Curl: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
(Die Seite wurde neu angelegt: „*https://www.ostechnix.com/a-list-of-useful-console-services-for-linux-users/?fbclid=IwAR3m94pZ5MAApsozvsYRP8utXROhb0tdFpLWqJuzLjdlUO8XlWxqAHOYkCQ“) |
|||
Zeile 1: | Zeile 1: | ||
+ | = Installation = | ||
+ | |||
+ | * Denian-basierte Systeme | ||
+ | * '''apt install curl''' | ||
+ | * Arch-basierte Systeme | ||
+ | * '''pacman -S curl''' | ||
+ | |||
+ | = nützliche Webseiten = | ||
+ | |||
+ | == öffentliche IP-Adresse herausfinden == | ||
+ | * '''curl -6 ifconfig.co''' | ||
+ | |||
+ | ''xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx'' | ||
+ | |||
+ | * '''curl -4 ipinfo.io''' | ||
+ | |||
+ | { | ||
+ | "ip": "''xxx.xxx.xxx.xxx.xxx''", | ||
+ | "city": "Frankfurt am Main", | ||
+ | "region": "Hesse", | ||
+ | "country": "DE", | ||
+ | "loc": "''Breitengrad, Längengrad''", | ||
+ | "org": "''Organisation''", | ||
+ | "postal": "60306", | ||
+ | "timezone": "Europe/Berlin", | ||
+ | "readme": "https://ipinfo.io/missingauth" | ||
+ | } | ||
+ | |||
+ | == Cheat Sheet für Kommandozeilenbefehle == | ||
+ | |||
+ | * '''curl cheat.sh/find''' | ||
+ | |||
+ | find . -iname '*.jpg' | ||
+ | |||
+ | # Find directories. | ||
+ | find . -type d | ||
+ | |||
+ | # Find files. Specifically files; not directories, links, FIFOs, etc. | ||
+ | find . -type f | ||
+ | |||
+ | # Find files set to the provided octal mode (permissions). | ||
+ | find . -type f -perm 777 | ||
+ | ... | ||
+ | |||
+ | * '''curl cheat.sh/nmap''' | ||
+ | |||
+ | # Single target scan: | ||
+ | nmap [target] | ||
+ | |||
+ | # Scan from a list of targets: | ||
+ | nmap -iL [list.txt] | ||
+ | |||
+ | # Scan port for all available A records | ||
+ | # (useful when multiple A records are returned by the DNS server) | ||
+ | nmap --script resolveall --script-args newtargets,resolveall.hosts=[target] -p [port] | ||
+ | |||
+ | # iPv6: | ||
+ | nmap -6 [target] | ||
+ | |||
+ | # OS detection: | ||
+ | nmap -O --osscan_guess [target] | ||
+ | |||
+ | # Save output to text file: | ||
+ | nmap -oN [output.txt] [target] | ||
+ | ... | ||
+ | |||
+ | * '''curl cheat.sh/tcpdump''' | ||
+ | |||
+ | # Intercepts all packets on eth0 | ||
+ | tcpdump -i eth0 | ||
+ | |||
+ | # Intercepts all packets from/to 173.194.40.120 | ||
+ | tcpdump host 173.194.40.120 | ||
+ | |||
+ | # Intercepts all packets on all interfaces from / to 173.194.40.120 port 80 | ||
+ | # -nn => Disables name resolution for IP addresses and port numbers. | ||
+ | tcpdump -nn -i any host 173.194.40.120 and port 80 | ||
+ | |||
+ | = Links = | ||
+ | |||
*https://www.ostechnix.com/a-list-of-useful-console-services-for-linux-users/?fbclid=IwAR3m94pZ5MAApsozvsYRP8utXROhb0tdFpLWqJuzLjdlUO8XlWxqAHOYkCQ | *https://www.ostechnix.com/a-list-of-useful-console-services-for-linux-users/?fbclid=IwAR3m94pZ5MAApsozvsYRP8utXROhb0tdFpLWqJuzLjdlUO8XlWxqAHOYkCQ |
Version vom 3. März 2023, 09:49 Uhr
Installation
- Denian-basierte Systeme
- apt install curl
- Arch-basierte Systeme
- pacman -S curl
nützliche Webseiten
öffentliche IP-Adresse herausfinden
- curl -6 ifconfig.co
xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx
- curl -4 ipinfo.io
{ "ip": "xxx.xxx.xxx.xxx.xxx", "city": "Frankfurt am Main", "region": "Hesse", "country": "DE", "loc": "Breitengrad, Längengrad", "org": "Organisation", "postal": "60306", "timezone": "Europe/Berlin", "readme": "https://ipinfo.io/missingauth" }
Cheat Sheet für Kommandozeilenbefehle
- curl cheat.sh/find
find . -iname '*.jpg' # Find directories. find . -type d # Find files. Specifically files; not directories, links, FIFOs, etc. find . -type f # Find files set to the provided octal mode (permissions). find . -type f -perm 777 ...
- curl cheat.sh/nmap
# Single target scan: nmap [target] # Scan from a list of targets: nmap -iL [list.txt] # Scan port for all available A records # (useful when multiple A records are returned by the DNS server) nmap --script resolveall --script-args newtargets,resolveall.hosts=[target] -p [port] # iPv6: nmap -6 [target] # OS detection: nmap -O --osscan_guess [target] # Save output to text file: nmap -oN [output.txt] [target] ...
- curl cheat.sh/tcpdump
# Intercepts all packets on eth0 tcpdump -i eth0 # Intercepts all packets from/to 173.194.40.120 tcpdump host 173.194.40.120 # Intercepts all packets on all interfaces from / to 173.194.40.120 port 80 # -nn => Disables name resolution for IP addresses and port numbers. tcpdump -nn -i any host 173.194.40.120 and port 80