.
This tip originally appeared on SearchWindowsSecurity.com.
This was first published in June 2007