Mount point for external file systems (on some distros). Standard mount point for external file systems. Library files, includes files for all kinds of programs needed by the system and the users.įiles that were saved during failures are here. The Python trick: python - c 'import pty pty.spawn("/bin/bash")' echo os.system ( '/bin/bash' ) /bin/sh -i Misc CommandsĬommon programs, shared by the system, the system administrator and the users.īoot files, boot loader (grub), kernels, vmlinuzĬontains references to system devices, files with special properties. $ mount -t cifs -o username =user,password =password //x.x.x.x/share /mnt/share Breaking Out of Limited ShellsĬredit to G0tmi1k for these (or wherever he stole them from!). $ smbmount //server/share /mnt/win -o user =username,password =password1 Remove files and directories without prompting for confirmation.Ĭonnect to a Samba share from Linux. md5 are in the same dir.įind out the type of file on Linux, also displays if file is 32 or 64 bit.Ĭonvert Windows line endings to Unix / Linux.īase64 encodes input file and outputs a Base64 encoded file called output-file.īase64 decodes input file and outputs a Base64 decoded file called output-file.Ĭreates a new file using the timestamp data from the reference file, drop the -r to simply create a file. Reverse lookup on an IP address, in case dig is not installed.Īdds a hidden IP address to Linux, does not show up when performing an ifconfig.īlocks access to from the host machine.Įnables IP forwarding, turns Linux box into a router - handy for routing traffic through a box.Ĭompare / Show differences between two files on Linux.Ĭheck file against MD5SUM on Linux, assuming both file and. Watch TCP, UDP open ports in real time with socket summary.Īdd IP address to existing network interface in Linux.Ĭhange MAC address in Linux using ifconfig.Ĭhange MTU size Linux using ifconfig, change 1500 to your desired MTU. Show Linux network ports with process ID's (PIDs) See our pen test cheat sheet for an in depth list of pen testing tool commands and example usage. The commands listed below are designed for local enumeration, typical commands a penetration tester would use during post exploitation or when performing command injection etc. A collection of hopefully useful Linux Commands for pen testers, this is not a complete list but a collection of commonly used commands + syntax as a sort of “cheatsheet”, this content will be constantly updated as I discover new awesomeness.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |