The Windows commands below will help you alter systems and move data between Windows systems and are usually executed from the context of the cmd.exe or command.exe prompt.
For more information: http://technet.microsoft.com/en-us/library/bb490939.aspx
- Command with arguments:
netsh firewall set opmode [disable|enable] - Description: Enable or disable the Windows Firewall (requires admin privileges).
- Minimum required version: Windows Vista.
- Output:
-
**Windows Vista:** Show/Hide 
C:\Users\johndoe>netsh firewall set opmode enable
-
Ok.
C:\Users\johndoe>netsh firewall set opmode disable
Ok.
-
**Windows 7:** Show/Hide 
C:\Users\johndoe>netsh firewall set opmode enable
IMPORTANT: Command executed successfully.
However, "netsh firewall" is deprecated;
use "netsh advfirewall firewall" instead.
For more information on using "netsh advfirewall firewall" commands
instead of "netsh firewall", see KB article 947709
at http://go.microsoft.com/fwlink/?linkid=121488 .
Ok.
C:\Users\johndoe>netsh firewall set opmode disable
IMPORTANT: Command executed successfully.
However, "netsh firewall" is deprecated;
use "netsh advfirewall firewall" instead.
For more information on using "netsh advfirewall firewall" commands
instead of "netsh firewall", see KB article 947709
at http://go.microsoft.com/fwlink/?linkid=121488 .
Ok.
- Command with arguments:
netsh interface portproxy add v4tov4 listenport=<LPORT> listenaddress=0.0.0.0 connectport=<RPORT> connectaddress=<RHOST> - Description: Set up a port forwarding proxy between local host on on remote host :
- Minimum required version: Windows 7.
- Note: Will remain persistant through reboot. Can also support
v4tov6,v6tov6, andv6tov4
- Command with arguments:
netsh trace start capture=yes overwrite=no tracefile=<FilePath.etl> - Description: uses netsh to sniff traffic
- Minimum required version: Windows 7.
- Note: Output will be in .etl format. Must convert to libpcap to read with wireshark etc. To stop sniffing use
netsh trace stop. Default max filesize is 250MB, and this command will stop sniffing once this size is reached. If larger dumps are needed usemaxsize=<N>
- Command with arguments:
netsh wlan set hostednetwork mode=[allow\|disallow]netsh wlan set hostednetwork ssid=<ssid> key=<passphrase> keyUsage=persistent\|temporarynetsh wlan [start|stop] hostednetwork
- Description:
- Enables or disables hostednetwork service.
- Complete hosted network setup for creating a wireless backdoor.
- Starts or stops a wireless backdoor. See below to set it up.
Note: Windows 7 only.