2018-06-23 12:45:27 +02:00
< p align = "center" >
< img src = "https://github.com/trimstray/awesome-ninja-admins/blob/master/doc/img/awesome_ninja_admins.png"
alt="Master">
< / p >
2018-06-23 17:28:21 +02:00
< br >
2018-07-02 20:01:06 +02:00
< h4 align = "center" > A collection of awesome lists, manuals, blogs, hacks, one-liners and tools for < b > Awesome Ninja Admins< / b > .< / h4 >
2018-06-23 12:45:27 +02:00
< br >
2018-06-23 17:28:21 +02:00
< p align = "center" >
< a href = "https://github.com/trimstray/awesome-ninja-admins/tree/master" >
2018-06-23 17:31:10 +02:00
< img src = "https://img.shields.io/badge/Branch-master-green.svg?longCache=true"
2018-06-23 17:28:21 +02:00
alt="Branch">
< / a >
< a href = "https://awesome.re" >
2018-06-23 17:31:10 +02:00
< img src = "https://awesome.re/badge.svg"
2018-06-23 17:28:21 +02:00
alt="Awesome">
< a href = "http://www.gnu.org/licenses/" >
2018-06-24 15:55:00 +02:00
< img src = "https://img.shields.io/badge/License-GNU-blue.svg?longCache=true"
2018-06-23 17:28:21 +02:00
alt="License">
< / a >
< / p >
< div align = "center" >
< sub > Created by
< a href = "https://twitter.com/trimstray" > trimstray< / a > and
< a href = "https://github.com/trimstray/awesome-ninja-admins/graphs/contributors" >
contributors
< / a >
< / div >
< br >
***
2018-06-24 09:10:07 +02:00
## Who is Ninja Admins?
2018-06-23 20:01:28 +02:00
2018-06-23 23:33:37 +02:00
- race of pure evil who rule the network through a monarchistic feudelic system
2018-06-23 23:26:33 +02:00
- they never opened the door for strangers (or anyone at all)
2018-07-06 08:18:53 +02:00
- they know very nasty piece of code like a ** [fork bombs ](https://en.wikipedia.org/wiki/Fork_bomb )**
- they can make dd is not a ** [destroyer of disks ](http://www.noah.org/wiki/Dd_-_Destroyer_of_Disks )**
2018-06-24 09:10:07 +02:00
- they know that `#!/usr/bin/env bash` superior to `#!/bin/bash`
2018-06-24 15:55:00 +02:00
- they know that `su -` logs in completely as root
2018-07-06 08:18:53 +02:00
- they miss and cry for ** [Slackware ](http://www.slackware.com/ )** on production
2018-06-24 17:39:18 +02:00
- they love the old admin nix-world
2018-06-23 20:04:03 +02:00
2018-07-05 23:50:51 +02:00
## :ballot_box_with_check: Todo
- [ ] Add useful shell functions
- [ ] Add one-liners for collection tools (eg. CLI Tools)
- [ ] Add Ninja Admins T-Shirt stickers
- [ ] Generate Awesome Ninja Admins book (eg. pdf format)
2018-06-24 09:10:07 +02:00
## Ninja Admins Collection
2018-06-23 20:04:03 +02:00
2018-06-24 17:16:22 +02:00
#### CLI Tools
2018-06-24 00:34:42 +02:00
2018-06-28 10:07:17 +02:00
##### :black_small_square: Shells
2018-06-28 09:48:07 +02:00
2018-06-23 23:46:24 +02:00
< p >
2018-06-24 00:06:15 +02:00
:small_orange_diamond: < a href = "https://ohmyz.sh/" > < b > Oh My ZSH!< / b > < / a > - the best framework for managing your Zsh configuration.< br >
2018-07-12 14:19:17 +02:00
:small_orange_diamond: < a href = "https://github.com/Bash-it/bash-it" > < b > bash-it< / b > < / a > - framework for using, developing and maintaining shell scripts and custom commands for your daily work.< br >
:small_orange_diamond: < a href = "https://github.com/oh-my-fish/oh-my-fish" > < b > Oh My Fish< / b > < / a > - the Fishshell framework.< br >
2018-06-28 09:48:07 +02:00
< / p >
2018-06-28 10:07:17 +02:00
##### :black_small_square: Managers
2018-06-28 09:48:07 +02:00
< p >
2018-06-25 09:46:29 +02:00
:small_orange_diamond: < a href = "https://midnight-commander.org/" > < b > Midnight Commander< / b > < / a > - visual file manager, licensed under GNU General Public License.< br >
:small_orange_diamond: < a href = "https://www.gnu.org/software/screen/" > < b > screen< / b > < / a > - full-screen window manager that multiplexes a physical terminal.< br >
:small_orange_diamond: < a href = "https://github.com/tmux/tmux/wiki" > < b > tmux< / b > < / a > - terminal multiplexer, lets you switch easily between several programs in one terminal.< br >
2018-06-28 09:48:07 +02:00
< / p >
2018-06-28 10:07:17 +02:00
##### :black_small_square: Network
2018-06-28 09:48:07 +02:00
< p >
2018-06-24 09:10:07 +02:00
:small_orange_diamond: < a href = "https://curl.haxx.se/" > < b > Curl< / b > < / a > - command line tool and library
for transferring data with URLs.< br >
:small_orange_diamond: < a href = "https://github.com/jkbrzt/httpie" > < b > HTTPie< / b > < / a > - a user-friendly HTTP client.< br >
2018-06-24 11:03:56 +02:00
:small_orange_diamond: < a href = "https://gnutls.org/manual/html_node/gnutls_002dcli-Invocation.html" > < b > gnutls-cli< / b > < / a > - client program to set up a TLS connection to some other computer.< br >
2018-07-12 14:36:34 +02:00
:small_orange_diamond: < a href = "https://nmap.org/" > < b > nmap< / b > < / a > - free and open source (license) utility for network discovery and security auditing.< br >
2018-07-12 14:15:10 +02:00
:small_orange_diamond: < a href = "http://www.hping.org/" > < b > hping< / b > < / a > - command-line oriented TCP/IP packet assembler/analyzer.< br >
:small_orange_diamond: < a href = "https://github.com/robertdavidgraham/masscan" > < b > masscan< / b > < / a > - the fastest Internet port scanner, spews SYN packets asynchronously.< br >
2018-06-25 13:46:27 +02:00
:small_orange_diamond: < a href = "http://netcat.sourceforge.net/" > < b > netcat< / b > < / a > - networking utility which reads and writes data across network connections, using the TCP/IP protocol.< br >
:small_orange_diamond: < a href = "https://www.tcpdump.org/" > < b > tcpdump< / b > < / a > - powerful command-line packet analyzer.< br >
2018-07-12 14:15:10 +02:00
:small_orange_diamond: < a href = "https://www.wireshark.org/docs/man-pages/tshark.html" > < b > tshark< / b > < / a > - dump and analyze network traffic (wireshark cli).< br >
:small_orange_diamond: < a href = "https://github.com/mschwager/fierce" > < b > fierce< / b > < / a > - a DNS reconnaissance tool for locating non-contiguous IP space.< br >
:small_orange_diamond: < a href = "https://github.com/aboul3la/Sublist3r" > < b > sublist3r< / b > < / a > - fast subdomains enumeration tool for penetration testers.< br >
< / p >
##### :black_small_square: SSL
< p >
:small_orange_diamond: < a href = "https://github.com/nabla-c0d3/sslyze" > < b > sslyze
< / b > < / a > - fast and powerful SSL/TLS server scanning library.< br >
:small_orange_diamond: < a href = "https://github.com/rbsec/sslscan" > < b > sslscan< / b > < / a > - tests SSL/TLS enabled services to discover supported cipher suites.< br >
:small_orange_diamond: < a href = "https://github.com/drwetter/testssl.sh" > < b > testssl.sh< / b > < / a > - testing TLS/SSL encryption anywhere on any port.< br >
< / p >
##### :black_small_square: Auditing Tools
< p >
:small_orange_diamond: < a href = "https://cisofy.com/lynis/" > < b > lynis< / b > < / a > - battle-tested security tool for systems running Linux, macOS, or Unix-based operating system.< br >
< / p >
##### :black_small_square: System Diagnostics/Debuggers
< p >
:small_orange_diamond: < a href = "https://github.com/strace/strace" > < b > strace< / b > < / a > - diagnostic, debugging and instructional userspace utility for Linux.< br >
:small_orange_diamond: < a href = "https://github.com/draios/sysdig" > < b > sysdig< / b > < / a > - system exploration and troubleshooting tool with first class support for containers.< br >
:small_orange_diamond: < a href = "https://en.wikipedia.org/wiki/Lsof" > < b > lsof< / b > < / a > - displays in its output information about files that are opened by processes.< br >
:small_orange_diamond: < a href = "http://www.brendangregg.com/flamegraphs.html" > < b > FlameGraph< / b > < / a > - stack trace visualizer.< br >
:small_orange_diamond: < a href = "https://github.com/zevv/lsofgraph" > < b > lsofgraph< / b > < / a > - small utility to convert Unix lsof output to a graph showing FIFO and UNIX interprocess communication.< br >
< / p >
##### :black_small_square: Log Analyzers
< p >
:small_orange_diamond: < a href = "https://goaccess.io/" > < b > GoAccess< / b > < / a > - real-time web log analyzer and interactive viewer that runs in a terminal.< br >
2018-06-28 09:48:07 +02:00
< / p >
2018-06-28 10:07:17 +02:00
##### :black_small_square: Databases
2018-06-28 09:48:07 +02:00
< p >
2018-07-12 14:15:10 +02:00
:small_orange_diamond: < a href = "https://github.com/xo/usql" > < b > usql< / b > < / a > - universal command-line interface for SQL databases.< br >
2018-06-25 13:32:28 +02:00
:small_orange_diamond: < a href = "https://github.com/dbcli/pgcli" > < b > pgcli< / b > < / a > - postgres CLI with autocompletion and syntax highlighting.< br >
2018-07-04 10:46:16 +02:00
:small_orange_diamond: < a href = "https://github.com/dbcli/mycli" > < b > mycli< / b > < / a > - terminal client for MySQL with autocompletion and syntax highlighting.< br >
2018-06-24 09:10:07 +02:00
< / p >
2018-06-24 17:16:22 +02:00
#### Web Tools
2018-06-28 10:07:17 +02:00
##### :black_small_square: SSL
2018-06-24 11:34:49 +02:00
< p >
:small_orange_diamond: < a href = "https://www.ssllabs.com/ssltest/" > < b > SSL Server Test< / b > < / a > - free online service performs a deep analysis of the configuration of any SSL web server.< br >
:small_orange_diamond: < a href = "https://dev.ssllabs.com/ssltest/" > < b > SSL Server Test (DEV)< / b > < / a > - free online service performs a deep analysis of the configuration of any SSL web server.< br >
:small_orange_diamond: < a href = "https://www.htbridge.com/ssl/" > < b > ImmuniWeb® SSLScan< / b > < / a > - test SSL/TLS (PCI DSS, HIPAA and NIST).< br >
:small_orange_diamond: < a href = "https://report-uri.com/home/tools" > < b > Report URI< / b > < / a > - monitoring security policies like CSP and HPKP.< br >
:small_orange_diamond: < a href = "https://csp-evaluator.withgoogle.com/" > < b > CSP Evaluator< / b > < / a > - allows developers and security experts to check if a Content Security Policy.< br >
2018-07-15 11:19:45 +02:00
:small_orange_diamond: < a href = "https://badssl.com/" > < b > badssl.com< / b > < / a > - memorable site for testing clients against bad SSL configs.< br >
2018-06-24 11:34:49 +02:00
:small_orange_diamond: < a href = "https://ccadb.org/resources" > < b > Common CA Database< / b > < / a > - repository of information about CAs, and their root and intermediate certificates.< br >
2018-06-25 13:32:28 +02:00
:small_orange_diamond: < a href = "https://certstream.calidog.io/" > < b > CERTSTREAM< / b > < / a > - real-time certificate transparency log update stream.< br >
2018-06-28 10:07:17 +02:00
< / p >
##### :black_small_square: HTTP Headers
< p >
:small_orange_diamond: < a href = "https://securityheaders.com/" > < b > Security Headers< / b > < / a > - analyse the HTTP response headers (with rating system to the results).< br >
:small_orange_diamond: < a href = "https://observatory.mozilla.org/" > < b > Observatory by Mozilla< / b > < / a > - set of tools to analyze your website.< br >
< / p >
##### :black_small_square: DNS
< p >
2018-06-24 17:33:27 +02:00
:small_orange_diamond: < a href = "http://viewdns.info/" > < b > ViewDNS< / b > < / a > - one source for free DNS related tools and information.< br >
2018-06-25 13:32:28 +02:00
:small_orange_diamond: < a href = "https://dnsspy.io/" > < b > DNS Spy< / b > < / a > - monitor, validate and verify your DNS configurations.< br >
2018-06-28 09:04:41 +02:00
:small_orange_diamond: < a href = "https://dnslytics.com/" > < b > DNSlytics< / b > < / a > - online investigation tool.< br >
2018-06-28 10:07:17 +02:00
< / p >
##### :black_small_square: Mail
< p >
:small_orange_diamond: < a href = "https://mxtoolbox.com/SuperTool.aspx" > < b > MX Toolbox< / b > < / a > - all of your MX record, DNS, blacklist and SMTP diagnostics in one integrated tool.< br >
< / p >
2018-06-28 11:16:06 +02:00
##### :black_small_square: Mass scanners (search engines)
2018-06-28 10:07:17 +02:00
< p >
2018-06-25 13:28:45 +02:00
:small_orange_diamond: < a href = "https://censys.io/" > < b > Censys< / b > < / a > - platform that helps information security practitioners discover, monitor, and analyze devices.< br >
2018-06-25 13:29:44 +02:00
:small_orange_diamond: < a href = "https://www.shodan.io/" > < b > Shodan< / b > < / a > - the world's first search engine for Internet-connected devices.< br >
2018-06-25 13:46:27 +02:00
:small_orange_diamond: < a href = "https://viz.greynoise.io/table" > < b > GreyNoise< / b > < / a > - mass scanner (such as Shodan and Censys).< br >
2018-06-28 10:07:17 +02:00
< / p >
##### :black_small_square: Net-tools
< p >
2018-07-11 15:50:44 +02:00
:small_orange_diamond: < a href = "https://toolbar.netcraft.com/site_report" > < b > Netcraft< / b > < / a > - detailed report about the site, helping you to make informed choices about their integrity.< br >
2018-06-28 09:33:37 +02:00
:small_orange_diamond: < a href = "https://securitytrails.com/" > < b > Security Trails< / b > < / a > - APIs for Security Companies, Researchers and Teams.< br >
:small_orange_diamond: < a href = "https://tools.keycdn.com/curl" > < b > Online Curl< / b > < / a > - curl test, analyze HTTP Response Headers.< br >
2018-06-28 10:07:17 +02:00
:small_orange_diamond: < a href = "http://ping.eu/" > < b > Ping.eu< / b > < / a > - online Ping, Traceroute, DNS lookup, WHOIS and others.< br >
:small_orange_diamond: < a href = "https://network-tools.com/" > < b > Network-Tools< / b > < / a > - network tools for webmasters, IT technicians & geeks.< br >
2018-06-28 09:33:37 +02:00
:small_orange_diamond: < a href = "https://www.url-encode-decode.com/" > < b > URL Encode/Decode< / b > < / a > - tool from above to either encode or decode a string of text.< br >
2018-07-11 16:00:02 +02:00
:small_orange_diamond: < a href = "https://regexr.com/" > < b > RegExr< / b > < / a > - online tool to learn, build, & test Regular Expressions (RegEx / RegExp).< br >
2018-07-05 23:50:51 +02:00
:small_orange_diamond: < a href = "https://www.hardenize.com/" > < b > Hardenize< / b > < / a > - deploy the security standards.< br >
2018-06-28 10:07:17 +02:00
< / p >
2018-07-11 15:50:44 +02:00
##### :black_small_square: Code parsers/playgrounds
< p >
:small_orange_diamond: < a href = "https://www.shellcheck.net/" > < b > ShellCheck< / b > < / a > - finds bugs in your shell scripts.< br >
:small_orange_diamond: < a href = "https://jsbin.com/?html,output" > < b > jsbin< / b > < / a > - live pastebin for HTML, CSS & JavaScript and more.< br >
< / p >
2018-06-28 10:07:17 +02:00
##### :black_small_square: Performance
< p >
2018-06-28 09:33:37 +02:00
:small_orange_diamond: < a href = "https://gtmetrix.com/" > < b > GTmetrix< / b > < / a > - analyze your site’ s speed and make it faster.< br >
:small_orange_diamond: < a href = "https://performance.sucuri.net/" > < b > Sucuri loadtimetester< / b > < / a > - test here the
performance of any of your sites from across the globe.< br >
2018-06-28 10:07:17 +02:00
< / p >
##### :black_small_square: Passwords
< p >
2018-06-28 09:43:26 +02:00
:small_orange_diamond: < a href = "https://www.random.org/passwords/" > < b > Random.org< / b > < / a > - generate random passwords.< br >
:small_orange_diamond: < a href = "https://gotcha.pw/" > < b > Gotcha?< / b > < / a > - list of 1.4 billion accounts circulates around the Internet.< br >
:small_orange_diamond: < a href = "https://haveibeenpwned.com/" > < b > have i been pwned?< / b > < / a > - check if you have an account that has been compromised in a data breach.< br >
2018-06-24 11:34:49 +02:00
< / p >
2018-06-24 11:03:56 +02:00
#### Manuals/Howtos/Tutorials
2018-06-24 09:10:07 +02:00
2018-06-28 10:07:17 +02:00
##### :black_small_square: Bash
2018-06-24 09:10:07 +02:00
< p >
:small_orange_diamond: < a href = "https://github.com/dylanaraps/pure-bash-bible" > < b > pure-bash-bible< / b > < / a > - a collection of pure bash alternatives to external processes.< br >
2018-06-24 11:34:49 +02:00
:small_orange_diamond: < a href = "http://wiki.bash-hackers.org/start" > < b > The Bash Hackers Wiki< / b > < / a > - hold documentation of any kind about GNU Bash.< br >
2018-06-28 10:07:17 +02:00
< / p >
##### :black_small_square: Unix tutorials
< p >
2018-06-25 13:32:28 +02:00
:small_orange_diamond: < a href = "https://www.cyberciti.biz/" > < b > nixCraft< / b > < / a > - linux and unix tutorials for new and seasoned sysadmin.< br >
2018-06-24 11:03:56 +02:00
:small_orange_diamond: < a href = "https://www.tecmint.com/" > < b > TecMint< / b > < / a > - the ideal Linux blog for Sysadmins & Geeks.< br >
2018-06-28 10:07:17 +02:00
< / p >
##### :black_small_square: Hacking
< p >
2018-06-24 11:34:49 +02:00
:small_orange_diamond: < a href = "http://www.hackingarticles.in/" > < b > Hacking Articles< / b > < / a > - LRaj Chandel's Security & Hacking Blog.< br >
2018-06-23 23:46:24 +02:00
< / p >
2018-06-23 19:59:39 +02:00
2018-06-24 10:33:59 +02:00
#### Blogs
< p >
:small_orange_diamond: < a href = "http://www.brendangregg.com/" > < b > Brendan Gregg's Blog< / b > < / a > - Brendan Gregg is an industry expert in computing performance and cloud computing.< br >
:small_orange_diamond: < a href = "http://gynvael.coldwind.pl/" > < b > Gynvael "GynDream" Coldwind< / b > < / a > - Gynvael is a IT security engineer at Google.< br >
2018-06-24 10:38:25 +02:00
:small_orange_diamond: < a href = "http://lcamtuf.coredump.cx/" > < b > Michał "lcamtuf" Zalewski< / b > < / a > - "white hat" hacker, computer security expert.< br >
2018-06-24 10:33:59 +02:00
:small_orange_diamond: < a href = "https://ma.ttias.be/" > < b > Mattias Geniar< / b > < / a > - developer, Sysadmin, Blogger, Podcaster and Public Speaker.< br >
:small_orange_diamond: < a href = "https://nickcraver.com/" > < b > Nick Craver< / b > < / a > - Software Developer and Systems Administrator for Stack Exchange.< br >
:small_orange_diamond: < a href = "https://robert.penz.name/" > < b > Robert Penz< / b > < / a > - IT security Expert.< br >
2018-06-24 10:38:25 +02:00
:small_orange_diamond: < a href = "https://scotthelme.co.uk/" > < b > Scott Helme< / b > < / a > - Security Researcher, international speaker and founder of securityheaders.com and report-uri.com.< br >
2018-06-24 10:33:59 +02:00
:small_orange_diamond: < a href = "https://security.szurek.pl/" > < b > Kacper Szurek< / b > < / a > - Detection Engineer at ESET.< br >
:small_orange_diamond: < a href = "https://www.troyhunt.com/" > < b > Troy Hunt< / b > < / a > - Microsoft Regional Director and Microsoft Most Valuable Professional for Developer Security.< br >
2018-07-11 21:05:51 +02:00
:small_orange_diamond: < a href = "https://linux-audit.com/" > < b > Linux Audit< / b > < / a > - the Linux security blog about Auditing, Hardening and Compliance by Michael Boelen.< br >
2018-07-11 20:57:51 +02:00
:small_orange_diamond: < a href = "https://linuxsecurity.expert/" > < b >
2018-07-11 21:05:51 +02:00
Linux Security Expert< / b > < / a > - trainings, howtos, checklists, security tools and more.< br >
2018-07-04 10:46:16 +02:00
:small_orange_diamond: < a href = "http://www.grymoire.com/" > < b > The Grymoire< / b > < / a > - collection of useful incantations for wizards, be you computer wizards, magicians, or whatever.< br >
2018-06-24 10:33:59 +02:00
< / p >
2018-06-28 09:33:37 +02:00
#### Systems/Services
2018-06-24 10:33:59 +02:00
2018-06-28 10:07:17 +02:00
##### :black_small_square: Systems
2018-06-24 10:33:59 +02:00
< p >
2018-07-05 23:50:51 +02:00
:small_orange_diamond: < a href = "http://www.slackware.com/" > < b > Slackware< / b > < / a > - the most "Unix-like" Linux distribution.< br >
2018-06-25 13:28:45 +02:00
:small_orange_diamond: < a href = "https://www.openbsd.org/" > < b > OpenBSD< / b > < / a > - multi-platform 4.4BSD-based UNIX-like operating system.< br >
2018-06-25 11:03:57 +02:00
:small_orange_diamond: < a href = "https://hardenedbsd.org/" > < b > HardenedBSD< / b > < / a > - HardenedBSD aims to implement innovative exploit mitigation and security solutions.< br >
2018-06-28 10:07:17 +02:00
< / p >
##### :black_small_square: HTTP(s) Services
< p >
2018-06-24 10:33:59 +02:00
:small_orange_diamond: < a href = "https://varnish-cache.org/" > < b > Varnish HTTP Cache< / b > < / a > - HTTP accelerator designed for content-heavy dynamic web sites.< br >
2018-06-28 10:07:17 +02:00
< / p >
##### :black_small_square: Security/hardening
< p >
2018-07-09 23:28:04 +02:00
:small_orange_diamond: < a href = "https://emeraldonion.org/" > < b > Emerald Onion< / b > < / a > - seattle-based encrypted-transit internet service provider.< br >
:small_orange_diamond: < a href = "https://www.unbound.net/" > < b > Unbound< / b > < / a > - validating, recursive, and caching DNS resolver (with TLS).< br >
2018-06-24 10:33:59 +02:00
< / p >
2018-06-24 11:03:56 +02:00
#### Lists
2018-06-24 11:34:49 +02:00
< p >
:small_orange_diamond: < a href = "https://github.com/kahun/awesome-sysadmin" > < b > Awesome Sysadmin< / b > < / a > - amazingly awesome open source sysadmin resources.< br >
:small_orange_diamond: < a href = "https://github.com/alebcay/awesome-shell" > < b > Awesome Shell< / b > < / a > - awesome command-line frameworks, toolkits, guides and gizmos.< br >
:small_orange_diamond: < a href = "https://github.com/Hack-with-Github/Awesome-Hacking" > < b > Awesome-Hacking< / b > < / a > - awesome lists for hackers, pentesters and security researchers.< br >
2018-07-10 15:42:41 +02:00
:small_orange_diamond: < a href = "https://github.com/learnbyexample/Command-line-text-processing" > < b > Command-line-text-processing< / b > < / a > - from finding text to search and replace, from sorting to beautifying text and more.< br >
2018-06-24 11:34:49 +02:00
< / p >
2018-06-28 09:04:41 +02:00
2018-06-29 13:57:42 +02:00
#### Hacking/Penetration testing
##### :black_small_square: Bounty programs
< p >
:small_orange_diamond: < a href = "https://www.openbugbounty.org/" > < b > Openbugbounty< / b > < / a > - allows any security researcher reporting a vulnerability on any website.< br >
:small_orange_diamond: < a href = "https://www.hackerone.com/" > < b > hackerone< / b > < / a > - global hacker community to surface the most relevant security issues.< br >
:small_orange_diamond: < a href = "https://www.bugcrowd.com/" > < b > bugcrowd< / b > < / a > - crowdsourced cybersecurity for the enterprise.< br >
:small_orange_diamond: < a href = "https://crowdshield.com/" > < b > Crowdshield< / b > < / a > - crowdsourced Security & Bug Bounty Management.< br >
< / p >
##### :black_small_square: Web Training Apps
2018-06-28 09:04:41 +02:00
< p >
2018-07-11 09:57:32 +02:00
:small_orange_diamond: < a href = "https://metasploit.help.rapid7.com/docs/metasploitable-2" > < b > Metasploitable 2< / b > < / a > - vulnerable web application amongst security researchers.< br >
2018-06-29 13:57:42 +02:00
:small_orange_diamond: < a href = "http://www.dvwa.co.uk/" > < b > DVWA< / b > < / a > - PHP/MySQL web application that is damn vulnerable.< br >
2018-06-29 13:59:10 +02:00
:small_orange_diamond: < a href = "https://sourceforge.net/projects/mutillidae/" > < b > OWASP Mutillidae II< / b > < / a > - free, open source, deliberately vulnerable web-application.< br >
2018-06-29 13:57:42 +02:00
:small_orange_diamond: < a href = "https://www.owasp.org/index.php/OWASP_Juice_Shop_Project" > < b > OWASP Juice Shop Project< / b > < / a > - the most bug-free vulnerable application in existence.< br >
2018-06-29 13:59:10 +02:00
:small_orange_diamond: < a href = "https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project" > < b > OWASP WebGoat Project< / b > < / a > - insecure web application maintained by OWASP designed to teach web app security.< br >
2018-06-29 13:57:42 +02:00
:small_orange_diamond: < a href = "https://github.com/opendns/Security_Ninjas_AppSec_Training" > < b > Security Ninjas< / b > < / a > - open source application security training program.< br >
< / p >
2018-07-02 20:01:06 +02:00
2018-07-15 11:48:32 +02:00
##### :black_small_square: Labs
< p >
:small_orange_diamond: < a href = "https://www.hackthebox.eu/" > < b > Hack The Box< / b > < / a > - online platform allowing you to test your penetration testing skills.< br >
< / p >
2018-07-02 20:01:06 +02:00
#### One-liners
##### Table of Contents
- **[System](#system)**
* [terminal ](#tool-terminal )
* [mount ](#tool-mount )
* [fuser ](#tool-fuser )
2018-07-03 09:26:35 +02:00
* [ps ](#tool-ps )
2018-07-05 23:50:51 +02:00
* [top ](#tool-top )
2018-07-11 14:36:34 +02:00
* [kill ](#tool-kill )
2018-07-03 09:26:35 +02:00
* [find ](#tool-find )
* [diff ](#tool-diff )
2018-07-03 10:13:28 +02:00
* [tail ](#tool-tail )
* [cpulimit ](#tool-cpulimit )
* [pwdx ](#tool-pwdx )
2018-07-03 21:09:12 +02:00
* [tr ](#tool-tr )
* [chmod ](#tool-chmod )
2018-07-05 23:50:51 +02:00
* [who ](#tool-who )
* [screen ](#tool-screen )
* [du ](#tool-du )
* [inotifywait ](#tool-inotifywait )
2018-07-09 11:43:21 +02:00
* [openssl ](#tool-openssl )
2018-07-12 10:17:13 +02:00
* [gnutls-cli ](#tool-gnutls-cli )
2018-07-09 23:28:04 +02:00
* [secure-delete ](#tool-secure-delete )
2018-07-11 14:36:34 +02:00
* [dd ](#tool-dd )
2018-07-02 20:01:06 +02:00
- **[HTTP/HTTPS](#http-https)**
* [curl ](#tool-curl )
* [httpie ](#tool-httpie )
- **[Network](#network)**
2018-07-04 10:17:57 +02:00
* [ssh ](#tool-ssh )
2018-07-02 20:01:06 +02:00
* [linux-dev ](#tool-linux-dev )
* [tcpdump ](#tool-tcpdump )
2018-07-11 09:57:32 +02:00
* [tcpick ](#tool-tcpick )
2018-07-02 20:01:06 +02:00
* [ngrep ](#tool-ngrep )
* [hping3 ](#tool-hping3 )
* [netcat ](#tool-netcat )
* [socat ](#tool-socat )
* [lsof ](#tool-lsof )
2018-07-05 23:50:51 +02:00
* [netstat ](#tool-netstat )
2018-07-03 21:09:12 +02:00
* [rsync ](#tool-rsync )
2018-07-11 09:57:32 +02:00
* [host ](#tool-host )
* [dig ](#tool-dig )
2018-07-12 11:49:57 +02:00
* [network-other ](#tool-network-other )
2018-07-02 20:01:06 +02:00
- **[Programming](#programming)**
* [awk ](#tool-awk )
2018-07-03 09:26:35 +02:00
* [sed ](#tool-sed )
* [grep ](#tool-grep )
2018-07-02 20:01:06 +02:00
< a name = "system" > < b > System< / b > < / a >
2018-07-04 10:17:57 +02:00
##### Tool: [terminal](https://en.wikipedia.org/wiki/Linux_console)
2018-07-02 20:01:06 +02:00
###### Close shell keeping all subprocess running
```bash
disown -a & & exit
```
2018-07-03 09:26:35 +02:00
###### Exit without saving shell history
2018-07-02 20:01:06 +02:00
```bash
kill -9 $$
2018-07-09 12:09:57 +02:00
unset HISTFILE & & exit
2018-07-02 20:01:06 +02:00
```
2018-07-03 10:13:28 +02:00
###### Perform a branching conditional
```bash
true & & { echo success;} || { echo failed; }
```
2018-07-03 09:26:35 +02:00
###### Pipe stdout and stderr to separate commands
```bash
some_command > >(/bin/cmd_for_stdout) 2> >(/bin/cmd_for_stderr)
```
2018-07-11 14:43:39 +02:00
###### Redirect stdout and stderr each to separate files and print both to the screen
2018-07-05 23:50:51 +02:00
```bash
(some_command 2>& 1 1>& 3 | tee errorlog ) 3>& 1 1>& 2 | tee stdoutlog
```
2018-07-02 20:01:06 +02:00
###### List of commands you use most often
```bash
2018-07-12 21:15:08 +02:00
history | \
awk '{CMD[$2]++;count++;}END { for (a in CMD)print CMD[a] " " CMD[a]/count*100 "% " a;}' | \
grep -v "./" | \
column -c3 -s " " -t | \
sort -nr | nl | head -n 20
2018-07-02 20:01:06 +02:00
```
2018-07-11 14:43:39 +02:00
###### Empty a file (truncate to 0 size)
```bash
>filename
```
2018-07-02 20:01:06 +02:00
###### Quickly backup a file
```bash
cp filename{,.orig}
```
###### Delete all files in a folder that don't match a certain file extension
```bash
rm !(*.foo|*.bar|*.baz)
```
###### Edit a file on a remote host using vim
```bash
vim scp://user@host//etc/fstab
```
2018-07-03 09:26:35 +02:00
###### Create a directory and change into it at the same time
```bash
mkd () { mkdir -p "$@" & & cd "$@"; }
```
2018-07-03 10:13:28 +02:00
###### Convert uppercase files to lowercase files
```bash
rename 'y/A-Z/a-z/' *
```
2018-07-03 21:09:12 +02:00
###### Print a row of characters across the terminal
```bash
printf "%`tput cols`s" | tr ' ' '#'
```
2018-07-09 12:09:57 +02:00
###### Show shell history without line numbers
```bash
history | cut -c 8-
fc -l -n 1 | sed 's/^\s*//'
```
2018-07-09 23:28:04 +02:00
###### Run command(s) after exit session
```bash
cat > /etc/profile << __EOF__
_after_logout() {
username=$(whoami)
for _pid in $(ps afx | grep sshd | grep "$username" | awk '{print $1}') ; do
kill -9 $_pid
done
}
trap _after_logout EXIT
__EOF__
```
2018-07-11 14:36:34 +02:00
###### Generate a sequence of numbers
```bash
for ((i=1; i< =10; i+=2)) ; do echo $i ; done
# alternative: seq 1 2 10
for ((i=5; i< =10; ++i)) ; do printf '%02d\n' $i ; done
# alternative: seq -w 5 10
```
2018-07-03 10:13:28 +02:00
___
2018-07-04 10:17:57 +02:00
##### Tool: [mount](https://en.wikipedia.org/wiki/Mount_(Unix))
2018-07-02 20:01:06 +02:00
###### Mount a temporary ram partition
```bash
mount -t tmpfs tmpfs /mnt -o size=64M
```
* `-t` - filesystem type
* `-o` - mount options
2018-07-12 11:49:57 +02:00
###### Remount a filesystem as read/write
```bash
mount -o remount,rw /
```
2018-07-02 20:01:06 +02:00
___
2018-07-04 10:17:57 +02:00
##### Tool: [fuser](https://en.wikipedia.org/wiki/Fuser_(Unix))
2018-07-02 20:01:06 +02:00
###### Kills a process that is locking a file
```bash
fuser -k filename
```
2018-07-03 22:04:09 +02:00
###### Show what PID is listening on specific port
```bash
fuser -v 53/udp
```
2018-07-03 09:26:35 +02:00
___
2018-07-04 10:17:57 +02:00
##### Tool: [ps](https://en.wikipedia.org/wiki/Ps_(Unix))
2018-07-03 09:26:35 +02:00
###### Show a 4-way scrollable process tree with full details
```bash
ps awwfux | less -S
```
2018-07-03 10:13:28 +02:00
###### Processes per user counter
```bash
ps hax -o user | sort | uniq -c | sort -r
```
2018-07-03 09:26:35 +02:00
___
2018-07-04 10:17:57 +02:00
##### Tool: [find](https://en.wikipedia.org/wiki/Find_(Unix))
2018-07-03 09:26:35 +02:00
###### Find files that have been modified on your system in the past 60 minutes
```bash
find / -mmin 60 -type f
```
###### Find all files larger than 20M
```bash
find / -type f -size +20M
```
2018-07-03 21:09:12 +02:00
###### Find duplicate files (based on MD5 hash)
```bash
find -type f -exec md5sum '{}' ';' | sort | uniq --all-repeated=separate -w 33
```
2018-07-09 12:09:57 +02:00
###### Change permission only for files
```bash
cd /var/www/site && find . -type f -exec chmod 766 {} \;
cd /var/www/site & & find . -type f -exec chmod 664 {} +
```
###### Change permission only for directories
```bash
cd /var/www/site && find . -type d -exec chmod g+x {} \;
cd /var/www/site & & find . -type d -exec chmod g+rwx {} +
```
###### Find files and directories for specific user
```bash
find . -user < username > -print
```
###### Find files and directories for all without specific user
```bash
find . \!-user < username > -print
```
###### Delete older files than 60 days
```bash
find . -type f -mtime +60 -delete
```
2018-07-11 14:36:34 +02:00
###### Recursively remove all empty sub-directories from a directory
```bash
find . -depth -type d -empty -exec rmdir {} \;
```
###### How to find all hard links to a file
```bash
find < /path/to/dir> -xdev -samefile filename
```
2018-07-03 09:26:35 +02:00
___
2018-07-05 23:50:51 +02:00
##### Tool: [top](https://en.wikipedia.org/wiki/Top_(software))
###### Use top to monitor only all processes with the specific string
```bash
top -p $(pgrep -d , < str > )
```
* `<str>` - process containing str (eg. nginx, worker)
___
2018-07-11 14:36:34 +02:00
##### Tool: [kill](https://en.wikipedia.org/wiki/Kill_(command))
###### Kill a process running on port
```bash
kill -9 $(lsof -i :< port > | awk '{l=$2} END {print l}')
```
___
2018-07-04 10:17:57 +02:00
##### Tool: [diff](https://en.wikipedia.org/wiki/Diff)
2018-07-03 09:26:35 +02:00
###### Compare two directory trees
```bash
diff < (cd directory1 & & find | sort) < (cd directory2 & & find | sort)
```
2018-07-03 10:13:28 +02:00
___
2018-07-04 10:17:57 +02:00
##### Tool: [tail](https://en.wikipedia.org/wiki/Tail_(Unix))
2018-07-03 10:13:28 +02:00
###### Annotate tail -f with timestamps
```bash
2018-07-10 17:45:37 +02:00
tail -f file | while read ; do echo "$(date +%T.%N) $REPLY" ; done
2018-07-03 10:13:28 +02:00
```
###### Analyse an Apache access log for the most common IP addresses
```bash
tail -10000 access_log | awk '{print $1}' | sort | uniq -c | sort -n | tail
```
2018-07-12 11:49:57 +02:00
###### Analyse web server log and show only 5xx http codes
```bash
tail -n 100 -f /path/to/logfile | grep "HTTP/[1-2].[0-1]\" [5]"
```
2018-07-03 21:09:12 +02:00
___
2018-07-09 20:54:10 +02:00
##### Tool: [tar](https://en.wikipedia.org/wiki/Tar_(computing))
###### System backup with exclude specific directories
```bash
2018-07-09 21:45:27 +02:00
cd /
2018-07-10 17:45:37 +02:00
tar -czvpf /mnt/system$(date +%d%m%Y%s).tgz --directory=/ \
--exclude=proc/* --exclude=sys/* --exclude=dev/* --exclude=mnt/* .
2018-07-09 20:54:10 +02:00
```
2018-07-09 23:28:04 +02:00
###### System backup with exclude specific directories (pigz)
```bash
2018-07-10 17:45:37 +02:00
cd /
2018-07-09 23:28:04 +02:00
tar cvpf /backup/snapshot-$(date +%d%m%Y%s).tgz --directory=/ \
--exclude=proc/* --exclude=sys/* --exclude=dev/* \
--exclude=mnt/* --exclude=tmp/* --use-compress-program=pigz .
```
2018-07-09 20:54:10 +02:00
___
##### Tool: [dump](https://en.wikipedia.org/wiki/Dump_(program))
###### System backup to file
```bash
dump -y -u -f /backup/system$(date +%d%m%Y%s).lzo /
```
###### Restore system from lzo file
```bash
cd /
restore -rf /backup/system$(date +%d%m%Y%s).lzo
```
___
2018-07-04 10:17:57 +02:00
##### Tool: [cpulimit](http://cpulimit.sourceforge.net/)
2018-07-03 10:13:28 +02:00
###### Limit the cpu usage of a process
```bash
cpulimit -p pid -l 50
```
2018-07-11 09:57:32 +02:00
___
2018-07-04 10:17:57 +02:00
##### Tool: [pwdx](https://www.cyberciti.biz/faq/unix-linux-pwdx-command-examples-usage-syntax/)
2018-07-03 10:13:28 +02:00
###### Show current working directory of a process
```bash
pwdx < pid >
```
2018-07-03 21:09:12 +02:00
___
2018-07-04 10:17:57 +02:00
##### Tool: [taskset](https://www.cyberciti.biz/faq/taskset-cpu-affinity-command/)
2018-07-03 10:13:28 +02:00
###### Start a command on only one CPU core
```bash
taskset -c 0 < command >
```
2018-07-03 21:09:12 +02:00
___
2018-07-04 10:17:57 +02:00
##### Tool: [tr](https://en.wikipedia.org/wiki/Tr_(Unix))
2018-07-03 21:09:12 +02:00
###### Show directories in the PATH, one per line
```bash
tr : '\n' <<< $PATH
```
2018-07-11 09:57:32 +02:00
___
2018-07-04 10:17:57 +02:00
##### Tool: [chmod](https://en.wikipedia.org/wiki/Chmod)
2018-07-03 21:09:12 +02:00
###### Remove executable bit from all files in the current directory
```bash
chmod -R -x+X *
```
2018-07-09 23:28:04 +02:00
###### Restore permission for /bin/chmod
```bash
# 1:
cp /bin/ls chmod.01
cp /bin/chmod chmod.01
./chmod.01 700 file
# 2:
/bin/busybox chmod 0700 /bin/chmod
# 3:
setfacl --set u::rwx,g::---,o::--- /bin/chmod
```
2018-07-05 23:50:51 +02:00
___
##### Tool: [who](https://en.wikipedia.org/wiki/Who_(Unix))
###### Find last reboot time
```bash
who -b
```
___
##### Tool: [screen](https://en.wikipedia.org/wiki/GNU_Screen)
###### Start screen in detached mode
```bash
screen -d -m [< command > ]
```
___
##### Tool: [du](https://en.wikipedia.org/wiki/GNU_Screen)
###### Show 20 biggest directories with 'K M G'
```bash
2018-07-12 21:15:08 +02:00
du | \
sort -r -n | \
awk '{split("K M G",v); s=1; while($1>1024){$1/=1024; s++} print int($1)" "v[s]"\t"$2}' | \
head -n 20
2018-07-05 23:50:51 +02:00
```
2018-07-09 23:28:04 +02:00
___
2018-07-05 23:50:51 +02:00
##### Tool: [inotifywait](https://en.wikipedia.org/wiki/GNU_Screen)
###### Init tool everytime a file in a directory is modified
```bash
while true ; do inotifywait -r -e MODIFY dir/ & & ls dir/ ; done;
```
2018-07-09 23:28:04 +02:00
___
2018-07-09 11:43:21 +02:00
##### Tool: [openssl](https://www.openssl.org/)
###### Testing connection to remote host
```bash
echo | openssl s_client -connect google.com:443 -showcerts
```
2018-07-13 11:26:17 +02:00
###### Testing connection to remote host (with SNI support)
```bash
echo | openssl s_client -showcerts -servername google.com -connect google.com:443
```
2018-07-09 11:43:21 +02:00
###### Testing connection to remote host with specific ssl version
```bash
openssl s_client -tls1_2 -connect google.com:443
```
###### Testing connection to remote host with specific ssl cipher
```bash
openssl s_client -cipher 'AES128-SHA' -connect google.com:443
```
###### Generate private key
```bash
# _ciph: des3, aes
( _ciph="des3" ; _fd="private.key" ; _len="2048" ; \
openssl genrsa -${_ciph} -out ${_fd} ${_len} )
```
###### Remove password from private key
```bash
( _fd="private.key" ; _fd_unp="private_unp.key" ; \
openssl rsa -in ${_fd} -out ${_fd_unp} )
```
###### Get public key from private key
```bash
( _fd="private.key" ; _fd_pub="public.key" ; \
openssl rsa -pubout -in ${_fd} -out ${_fd_pub} )
```
###### Generate private key + csr
```bash
( _fd="private.key" ; _fd_csr="request.csr" ; _len="2048" ; \
openssl req -out ${_fd_csr} -new -newkey rsa:${_len} -nodes -keyout ${_fd} )
```
###### Generate csr
```bash
( _fd="private.key" ; _fd_csr="request.csr" ; \
openssl req -out ${_fd_csr} -new -key ${_fd} )
```
###### Generate csr (metadata from exist certificate)
```bash
( _fd="private.key" ; _fd_csr="request.csr" ; _fd_crt="cert.crt" ; \
openssl x509 -x509toreq -in ${_fd_crt} -out ${_fd_csr} -signkey ${_fd} )
```
###### Generate csr with -config param
```bash
( _fd="private.key" ; _fd_csr="request.csr" ; \
openssl req -new -sha256 -key ${_fd} -out ${_fd_csr} \
-config < (
cat < < -EOF
[req]
default_bits = 2048
prompt = no
default_md = sha256
req_extensions = req_ext
distinguished_name = dn
[ dn ]
C=< two-letter ISO abbreviation for your country >
ST=< state or province where your organization is legally located >
L=< city where your organization is legally located >
O=< legal name of your organization >
OU=< section of the organization >
CN=< fully qualified domain name >
[ req_ext ]
subjectAltName = @alt_names
[ alt_names ]
DNS.1 = < fully qualified domain name >
DNS.2 = < next domain >
DNS.3 = < next domain >
EOF
))
```
2018-07-09 12:09:57 +02:00
###### Convert DER to PEM
```bash
( _fd_der="cert.crt" ; _fd_pem="cert.pem" ; \
openssl x509 -in ${_fd_der} -inform der -outform pem -out ${_fd_pem} )
```
###### Convert PEM to DER
```bash
( _fd_der="cert.crt" ; _fd_pem="cert.pem" ; \
openssl x509 -in ${_fd_pem} -outform der -out ${_fd_der} )
```
2018-07-09 11:43:21 +02:00
###### Checking whether the private key and the certificate match
```bash
(openssl rsa -noout -modulus -in private.key | openssl md5 ; openssl x509 -noout -modulus -in certificate.crt | openssl md5) | uniq
```
___
2018-07-10 23:15:51 +02:00
##### Tool: [gnutls-cli](https://gnutls.org/manual/html_node/gnutls_002dcli-Invocation.html)
###### Testing connection to remote host (with sni)
```bash
gnutls-cli -p 443 google.com
```
###### Testing connection to remote host (without sni)
```bash
gnutls-cli --disable-sni -p 443 google.com
```
___
2018-07-09 23:28:04 +02:00
##### Tool: [secure-delete](https://wiki.archlinux.org/index.php/Securely_wipe_disk)
###### Secure delete with shred
```bash
shred -vfuz -n 10 file
shred --verbose --random-source=/dev/urandom -n 1 /dev/sda
```
###### Secure delete with scrub
```bash
scrub -p dod /dev/sda
scrub -p dod -r file
```
###### Secure delete with badblocks
```bash
badblocks -s -w -t random -v /dev/sda
badblocks -c 10240 -s -w -t random -v /dev/sda
```
###### Secure delete with secure-delete
```bash
srm -vz /tmp/file
sfill -vz /local
sdmem -v
swapoff /dev/sda5 & & sswap -vz /dev/sda5
```
2018-07-11 14:36:34 +02:00
___
##### Tool: [dd](https://en.wikipedia.org/wiki/Dd_(Unix))
###### Show dd status every so often
```bash
dd < dd_params > status=progress
watch --interval 5 killall -USR1 dd
```
2018-07-02 20:01:06 +02:00
< a name = "http-https" > < b > HTTP/HTTPS< / b > < / a >
##### Tool: [curl](https://curl.haxx.se)
```bash
curl -Iks https://www.google.com
```
* `-I` - show response headers only
* `-k` - insecure connection when using ssl
* `-s` - silent mode (not display body)
```bash
curl -Iks --location -X GET -A "x-agent" https://www.google.com
```
* `--location` - follow redirects
* `-X` - set method
* `-A` - set user-agent
```bash
curl -Iks --location -X GET -A "x-agent" --proxy http://127.0.0.1:16379 https://www.google.com
```
* `--proxy [socks5://|http://]` - set proxy server
2018-07-12 11:49:57 +02:00
###### Check DNS and HTTP trace with headers for specific domains
```bash
### Set domains and external dns servers.
_domain_list=(google.com) ; _dns_list=("8.8.8.8" "1.1.1.1")
for _domain in "${_domain_list[@]}" ; do
printf '=%.0s' {1..48}
echo
printf "[\\e[1;32m+\\e[m] resolve: %s\\n" "$_domain"
for _dns in "${_dns_list[@]}" ; do
# Resolve domain.
host "${_domain}" "${_dns}"
echo
done
for _proto in http https ; do
printf "[\\e[1;32m+\\e[m] trace + headers: %s://%s\\n" "$_proto" "$_domain"
# Get trace and http headers.
curl -Iks -A "x-agent" --location "${_proto}://${_domain}"
echo
done
done
unset _domain_list _dns_list
```
2018-07-02 20:01:06 +02:00
___
##### Tool: [httpie](https://httpie.org/)
```bash
http -p Hh https://www.google.com
```
* `-p` - print request and response headers
* `H` - request headers
* `B` - request body
* `h` - response headers
* `b` - response body
```bash
http -p Hh --follow --max-redirects 5 --verify no https://www.google.com
```
* `-F, --follow` - follow redirects
* `--max-redirects N` - maximum for `--follow`
* `--verify no` - skip SSL verification
```bash
http -p Hh --follow --max-redirects 5 --verify no --proxy http:http://127.0.0.1:16379 https://www.google.com
```
* `--proxy [http:]` - set proxy server
< a name = "network" > < b > Network< / b > < / a >
2018-07-04 10:17:57 +02:00
##### Tool: [ssh](https://www.openssh.com/)
2018-07-02 20:01:06 +02:00
###### Compare a remote file with a local file
```bash
ssh user@host cat /path/to/remotefile | diff /path/to/localfile -
```
###### SSH connection through host in the middle
```bash
ssh -t reachable_host ssh unreachable_host
```
2018-07-03 09:26:35 +02:00
###### Run command over ssh on remote host
```bash
cat > cmd.txt << __EOF__
cat /etc/hosts
__EOF__
ssh host -l user $(< cmd.txt )
```
2018-07-09 11:43:21 +02:00
###### Get public key from private key
```bash
ssh-keygen -y -f ~/.ssh/id_rsa
```
2018-07-09 23:28:04 +02:00
###### Get all fingerprints
```bash
ssh-keygen -l -f .ssh/known_hosts
```
###### Ssh authentication with user password
```bash
ssh -o PreferredAuthentications=password -o PubkeyAuthentication=no user@remote_host
```
###### Ssh authentication with publickey
```bash
ssh -o PreferredAuthentications=publickey -o PubkeyAuthentication=yes -i id_rsa user@remote_host
```
2018-07-11 14:36:34 +02:00
###### Simple recording SSH session
```bash
function _ssh_sesslog() {
_sesdir="< path / to / session / logs > "
mkdir -p "${_sesdir}" & & \
ssh $@ 2>& 1 | tee -a "${_sesdir}/$(date +%Y%m%d).log"
}
# Alias:
alias ssh='_ssh_sesslog'
```
2018-07-12 11:49:57 +02:00
###### Using Keychain for SSH logins
```bash
### Delete all of ssh-agent's keys.
function _scl() {
/usr/bin/keychain --clear
}
### Add key to keychain.
function _scg() {
/usr/bin/keychain /path/to/private-key
source "$HOME/.keychain/$HOSTNAME-sh"
}
```
2018-07-02 20:01:06 +02:00
___
##### Tool: [linux-dev](https://www.tldp.org/LDP/abs/html/devref1.html)
###### Testing remote connection to port
```bash
2018-07-05 23:50:51 +02:00
timeout 1 bash -c "< /dev/< proto > /< host > /< port > " >/dev/null 2>& 1 ; echo $?
2018-07-02 20:01:06 +02:00
```
2018-07-05 23:50:51 +02:00
* `<proto` - set protocol (tcp/udp)
2018-07-02 20:01:06 +02:00
* `<host>` - set remote host
* `<port>` - set destination port
2018-07-05 23:50:51 +02:00
###### Read and write to TCP or UDP sockets with common bash tools
```bash
exec 5< >/dev/tcp/< host > /< port > ; cat < & 5 & cat >&5; exec 5>& -
```
2018-07-02 20:01:06 +02:00
___
##### Tool: [tcpdump](http://www.tcpdump.org/)
```bash
tcpdump -ne -i eth0 -Q in host 192.168.252.1 and port 443
```
* `-n` - don't convert addresses
* `-e` - print the link-level headers
* `-i [iface]` - set interface
* `-Q|-D [in|out|inout]` - choose send/receive direction (`-D` - for old tcpdump versions)
* `host [ip|hostname]` - set host, also `[host not]`
* `[and|or]` - set logic
* `port [1-65535]` - set port number, also `[port not]`
```bash
tcpdump -ne -i eth0 -Q in host 192.168.252.1 and port 443 -c 5 -w tcpdump.pcap
```
* `-c [num]` - capture only num number of packets
* `-w [filename]` - write packets to file, `-r [filename]` - reading from file
___
2018-07-11 09:57:32 +02:00
##### Tool: [tcpick](http://tcpick.sourceforge.net/)
###### Analyse packets in real-time
```bash
while true ; do tcpick -a -C -r dump.pcap ; sleep 2 ; clear ; done
```
___
2018-07-02 20:01:06 +02:00
##### Tool: [ngrep](http://ngrep.sourceforge.net/usage.html)
```bash
ngrep -d eth0 "www.google.com" port 443
```
* `-d [iface|any]` - set interface
* `[domain]` - set hostname
* `port [1-65535]` - set port number
```bash
ngrep -d eth0 "www.google.com" (host 10.240.20.2) and (port 443)
```
* `(host [ip|hostname])` - filter by ip or hostname
* `(port [1-65535])` - filter by port number
```bash
ngrep -d eth0 -qt -O ngrep.pcap "www.google.com" port 443
```
* `-q` - quiet mode (only payloads)
* `-t` - added timestamps
* `-O [filename]` - save output to file, `-I [filename]` - reading from file
```bash
ngrep -d eth0 -qt 'HTTP' 'tcp'
```
* `HTTP` - show http headers
* `tcp|udp` - set protocol
* `[src|dst] host [ip|hostname]` - set direction for specific node
2018-07-09 11:43:21 +02:00
```bash
ngrep -l -q -d eth0 -i "User-Agent: curl*"
```
* `-l` - stdout line buffered
* `-i` - case-insensitive search
2018-07-02 20:01:06 +02:00
___
##### Tool: [hping3](http://www.hping.org/)
```bash
hping3 -V -p 80 -s 5050 < scan_type > www.google.com
```
* `-V|--verbose` - verbose mode
* `-p|--destport` - set destination port
* `-s|--baseport` - set source port
* `<scan_type>` - set scan type
* `-F|--fin` - set FIN flag, port open if no reply
* `-S|--syn` - set SYN flag
* `-P|--push` - set PUSH flag
* `-A|--ack` - set ACK flag (use when ping is blocked, RST response back if the port is open)
* `-U|--urg` - set URG flag
* `-Y|--ymas` - set Y unused flag (0x80 - nullscan), port open if no reply
* `-M 0 -UPF` - set TCP sequence number and scan type (URG+PUSH+FIN), port open if no reply
```bash
hping3 -V -c 1 -1 -C 8 www.google.com
```
* `-c [num]` - packet count
* `-1` - set ICMP mode
* `-C|--icmptype [icmp-num]` - set icmp type (default icmp-echo = 8)
```bash
hping3 -V -c 1000000 -d 120 -S -w 64 -p 80 --flood --rand-source < remote_host >
```
* `--flood` - sent packets as fast as possible (don't show replies)
* `--rand-source` - random source address mode
* `-d --data` - data size
* `-w|--win` - winsize (default 64)
___
##### Tool: [netcat](http://netcat.sourceforge.net/)
```bash
nc -kl 5000
```
* `-l` - listen for an incoming connection
* `-k` - listening after client has disconnected
* `>filename.out` - save receive data to file (optional)
```bash
nc 192.168.0.1 5051 < filename.in
```
* `< filename.in` - send data to remote host
```bash
nc -vz 10.240.30.3 5000
```
* `-v` - verbose output
* `-z` - scan for listening daemons
```bash
nc -vzu 10.240.30.3 1-65535
```
* `-u` - scan only udp ports
###### Transfer data file (archive)
```bash
server> nc -l 5000 | tar xzvfp -
client> tar czvfp - /path/to/dir | nc 10.240.30.3 5000
```
###### Launch remote shell
```bash
server> nc -l 5000 -e /bin/bash
client> nc 10.240.30.3 5000
```
2018-07-03 10:13:28 +02:00
###### Simple file server
```bash
while true ; do nc -l 5000 | tar -xvf - ; done
```
2018-07-12 11:49:57 +02:00
###### Simple minimal HTTP Server
```bash
while true ; do nc -l -p 1500 -c 'echo -e "HTTP/1.1 200 OK\n\n $(date)"' ; done
```
2018-07-02 20:01:06 +02:00
###### Simple HTTP Server
> Restarts web server after each request - remove `while` condition for only single connection.
```bash
cat > index.html << __EOF__
<!doctype html>
< head >
< meta charset = "utf-8" >
< meta http-equiv = "X-UA-Compatible" content = "IE=edge,chrome=1" >
< title > < / title >
< meta name = "description" content = "" >
< meta name = "viewport" content = "width=device-width, initial-scale=1" >
< / head >
< body >
< p >
Hello! It's a site.
< / p >
< / body >
< / html >
__EOF__
```
```bash
server> while : ; do \
2018-07-12 21:15:08 +02:00
(echo -ne "HTTP/1.1 200 OK\r\nContent-Length: $(wc -c < index.html ) \r\n\r\n" ; cat index . html ;) | \
nc -l -p 5000 \
2018-07-02 20:01:06 +02:00
; done
```
* `-p` - port number
###### Simple HTTP Proxy (single connection)
```bash
#!/usr/bin/env bash
if [[ $# != 2 ]] ; then
printf "%s\\n" \
"usage: ./nc-proxy listen-port bk_host:bk_port"
fi
_listen_port="$1"
_bk_host=$(echo "$2" | cut -d ":" -f1)
_bk_port=$(echo "$2" | cut -d ":" -f2)
printf " lport: %s\\nbk_host: %s\\nbk_port: %s\\n\\n" \
"$_listen_port" "$_bk_host" "$_bk_port"
_tmp=$(mktemp -d)
_back="$_tmp/pipe.back"
_sent="$_tmp/pipe.sent"
_recv="$_tmp/pipe.recv"
trap 'rm -rf "$_tmp"' EXIT
mkfifo -m 0600 "$_back" "$_sent" "$_recv"
sed "s/^/=> /" < "$_sent" &
sed "s/^/< = /" < "$_recv" &
2018-07-12 21:15:08 +02:00
nc -l -p "$_listen_port" < "$_back" | \
tee "$_sent" | \
nc "$_bk_host" "$_bk_port" | \
tee "$_recv" >"$_back"
2018-07-02 20:01:06 +02:00
```
```bash
server> chmod +x nc-proxy & & ./nc-proxy 8080 192.168.252.10:8000
lport: 8080
bk_host: 192.168.252.10
bk_port: 8000
client> http -p h 10.240.30.3:8080
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=31536000
Content-Length: 2748
Content-Type: text/html; charset=utf-8
Date: Sun, 01 Jul 2018 20:12:08 GMT
Last-Modified: Sun, 01 Apr 2018 21:53:37 GMT
```
2018-07-03 10:13:28 +02:00
###### Create a single-use TCP or UDP proxy
```bash
### TCP -> TCP
nc -l -p 2000 -c "nc [ip|hostname] 3000"
### TCP -> UDP
nc -l -p 2000 -c "nc -u [ip|hostname] 3000"
### UDP -> UDP
nc -l -u -p 2000 -c "nc -u [ip|hostname] 3000"
### UDP -> TCP
nc -l -u -p 2000 -c "nc [ip|hostname] 3000"
```
2018-07-02 20:01:06 +02:00
___
##### Tool: [socat](http://www.dest-unreach.org/socat/doc/socat.html/)
###### Testing remote connection to port
```bash
socat - TCP4:10.240.30.3:22
```
* `-` - standard input (STDIO)
* `TCP4:<params>` - set tcp4 connection with specific params
* `[hostname|ip]` - set hostname/ip
* `[1-65535]` - set port number
###### Redirecting TCP-traffic to a UNIX domain socket under Linux
```bash
socat TCP-LISTEN:1234,bind=127.0.0.1,reuseaddr,fork,su=nobody,range=127.0.0.0/8 UNIX-CLIENT:/tmp/foo
```
* `TCP-LISTEN:<params>` - set tcp listen with specific params
* `[1-65535]` - set port number
* `bind=[hostname|ip]` - set bind hostname/ip
2018-07-02 22:59:05 +02:00
* `reuseaddr` - allows other sockets to bind to an address
* `fork` - keeps the parent process attempting to produce more connections
* `su=nobody` - set user
* `range=[ip-range]` - ip range
* `UNIX-CLIENT:<params>` - communicates with the specified peer socket
* `filename` - define socket
2018-07-02 20:01:06 +02:00
2018-07-03 09:26:35 +02:00
___
2018-07-04 10:17:57 +02:00
##### Tool: [lsof](https://en.wikipedia.org/wiki/Lsof)
2018-07-02 20:01:06 +02:00
###### Show process that use internet connection at the moment
```bash
lsof -P -i -n
```
2018-07-03 09:26:35 +02:00
###### Show process that use specific port number
```bash
lsof -i tcp:443
```
###### Lists all listening ports together with the PID of the associated process
```bash
lsof -Pan -i tcp -i udp
```
2018-07-03 21:09:12 +02:00
###### List all open ports and their owning executables
```bash
lsof -i -P | grep -i "listen"
```
2018-07-11 09:57:32 +02:00
###### Show all open ports
```bash
lsof -Pnl -i
```
###### Show open ports (LISTEN)
2018-07-03 21:09:12 +02:00
```bash
lsof -Pni4 | grep LISTEN | column -t
```
2018-07-03 10:13:28 +02:00
###### List all files opened by a particular command
```bash
lsof -c "process"
```
2018-07-03 22:04:09 +02:00
###### View user activity per directory
```bash
lsof -u username -a +D /etc
```
2018-07-11 14:36:34 +02:00
###### Show 10 Largest Open Files
```bash
2018-07-12 21:15:08 +02:00
lsof / | \
awk '{ if($7 > 1048576) print $7/1048576 "MB" " " $9 " " $1 }' | \
sort -n -u | tail | column -t
2018-07-11 14:36:34 +02:00
```
2018-07-03 21:09:12 +02:00
___
2018-07-09 15:10:56 +02:00
##### Tool: [netstat](https://en.wikipedia.org/wiki/Netstat)
2018-07-02 20:01:06 +02:00
###### Graph # of connections for each hosts
```bash
2018-07-12 21:15:08 +02:00
netstat -an | \
grep ESTABLISHED | \
awk '{print $5}' | \
awk -F: '{print $1}' | \
grep -v -e '^[[:space:]]*$' | \
sort | uniq -c | \
awk '{ printf("%s\t%s\t",$2,$1) ; for (i = 0; i < $1; i++) {printf("*")}; print "" }'
2018-07-02 20:01:06 +02:00
```
2018-07-03 21:09:12 +02:00
###### Monitor open connections for specific port including listen, count and sort it per IP
```bash
watch "netstat -plan | grep :443 | awk {'print \$5'} | cut -d: -f 1 | sort | uniq -c | sort -nk 1"
```
___
2018-07-09 15:10:56 +02:00
##### Tool: [rsync](https://en.wikipedia.org/wiki/Rsync)
2018-07-03 21:09:12 +02:00
###### Rsync remote data as root using sudo
```bash
rsync --rsync-path 'sudo rsync' username@hostname:/path/to/dir/ /local/
```
2018-07-11 09:57:32 +02:00
___
##### Tool: [host](https://en.wikipedia.org/wiki/Host_(Unix))
###### Resolves the domain name (using external dns server)
```bash
host google.com 9.9.9.9
```
###### Checks the domain administrator (SOA record)
```bash
host -t soa google.com 9.9.9.9
```
___
##### Tool: [dig](https://en.wikipedia.org/wiki/Dig_(command))
###### Resolves the domain name (short output)
```bash
dig google.com +short
```
###### Lookup NS record for specific domain
```bash
dig @9 .9.9.9 google.com NS
```
###### Query only answer section
```bash
dig google.com +nocomments +noquestion +noauthority +noadditional +nostats
```
###### Query ALL DNS Records
```bash
dig google.com ANY +noall +answer
```
###### DNS Reverse Look-up
```bash
dig -x 172.217.16.14 +short
```
2018-07-12 11:49:57 +02:00
___
##### Tool: [network-other](https://github.com/trimstray/awesome-ninja-admins#tool-network-other)
###### Get all subnets for specific AS (Autonomous system)
```bash
AS="AS32934"
2018-07-12 21:15:08 +02:00
whois -h whois.radb.net -- "-i origin ${AS}" | \
grep "^route:" | \
cut -d ":" -f2 | \
sed -e 's/^[ \t]//' | \
sort -n -t . -k 1,1 -k 2,2 -k 3,3 -k 4,4 | \
cut -d ":" -f2 | \
sed -e 's/^[ \t]/allow /' | \
sed 's/$/;/' | \
sed 's/allow */subnet -> /g'
2018-07-12 11:49:57 +02:00
```
2018-07-11 09:57:32 +02:00
###### Resolves domain name from dns.google.com with curl and jq
```bash
2018-07-11 21:05:51 +02:00
_dname="google.com" ; curl -s "https://dns.google.com/resolve?name=${_dname}& type=A" | jq .
2018-07-11 09:57:32 +02:00
```
2018-07-02 20:01:06 +02:00
< a name = "programming" > < b > Programming< / b > < / a >
2018-07-04 10:17:57 +02:00
##### Tool: [awk](http://www.grymoire.com/Unix/Awk.html)
2018-07-02 20:01:06 +02:00
###### Remove duplicate entries in a file without sorting
```bash
awk '!x[$0]++' filename
```
2018-07-03 09:26:35 +02:00
###### Exclude multiple columns using AWK
```bash
awk '{$1=$3=""}1' filename
```
___
2018-07-04 10:17:57 +02:00
##### Tool: [sed](http://www.grymoire.com/Unix/Sed.html)
2018-07-03 09:26:35 +02:00
###### To print a specific line from a file
```bash
sed -n 10p /path/to/file
```
###### Remove a specific line from a file
```bash
sed -i 10d /path/to/file
2018-07-11 14:36:34 +02:00
# alternative (BSD): sed -i'' 10d /path/to/file
2018-07-03 09:26:35 +02:00
```
2018-07-03 21:09:12 +02:00
###### Remove a range of lines from a file
```bash
sed -i < file > -re '< start > ,< end > d'
```
2018-07-03 09:26:35 +02:00
___
2018-07-04 10:17:57 +02:00
##### Tool: [grep](http://www.grymoire.com/Unix/Grep.html)
2018-07-03 09:26:35 +02:00
###### Search for a "pattern" inside all files in the current directory
```bash
2018-07-11 14:36:34 +02:00
grep -rn "pattern"
2018-07-03 09:26:35 +02:00
grep -RnisI "pattern" *
fgrep "pattern" * -R
```
###### Remove blank lines from a file and save output to new file
```bash
grep . filename > newfilename
```
2018-07-05 23:50:51 +02:00
###### Except multiple patterns
```bash
grep -vE '(error|critical|warning)' filename
```
2018-07-09 12:09:57 +02:00
###### Show data from file without comments
```bash
grep -v ^[[:space:]]*# filename
```
###### Show data from file without comments and new lines
```bash
egrep -v '#|^$' filename
```