<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://tnt.aufbix.org/lib/exe/css.php?s=feed" type="text/css"?>
<rss version="2.0">
    <channel xmlns:g="http://base.google.com/ns/1.0">
        <title>tnt.aufbix.org windows</title>
        <description></description>
        <link>https://tnt.aufbix.org/</link>
        <lastBuildDate>Tue, 28 Apr 2026 02:17:27 +0000</lastBuildDate>
        <generator>FeedCreator 1.8</generator>
        <image>
            <url>https://tnt.aufbix.org/ttps://tnt.aufbix.org/lib/tpl/arctic/images/favicon.ico</url>
            <title>tnt.aufbix.org</title>
            <link>https://tnt.aufbix.org/</link>
        </image>
        <item>
            <title>windows:cmd</title>
            <link>https://tnt.aufbix.org/windows/cmd?rev=1243204502&amp;do=diff</link>
            <description>Command-Line

	*  Original article from SynJunkie

It's useful to note that output from most DOS commands can be output to a text file using the &gt; filename command.
 tree &gt;filestructure.txt
Host Enumeration

In this section I want to learn as much as I can about the compromised host.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
        <category>windows</category>
            <pubDate>Mon, 25 May 2009 00:35:02 +0000</pubDate>
        </item>
        <item>
            <title>windows:ipv6</title>
            <link>https://tnt.aufbix.org/windows/ipv6?rev=1407846522&amp;do=diff</link>
            <description>Windows IPv6 network tweaks

Enable icmp echo-request in Windows IPv4 and IPv6
netsh advfirewall firewall add rule name=&quot;icmpv6 echo-request&quot; dir=in action=allow protocol=icmpv6:128,any
netsh advfirewall firewall add rule name=&quot;icmpv4 echo-request&quot; dir=in action=allow protocol=icmpv4:8,any</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
        <category>windows</category>
            <pubDate>Tue, 12 Aug 2014 14:28:42 +0000</pubDate>
        </item>
        <item>
            <title>windows:networking</title>
            <link>https://tnt.aufbix.org/windows/networking?rev=1432195415&amp;do=diff</link>
            <description>see WiFi AP SSID from command line CLI
netsh wlan show networks mode=bssid</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
        <category>windows</category>
            <pubDate>Thu, 21 May 2015 10:03:35 +0000</pubDate>
        </item>
        <item>
            <title>windows:sidebar</title>
            <link>https://tnt.aufbix.org/windows/sidebar?rev=1243204502&amp;do=diff</link>
            <description>Windows

	*  General page
	*  Windows Commandline

elsewhere

	*  Microsoft Security Assessment Tool</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
        <category>windows</category>
            <pubDate>Mon, 25 May 2009 00:35:02 +0000</pubDate>
        </item>
    </channel>
</rss>
