CommandLine tools
msinfo32.exe = system information taskmgr.exe = task manager
msiexe.exe = Windows Installer
control.exe timedate.cpl = setup date & time control.exe intl.cpl = setup region
regedit = registy editor
netplwiz = user accounts management
eventvwr = event viewer
devmgmt = device manager
diskmgmt = disk manager
firewall = firewall manager
Shell:AppsFolder = opens up Applications folder on Windows 10 mdsched.exe = Windows 10 built-in memtest
==============================================
Find what user is logged on the remote computer (note: you can use this wmic to query other computer devices as well)
>wmic /node:"computer_name" computersystem get username
or
>psexec -u username \\remotecomputer cmd.exe
==============================================
>wmic computersystem get username = find what user is logged on
>net users = list all local users
>net localgroup = list all local groups
>net localgroup Administrators = list members of Administrators group
>wmic useraccount get name = lists all user accounts
>nslookup -nosearch -nodefname your_vCenter_FQDN = check if your DNS resolves a FQDN_or_IP_address
>sc queryex | findstr "DISPLAY_NAME SERVICE_NAME STATUS" | find /i "name" > C:\services.txt & C:\services.txt = Find Service_Name using sc (service controller) command
>sc qc Service_Name = Find configuration of a specific service
>net session | find "\\" =
>net session | find /c "\\" = Find how many users are using a share from that server
>netstat
>net view = Find all your computer network connections
>tcpview.exe
>netstat -an | more
>netstat -an | find "587" = Find Listening ports
>netstat -ano | findstr LISTENING = find "listening" ports
>netstat -ano | findstr "PID :8081" = The -a switch displays all ports in use, not just the ports associated with the current user. The -n option stops a hostname lookup (which takes a long time). The -o option lists the process ID that is responsible for the port activity. The findstr command matches the header row that contains the PID string, and the port you are looking for, in a port format with the preceding co lon, is :8081.
>echo %VARIABLE% = where VARIABLE is the value name of the env var you want to see its key displayed (e.g. echo %AWS_DEFAULT_ REGION% will show you the region your AWS CLI is set for)
>echo %path:;=&echo.%
>set = displays all env vars
>reg query HKCU\Environment = shows all curent user env var
https://superuser.com/questions/1369142/how-this-windows-command-works-echo-path-echo/1369153
>dsquery user -name Ro* = Get the connection strings for all users with names starting in Ro*
>netdom renamecomputer %computername% /newname: SERVER20 = Change computer name >psexec.exe \\remotecomputer cmd =
>query session (this is for local logged in user)
>net session (this is for remote logged in users) = Find who's logged in to a remote computer
SSH connection to AWS database
==============================
ssh -N -L 3307:db_endpoint_name.us-east-2.rds.amazonaws.com:3306 username@bastion_server_name.us- east-2.compute.amazonaws.com -I yourUserPrivateKey.pem