Networking Commands


Display or manipulate the ARP information on a network device or computer

This information can include the last time the user logged in

hostname command displays the host name of linux system

configure network interfaces, or to display their current configuration & activating and deactivating interfaces with the “up” and “down” settings

ifconfig eth0 down
This will take eth0 (assuming the device exists) down, it wont be able to receive or send anything until you put the device back “up” again

ifup eth0
eth0 up if it is currently down

ifdown eth0
eth0 down if it is currently up

net command is available in Linux and is used to set, view, and determine network settings

Displays contents of /proc/net files. It works with the Linux Network Subsystem

display or modify the routing table

pinging host

whois domain
Get whois for domain

dig domain
The “domain information groper” tool. Including it’s IP address, hostname and various other information.

dig -x host
Reverse lookup host

used to download files from the World Wide Web

wget -c file
Continue stopped download

wget -r url
Reversely download files from url

traceroute will show the route of a packet. It attempts to list the series of hosts through which your packets travel on their way to a given destination

tracepath performs a very simlar function to traceroute the main difference is that tracepath doesn’t take complicated options

Query internet name servers

nmap is a very advanced network tool used to query machines (local or remote) as to whether they are up and what ports are open on these machines

program that captures packets off a network interface and interprets

Performs a simple lookup of an internet address (using the Domain Name System, DNS)

curl is another remote downloader. This remote downloader is designed to work without user interaction and supports a variety of protocols, can
upload/download and has a large number of tricks/work-arounds for various things.

Secure ftp, another part of the ssh package. This command is similar to ftp but uses an encrypted tunnel to connect to an ftp server and is therefore more secure than just plain ftp

Connects destination host via telnet protocol, if telnet connection establish on any port means connectivity between two hosts is working fine.

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s