Piping Data in DOS on Windows – Video


Well this is my last week of exams, and today I got a free day, tomorrow it will be maths… Anyway while waiting for somebody I got bored and decided to make a small (tiny) video about piping data under windows, you know | …

In Unix-like computer operating systems, a pipeline is the original software pipeline: a set of processes chained by their standard streams, so that the output of each process (stdout) feeds directly as input (stdin) of the next one.

More at Wikipedia – Pipeline (UNIX)

As always a link on youtube (better quality than the last 2 videos): Tips&Tricks About Piping Data
A download link: Piping_data.wmv
My youtube channel =)

Posted in: Windows Hacking

, , , ,


Latest Posts:


Aclpwn.Py - Exploit ACL Based Privilege Escalation Paths in Active Directory Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory
Aclpwn.py is a tool that interacts with BloodHound< to identify and exploit ACL based privilege escalation paths.
Vulhub - Pre-Built Vulnerable Docker Environments For Learning To Hack Vulhub – Pre-Built Vulnerable Docker Environments For Learning To Hack
Vulhub is an open-source collection of pre-built vulnerable docker environments for learning to hack. No pre-existing knowledge of docker is required, just execute two simple commands.
LibInjection - Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) LibInjection – Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS)
LibInjection is a C library to Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) through lexical analysis of real-world Attacks.
Grype - Vulnerability Scanner For Container Images & Filesystems Grype – Vulnerability Scanner For Container Images & Filesystems
Grype is a vulnerability scanner for container images and filesystems with an easy to install binary that supports the packages for most major *nix based OS.
APT-Hunter - Threat Hunting Tool via Windows Event Log APT-Hunter – Threat Hunting Tool via Windows Event Log
APT-Hunter is a threat hunting tool for windows event logs made from the perspective of the purple team mindset to provide detection for APT movements hidden in the sea of windows event logs.
GitLab Watchman - Audit Gitlab For Sensitive Data & Credentials GitLab Watchman – Audit Gitlab For Sensitive Data & Credentials
GitLab Watchman is an app that uses the GitLab API to audit GitLab for sensitive data and credentials exposed internally, this includes code, commits, wikis etc


8 Responses to Piping Data in DOS on Windows – Video

  1. gyaresu July 3, 2007 at 2:08 am #

    Excellent.
    Coming from a Unix/Linux background I find the Windows command line inexorably simplistic.
    Little tricks like this are appreciated.

    Stuff Digg, Darknet is fast becoming a daily ‘must check’.

    Cheers

  2. backbone July 3, 2007 at 2:22 pm #

    thanks guys, this type of comments push me forward on doing more of this type of videos….

  3. Torvaun July 3, 2007 at 3:38 pm #

    Have you considered using Metacafe instead of Youtube? You could get paid by them for the privilege of hosting your video.

  4. backbone July 3, 2007 at 3:52 pm #

    i didn’t know that, but I’m satisfied by youtube. maybe one day I’ll move to metacafe, but not for the (possible) money… just because it sound sexier :)

  5. gyaresu July 3, 2007 at 11:48 pm #

    Then a myspace page? :) /sarc

  6. Patrick Ogenstad July 7, 2007 at 9:51 am #

    But you don’t even need to use a pipe to use the find command :)

    gyraresu:

    You need to check on the new Windows shell PowerShell. When I first started using Linux what I liked most was the shell it was just so much more powerfull than what cmd.exe could offer. If PowerShell had been availible at the time I wouldn’t have been so impressed with bash.

  7. backbone July 7, 2007 at 11:22 am #

    you are right find can be used on it’s own… but I used it for showing some mode of piping data =0

  8. Daniel July 7, 2007 at 11:24 am #

    i dont mean to sound like broken record..record..cord…cord

    but, wheres the podcast?
    I’ll be glad to work with you to set it up, email me at the email provided in my comments.