answersLogoWhite

0

What commands are used for hacking?

User Avatar

Anonymous

13y ago
Updated: 8/19/2019

mostly commands usd for hacking are net user "account name"/random and you get the password

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

How can you use hacking in c program?

That entirely depends on what you want it to do, however it is easy to send commands to the command line using subprocess.Popen(), read files and modify them or back them up using the built in open(), or delete files. Did this answer your question?


How to scare people?

Pretend you're hacking in Admin Abuse in ROBLOX by using admin commands that NOBODY uses. Like, EVER.


Difference between Cursor-Positioning commands and Display-Adjusting commands?

Cursor Positioning commands mainly used in CLI and Display Adjusting commands mainly used in GUI..


What are two traditional UNIX commands used to send print jobs to a printer?

The lp and lpr commands are the traditional commands used to print jobs on UNIX.


What is hacking used for?

It is a saw used for cutting metal plates


What substances can be used to make armor in minecraft?

Without any mods, armour can be made from leather, iron, gold or diamond. Chainmail armour also exists, but you can't get it without hacking or server commands because the crafting recipe uses fire blocks.


What are the four whistle commands used on a range and their related verbal commands?

flood and pictures


What is the term used for Unauthorized entry into a system?

hacking


Is hacking good or bad?

Hacking is a term that has gained a negative connotation. Hacking is simply the act of exploiting a program's features to accomplish a result. This can obviously be used for good or bad purposes. Hacking isn't inherently good or bad, it's simply a process.


Will there be commands in minecraft pocket edition?

Most likely no, because commands is only a thing that is used for computers.


Is f12 a hacking key?

F12 is a developer key. Pressing on on most browsers allow the user to see the development code. They can't edit anything, so no, it is not used for "hacking". Hacking is highly illegal, so no computer is going to come pre-equipped with hacking capabilities.


What are used to represent the files and commands?

.exe