What Windows utility can be used to enumerate hosts?

Which of the following is a popular network management service for network administrators?

Which Windows 10 feature uses virtualization to protect access tokens from theft by attackers?

Which of the following is a Windows command-line utility for seeing NetBIOS shares on a network?

Which of the following is an older network management service that is useful for network administrators that want to view system statistics, version numbers, and other detailed host information remotely?

Security testers conduct enumeration for which of the following reasons?

Gaining access to shares and network resources
Obtaining user logon names and group memberships

Which of the following is an excellent GUI tool for managing Windows OSs and is capable of displaying graphical representations of several areas?

The latest version of Nessus Server and Client can run on Windows, Mac OS X, FreeBSD, and most Linux distributions.

To determine what resources or shares are on a network, security testers must use port scanning and what other procedure first to determine what OS is being used?

If you do not have access to Nessus, what NMap procedure can be used to help you to gain information about remote *nix hosts?

Which of the following testing processes is the most intrusive?

Which of the following tools can be used to enumerate Windows systems?

Most NetBIOS enumeration tools connect to the target system by using which of the following?

A null session is enabled by default in all the following Windows versions except:

What version of Windows Server has completely eliminated the option for the telnet server?

What process allows a security professional to extract valuable information, such as information about users and recent login times from a network?

Which of the following is the vulnerability scanner from which OpenVAS was developed?

If you don't have access to Nessus, which of the following can be used by an attacker to gain information about remote *nix Hosts?

What enumeration tool is exteremly useful when working with Windows NT, 2000, and Windows XP systems?

Which of the following is a useful enumeration tool that enables you to find out who is logged into a *nix system with one simple command?

Which of the follwoing commands should you use to determine whether there are any shared resources on aWinodws computer with the IP address 193.145.83.202?

nbtstat -a 193.145.85.202

The computer names you assign to Windows systems are called which of the following?

What upper-level service is required to utilize file and printer sharing in Windows?

The open-source is descendant of Nessus is called which of the following?

A NetBIOS name does not need to be unique on a network.

What does the "NBT" part of "NBTscan" stand for?

What type of Windows Server is the most likely server to be targeted by a computer hacker?

What feature implemented in Windows 8.1 prevents the execution of non-trusted boot content, preventing rootkits?

Which of the following commands gives you a quick way to see if there are any shared resources on a computer or server?

The Windows Net use command is a quick way to discover any shared resources on a computer or server. True of False?

Windows Server 2012 introducted what protection feature to prevent pass-the-hash attacks?

Which of the following is a commonly used UNIX enumeration tool?

To identify the NetBIOS names of systems on the 193.145.85.0 network, which of the following commands do you use?

Which of the following is a Windows command-line utility for seeing NetBIOS shares on a network?

Which port numbers indicate NetBIOS is in use on a remote Target?

Enumeration of Windows systems can be more difficult if which port is filtered?

A NetBIOS name can contain a maximum of how many characters?

The nbtstat command is used to enumerate *nix systems. True of False?

Skip to main content

This browser is no longer supported.

Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.

netstat

  • Article
  • 07/29/2021
  • 3 minutes to read

In this article

Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows Server 2012

Displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols). Used without parameters, this command displays active TCP connections.

Important

This command is available only if the Internet Protocol (TCP/IP) protocol is installed as a component in the properties of a network adapter in Network Connections.

Syntax

netstat [-a] [-b] [-e] [-n] [-o] [-p ] [-r] [-s] []

Parameters

ParameterDescription
-a Displays all active TCP connections and the TCP and UDP ports on which the computer is listening.
-b Displays the executable involved in creating each connection or listening port. In some cases well-known executables host multiple independent components, and in these cases the sequence of components involved in creating the connection or listening port is displayed. In this case the executable name is in [] at the bottom, on top is the component it called, and so forth until TCP/IP was reached. Note that this option can be time-consuming and will fail unless you have sufficient permissions.
-e Displays Ethernet statistics, such as the number of bytes and packets sent and received. This parameter can be combined with -s.
-n Displays active TCP connections, however, addresses and port numbers are expressed numerically and no attempt is made to determine names.
-o Displays active TCP connections and includes the process ID (PID) for each connection. You can find the application based on the PID on the Processes tab in Windows Task Manager. This parameter can be combined with -a, -n, and -p.
-p Shows connections for the protocol specified by Protocol. In this case, the Protocol can be tcp, udp, tcpv6, or udpv6. If this parameter is used with -s to display statistics by protocol, Protocol can be tcp, udp, icmp, ip, tcpv6, udpv6, icmpv6, or ipv6.
-s Displays statistics by protocol. By default, statistics are shown for the TCP, UDP, ICMP, and IP protocols. If the IPv6 protocol is installed, statistics are shown for the TCP over IPv6, UDP over IPv6, ICMPv6, and IPv6 protocols. The -p parameter can be used to specify a set of protocols.
-r Displays the contents of the IP routing table. This is equivalent to the route print command.
Redisplays the selected information every interval seconds. Press CTRL+C to stop the redisplay. If this parameter is omitted, this command prints the selected information only once.
/? Displays help at the command prompt.

Remarks

  • The netstat command provides statistics for the following:

    ParameterDescription
    Proto The name of the protocol (TCP or UDP).
    Local address The IP address of the local computer and the port number being used. The name of the local computer that corresponds to the IP address and the name of the port is shown unless the -n parameter is specified. If the port is not yet established, the port number is shown as an asterisk (*).
    Foreign address The IP address and port number of the remote computer to which the socket is connected. The names that corresponds to the IP address and the port are shown unless the -n parameter is specified. If the port is not yet established, the port number is shown as an asterisk (*).
    State Indicates the state of a TCP connection, including:
    • CLOSE_WAIT
    • CLOSED
    • ESTABLISHED
    • FIN_WAIT_1
    • FIN_WAIT_2
    • LAST_ACK
    • LISTEN
    • SYN_RECEIVED
    • SYN_SEND
    • TIMED_WAIT

Examples

To display both the Ethernet statistics and the statistics for all protocols, type:

netstat -e -s

To display the statistics for only the TCP and UDP protocols, type:

netstat -s -p tcp udp

To display active TCP connections and the process IDs every 5 seconds, type:

netstat -o 5

To display active TCP connections and the process IDs using numerical form, type:

netstat -n -o

Additional References

  • Command-Line Syntax Key

Feedback

Submit and view feedback for

Which tools can be used for enumeration?

Let us now discuss some of the tools that are widely used for Enumeration..
NTP Suite. NTP Suite is used for NTP enumeration. ... .
enum4linux. enum4linux is used to enumerate Linux systems. ... .
smtp-user-enum. smtp-user-enum tries to guess usernames by using SMTP service. ... .
Quick Fix..

What tool can be used to enumerate services on a Windows operating system?

Windows operating systems can be enumerated with multiple tools from Sysinternals.

What is network enumeration tool?

A network enumerator or network scanner is a computer program used to retrieve usernames and info on groups, shares, and services of networked computers. This type of program scans networks for vulnerabilities in the security of that network.

Is DumpSec an enumeration tool?

DumpSec and Hyena are two enumeration tools used with the Windows Operating System. DumpSec was made by Foundstone, Inc. An astonishing amount of info can be gathered using this tool.