Curl: Unterschied zwischen den Versionen

Aus xinux.net
Zur Navigation springen Zur Suche springen
(Die Seite wurde neu angelegt: „*https://www.ostechnix.com/a-list-of-useful-console-services-for-linux-users/?fbclid=IwAR3m94pZ5MAApsozvsYRP8utXROhb0tdFpLWqJuzLjdlUO8XlWxqAHOYkCQ“)
 
Zeile 1: Zeile 1:
 +
= Installation =
 +
 +
* Denian-basierte Systeme
 +
* '''apt install curl'''
 +
* Arch-basierte Systeme
 +
* '''pacman -S curl'''
 +
 +
= nützliche Webseiten =
 +
 +
== öffentliche IP-Adresse herausfinden ==
 +
* '''curl -6 ifconfig.co'''
 +
 +
''xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx''
 +
 +
* '''curl -4 ipinfo.io'''
 +
 +
{
 +
  "ip": "''xxx.xxx.xxx.xxx.xxx''",
 +
  "city": "Frankfurt am Main",
 +
  "region": "Hesse",
 +
  "country": "DE",
 +
  "loc": "''Breitengrad, Längengrad''",
 +
  "org": "''Organisation''",
 +
  "postal": "60306",
 +
  "timezone": "Europe/Berlin",
 +
  "readme": "https://ipinfo.io/missingauth"
 +
}
 +
 +
== Cheat Sheet für Kommandozeilenbefehle ==
 +
 +
* '''curl cheat.sh/find'''
 +
 +
find . -iname '*.jpg'
 +
 +
# Find directories.
 +
find . -type d
 +
 +
# Find files. Specifically files; not directories, links, FIFOs, etc.
 +
find . -type f
 +
 +
# Find files set to the provided octal mode (permissions).
 +
find . -type f -perm 777
 +
...
 +
 +
* '''curl cheat.sh/nmap'''
 +
 +
# Single target scan:
 +
nmap [target]
 +
 +
# Scan from a list of targets:
 +
nmap -iL [list.txt]
 +
 +
# Scan port for all available A records
 +
# (useful when multiple A records are returned by the DNS server)
 +
nmap --script resolveall --script-args newtargets,resolveall.hosts=[target] -p [port]
 +
 +
# iPv6:
 +
nmap -6 [target]
 +
 +
# OS detection:
 +
nmap -O --osscan_guess [target]
 +
 +
# Save output to text file:
 +
nmap -oN [output.txt] [target]
 +
...
 +
 +
* '''curl cheat.sh/tcpdump'''
 +
 +
# Intercepts all packets on eth0
 +
tcpdump -i eth0
 +
 +
# Intercepts all packets from/to 173.194.40.120
 +
tcpdump host 173.194.40.120
 +
 +
# Intercepts all packets on all interfaces from / to 173.194.40.120 port 80
 +
# -nn => Disables name resolution for IP addresses and port numbers.
 +
tcpdump -nn -i any host 173.194.40.120 and port 80
 +
 +
= Links =
 +
 
*https://www.ostechnix.com/a-list-of-useful-console-services-for-linux-users/?fbclid=IwAR3m94pZ5MAApsozvsYRP8utXROhb0tdFpLWqJuzLjdlUO8XlWxqAHOYkCQ
 
*https://www.ostechnix.com/a-list-of-useful-console-services-for-linux-users/?fbclid=IwAR3m94pZ5MAApsozvsYRP8utXROhb0tdFpLWqJuzLjdlUO8XlWxqAHOYkCQ

Version vom 3. März 2023, 09:49 Uhr

Installation

  • Denian-basierte Systeme
  • apt install curl
  • Arch-basierte Systeme
  • pacman -S curl

nützliche Webseiten

öffentliche IP-Adresse herausfinden

  • curl -6 ifconfig.co
xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx
  • curl -4 ipinfo.io
{
  "ip": "xxx.xxx.xxx.xxx.xxx",
  "city": "Frankfurt am Main",
  "region": "Hesse",
  "country": "DE",
  "loc": "Breitengrad, Längengrad",
  "org": "Organisation",
  "postal": "60306",
  "timezone": "Europe/Berlin",
  "readme": "https://ipinfo.io/missingauth"
}

Cheat Sheet für Kommandozeilenbefehle

  • curl cheat.sh/find
find . -iname '*.jpg'

# Find directories.
find . -type d

# Find files. Specifically files; not directories, links, FIFOs, etc.
find . -type f

# Find files set to the provided octal mode (permissions).
find . -type f -perm 777
...
  • curl cheat.sh/nmap
# Single target scan:
nmap [target]

# Scan from a list of targets:
nmap -iL [list.txt]

# Scan port for all available A records
# (useful when multiple A records are returned by the DNS server)
nmap --script resolveall --script-args newtargets,resolveall.hosts=[target] -p [port]

# iPv6:
nmap -6 [target]

# OS detection:
nmap -O --osscan_guess [target]

# Save output to text file:
nmap -oN [output.txt] [target]
...
  • curl cheat.sh/tcpdump
# Intercepts all packets on eth0
tcpdump -i eth0

# Intercepts all packets from/to 173.194.40.120
tcpdump host 173.194.40.120

# Intercepts all packets on all interfaces from / to 173.194.40.120 port 80
# -nn => Disables name resolution for IP addresses and port numbers.
tcpdump -nn -i any host 173.194.40.120 and port 80

Links