Windows Management
Command That Line (Windows Edition)
Command That Line
(Linux Edition)
Mac...
Threat Attack
100

This Windows program allows you to see all connected hardware to the system, and if that hardware is operational, disabled, or needs troubleshooting

What is Device Manager

100

This command let's you send out an ICMP packet to see if it returns back to you and confirms who you contacted is online

What is Ping?

100

This addition to a command is used to elevate permissions to an administrator level, but only for that command

What is sudo?

100

This is where MacOS stores the most commonly used applications, those currently open, and the Finder Application

What is the Dock?

100

This type of attack tries every possible password until it finds the right one

What is a Brute Force?

200

This program within the Microsoft Management Console can allow you to read the logs Windows generates as normal operations

What is the Event Viewer?

200

This command will list your IP Address, and can also renew, release or flush the DNS Resolver Cache

What is ipconfig?

200

This Command will tell you your current location

What is pwd?

200

This function is how you can "End Task" on an unresponsive program in MacOS

What is Force Quit?

200

A vulnerability that is exploited before the developer knows about it or can release a patch

What is a Zero-Day?

300

This program can let you edit the "system map" of Windows, but only should be used with instructions or if you're well practiced in it

What is Registry Editor

300

This command is useful for mapping the steps your computer takes to contact another computer or website

What is tracert?

300

This command will allow you to switch users inside of the Terminal shell

What is su?

300

This program is often considered Mac's answer to the Windows Control Panel

What is System Preferences?

300

This type of attack can use dumpster diving, vishing phone calls, pretending to be law enforcement or other members of the company, scareware webpages, phising, spear phishing or whaling, or baiting to gain access

What is Social Engineering?

400

This Windows program can show you more detailed information about system resource use than Task Manager

What is Resource Monitor?

400

This command lets you update and enforce the Group Policy rules from your Active Directory/Azure network to your computer

What is gpupdate?

400

This command will let you modify the permissions for an individual file or a full folder

What is chmod?

400

This is the MacOS version of Task Manager

What is Activity Monitor?

400

his type of attack uses a custom Access Point programmed with the SSID of a legitimate business nearby to capture and redirect internet traffic

What is an Evil Twin?

500

This is the Windows program that lets you view, start, stop or restart any active services on your system

What is Services Manager?

500


What is netstat

500

This Command will let you change the ownership of a Linux file

What is chown?

500

What is HFS+?

500

An attack launched from multiple compromised systems referred to as a botnet and causes a service at a given host to fail or to become unavailable to legitimate users

What is a Distributed Denial of Service?

M
e
n
u