Curl: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
(Die Seite wurde neu angelegt: „*https://www.ostechnix.com/a-list-of-useful-console-services-for-linux-users/?fbclid=IwAR3m94pZ5MAApsozvsYRP8utXROhb0tdFpLWqJuzLjdlUO8XlWxqAHOYkCQ“) |
|||
| Zeile 1: | Zeile 1: | ||
| + | = Installation = | ||
| + | |||
| + | * Denian-basierte Systeme | ||
| + | * '''apt install curl''' | ||
| + | * Arch-basierte Systeme | ||
| + | * '''pacman -S curl''' | ||
| + | |||
| + | = nützliche Webseiten = | ||
| + | |||
| + | == öffentliche IP-Adresse herausfinden == | ||
| + | * '''curl -6 ifconfig.co''' | ||
| + | |||
| + | ''xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx'' | ||
| + | |||
| + | * '''curl -4 ipinfo.io''' | ||
| + | |||
| + | { | ||
| + | "ip": "''xxx.xxx.xxx.xxx.xxx''", | ||
| + | "city": "Frankfurt am Main", | ||
| + | "region": "Hesse", | ||
| + | "country": "DE", | ||
| + | "loc": "''Breitengrad, Längengrad''", | ||
| + | "org": "''Organisation''", | ||
| + | "postal": "60306", | ||
| + | "timezone": "Europe/Berlin", | ||
| + | "readme": "https://ipinfo.io/missingauth" | ||
| + | } | ||
| + | |||
| + | == Cheat Sheet für Kommandozeilenbefehle == | ||
| + | |||
| + | * '''curl cheat.sh/find''' | ||
| + | |||
| + | find . -iname '*.jpg' | ||
| + | |||
| + | # Find directories. | ||
| + | find . -type d | ||
| + | |||
| + | # Find files. Specifically files; not directories, links, FIFOs, etc. | ||
| + | find . -type f | ||
| + | |||
| + | # Find files set to the provided octal mode (permissions). | ||
| + | find . -type f -perm 777 | ||
| + | ... | ||
| + | |||
| + | * '''curl cheat.sh/nmap''' | ||
| + | |||
| + | # Single target scan: | ||
| + | nmap [target] | ||
| + | |||
| + | # Scan from a list of targets: | ||
| + | nmap -iL [list.txt] | ||
| + | |||
| + | # Scan port for all available A records | ||
| + | # (useful when multiple A records are returned by the DNS server) | ||
| + | nmap --script resolveall --script-args newtargets,resolveall.hosts=[target] -p [port] | ||
| + | |||
| + | # iPv6: | ||
| + | nmap -6 [target] | ||
| + | |||
| + | # OS detection: | ||
| + | nmap -O --osscan_guess [target] | ||
| + | |||
| + | # Save output to text file: | ||
| + | nmap -oN [output.txt] [target] | ||
| + | ... | ||
| + | |||
| + | * '''curl cheat.sh/tcpdump''' | ||
| + | |||
| + | # Intercepts all packets on eth0 | ||
| + | tcpdump -i eth0 | ||
| + | |||
| + | # Intercepts all packets from/to 173.194.40.120 | ||
| + | tcpdump host 173.194.40.120 | ||
| + | |||
| + | # Intercepts all packets on all interfaces from / to 173.194.40.120 port 80 | ||
| + | # -nn => Disables name resolution for IP addresses and port numbers. | ||
| + | tcpdump -nn -i any host 173.194.40.120 and port 80 | ||
| + | |||
| + | = Links = | ||
| + | |||
*https://www.ostechnix.com/a-list-of-useful-console-services-for-linux-users/?fbclid=IwAR3m94pZ5MAApsozvsYRP8utXROhb0tdFpLWqJuzLjdlUO8XlWxqAHOYkCQ | *https://www.ostechnix.com/a-list-of-useful-console-services-for-linux-users/?fbclid=IwAR3m94pZ5MAApsozvsYRP8utXROhb0tdFpLWqJuzLjdlUO8XlWxqAHOYkCQ | ||
Version vom 3. März 2023, 09:49 Uhr
Installation
- Denian-basierte Systeme
- apt install curl
- Arch-basierte Systeme
- pacman -S curl
nützliche Webseiten
öffentliche IP-Adresse herausfinden
- curl -6 ifconfig.co
xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx
- curl -4 ipinfo.io
{
"ip": "xxx.xxx.xxx.xxx.xxx",
"city": "Frankfurt am Main",
"region": "Hesse",
"country": "DE",
"loc": "Breitengrad, Längengrad",
"org": "Organisation",
"postal": "60306",
"timezone": "Europe/Berlin",
"readme": "https://ipinfo.io/missingauth"
}
Cheat Sheet für Kommandozeilenbefehle
- curl cheat.sh/find
find . -iname '*.jpg' # Find directories. find . -type d # Find files. Specifically files; not directories, links, FIFOs, etc. find . -type f # Find files set to the provided octal mode (permissions). find . -type f -perm 777 ...
- curl cheat.sh/nmap
# Single target scan: nmap [target] # Scan from a list of targets: nmap -iL [list.txt] # Scan port for all available A records # (useful when multiple A records are returned by the DNS server) nmap --script resolveall --script-args newtargets,resolveall.hosts=[target] -p [port] # iPv6: nmap -6 [target] # OS detection: nmap -O --osscan_guess [target] # Save output to text file: nmap -oN [output.txt] [target] ...
- curl cheat.sh/tcpdump
# Intercepts all packets on eth0 tcpdump -i eth0 # Intercepts all packets from/to 173.194.40.120 tcpdump host 173.194.40.120 # Intercepts all packets on all interfaces from / to 173.194.40.120 port 80 # -nn => Disables name resolution for IP addresses and port numbers. tcpdump -nn -i any host 173.194.40.120 and port 80