mirror of
https://github.com/mayfrost/guides.git
synced 2024-10-31 23:16:06 +00:00
Update NETWORKING.md
This commit is contained in:
parent
ca114d24f9
commit
271ef4ee2a
@ -30,3 +30,90 @@ dhclient <DEVICE_NAME>
|
|||||||
You can save either example in a script to activate the Wi-Fi whenever you want.
|
You can save either example in a script to activate the Wi-Fi whenever you want.
|
||||||
|
|
||||||
* Note: As an educational tip, the name of a network is also called "_SSID_" in other places.
|
* Note: As an educational tip, the name of a network is also called "_SSID_" in other places.
|
||||||
|
|
||||||
|
## Next
|
||||||
|
|
||||||
|
### using ufw
|
||||||
|
sudo ufw status
|
||||||
|
sudo ufw enable
|
||||||
|
sudo ufw disable
|
||||||
|
sudo ufw default deny
|
||||||
|
sudo ufw default allow
|
||||||
|
sudo ufw allow PORT_NUMBER
|
||||||
|
* delete a rule
|
||||||
|
sudo ufw delete allow PORT_NUMBER
|
||||||
|
* allow everything for a specific address
|
||||||
|
sudo ufw allow from IP_ADDRESS
|
||||||
|
* allow a specific port for a specific address
|
||||||
|
sudo ufw allow from IP_ADDRESS to any port PORT_NUMBER
|
||||||
|
|
||||||
|
### tcpdump
|
||||||
|
* dump all
|
||||||
|
sudo tcpdump
|
||||||
|
* dump 5 packets
|
||||||
|
sudo tcpdump -c 5
|
||||||
|
* dump in ASCii format
|
||||||
|
sudo tcpdump -A
|
||||||
|
* dump in hexadecimal format
|
||||||
|
sudo tcpdump -xx
|
||||||
|
* dump from an specific interface
|
||||||
|
sudo tcpdump -i INTERFACE_NAME
|
||||||
|
* dump from a specific port
|
||||||
|
sudo tcpdump port PORT_NUMBER
|
||||||
|
* dump 5 packets in hexadecimal from an specific interface and a specific port
|
||||||
|
sudo tcpdump -c 5 -xx -i INTERFACE port PORT_NUMBER
|
||||||
|
|
||||||
|
### netstat
|
||||||
|
* show routing table, including gateway
|
||||||
|
netstat -nr
|
||||||
|
* show all ports
|
||||||
|
netstat -tulpn
|
||||||
|
* show network usage of devices
|
||||||
|
netstat -i
|
||||||
|
* show active connections
|
||||||
|
netstat -ta
|
||||||
|
* show active connections, but show ip addresses instead
|
||||||
|
netstat -tan
|
||||||
|
|
||||||
|
### traceroute
|
||||||
|
* show which route your connection takes between your computer to the destination
|
||||||
|
traceroute WEBNAME_OR_IP
|
||||||
|
|
||||||
|
### nmap
|
||||||
|
* scan a specific ip address (including devices)
|
||||||
|
nmap IP_NUMBER
|
||||||
|
* scan a specific website
|
||||||
|
nmap WEBSITE_NAME
|
||||||
|
* scan a specific ip address (including devices) with more information
|
||||||
|
nmap -v IP_NUMBER
|
||||||
|
* scan two ip address (including devices), 192.168.0.1 and 192.168.0.54
|
||||||
|
nmap 192.168.0.1,54
|
||||||
|
* scan a range of ip address (including devices), from 192.168.0.1 to 192.168.0.100
|
||||||
|
nmap 192.168.0.1-100
|
||||||
|
* scan all ip address (including devices) from network 192.168.0.0
|
||||||
|
nmap 192.168.0.*
|
||||||
|
* scan address from a file
|
||||||
|
nmap -il FILE
|
||||||
|
* scan address and identify OS and running services
|
||||||
|
nmap -A IP_NUMBER
|
||||||
|
* check if target is up
|
||||||
|
nmap -sP IP_NUMBER
|
||||||
|
* check reason for services states
|
||||||
|
nmap --reason IP_NUMBER
|
||||||
|
* show host interfaces
|
||||||
|
nmap --iflist IP_NUMBER
|
||||||
|
|
||||||
|
### SSH
|
||||||
|
* login to remote host
|
||||||
|
ssh ADDRESS
|
||||||
|
* login to remote host as user USER
|
||||||
|
ssh USER@ADDRESS
|
||||||
|
* set ssh server configuration in /etc/ssh/sshd_config
|
||||||
|
Port 22 # default port
|
||||||
|
PermitRootLogin without-password # change "without-password" to "no"
|
||||||
|
AllowUsers USER_NAME # by allowing a specific user it restricts the others
|
||||||
|
* restart "ssh" service to activate changes
|
||||||
|
|
||||||
|
|
||||||
|
# use last 8 octets for hosts
|
||||||
|
255.255.255.0
|
||||||
|
Loading…
Reference in New Issue
Block a user