mirror of
https://github.com/mayfrost/guides.git
synced 2024-11-28 02:11:46 +00:00
4.2 KiB
4.2 KiB
NETWORKING
SETUP
/etc/network/interfaces
# use last 8 octets for hosts
255.255.255.0
WiFi
Use WiFi without a separate network manager with this simple guide. Needs "dhcpcd" or "dhcpclient", "net-tools" or "iproute2", "wpa_supplicant", and the WiFi drivers for your wireless card (like "iwlwifi" and its "ucode"), which in part can be installed from a package usually named "linux-firmware", but they may not be complete (this provides "ucode" but not "iwlwifi").
NOTE: The "<DEVICE_NAME>" can be either "wlp3s0" or "wlan0". Change accordingly the following commands to suit your needs.
- Create the configuration file (as "root", not "sudo"):
wpa_passphrase <NETWORK_NAME> <PASSWORD> > /etc/wpa_supplicant.conf
- Delete non hashed password from "/etc/wpa_supplicant.conf", but not the hashed one.
Each time you need to connect type the following command (as "root" or with "sudo"):
- EXAMPLE 1: With "net-tools" and "dhcpcd":
ifconfig <DEVICE_NAME> down
ifconfig <DEVICE_NAME> up
wpa_supplicant -B -i<DEVICE_NAME> -c /etc/wpa_supplicant.conf -Dwext
dhcpcd <DEVICE_NAME>
- EXAMPLE 2: With "iproute2" and "dhclient":
ip link set <DEVICE_NAME> down
ip link set <DEVICE_NAME> up
wpa_supplicant -B -i<DEVICE_NAME> -c /etc/wpa_supplicant.conf -Dwext
dhclient <DEVICE_NAME>
You can save either example in a script to activate the Wi-Fi whenever you want.
- Note: As an educational tip, the name of a network is also called "SSID" in other places.
TROUBLESHOOTING
ufw
- Show status
sudo ufw status
- Enable firewall
sudo ufw enable
- Disable firewall
sudo ufw disable
- Deny all by default
sudo ufw default deny
- Allow all by default
sudo ufw default allow
- Allow everything for specific port by default
sudo ufw allow PORT_NUMBER
- Delete a rule
sudo ufw delete allow PORT_NUMBER
- Allow everything for a specific address
sudo ufw allow from IP_ADDRESS
- Allow a specific port for a specific address
sudo ufw allow from IP_ADDRESS to any port PORT_NUMBER
tcpdump
- dump all
sudo tcpdump
- dump 5 packets
sudo tcpdump -c 5
- dump in ASCii format
sudo tcpdump -A
- dump in hexadecimal format
sudo tcpdump -xx
- dump from an specific interface
sudo tcpdump -i INTERFACE_NAME
- dump from a specific port
sudo tcpdump port PORT_NUMBER
- dump 5 packets in hexadecimal from an specific interface and a specific port
sudo tcpdump -c 5 -xx -i INTERFACE port PORT_NUMBER
netstat
- show routing table, including gateway
netstat -nr
- show all ports
netstat -tulpn
- show network usage of devices
netstat -i
- show active connections
netstat -ta
- show active connections, but show ip addresses instead
netstat -tan
traceroute
- show which route your connection takes between your computer to the destination
traceroute WEBNAME_OR_IP
nmap
- scan a specific ip address (including devices)
nmap IP_NUMBER
- scan a specific website
nmap WEBSITE_NAME
- scan a specific ip address (including devices) with more information
nmap -v IP_NUMBER
- scan two ip address (including devices), 192.168.0.1 and 192.168.0.54
nmap 192.168.0.1,54
- scan a range of ip address (including devices), from 192.168.0.1 to 192.168.0.100
nmap 192.168.0.1-100
- scan all ip address (including devices) from network 192.168.0.0
nmap 192.168.0.*
- scan address from a file
nmap -il <FILE>
- scan address and identify OS and running services
nmap -A IP_NUMBER
- check if target is up
nmap -sP IP_NUMBER
- check reason for services states
nmap --reason IP_NUMBER
- show host interfaces
nmap --iflist IP_NUMBER
SSH
CLIENT
- login to remote host
ssh ADDRESS
- login to remote host as user USER
ssh USER@ADDRESS
SERVER
- set ssh server configuration in /etc/ssh/sshd_config
Port 22 # default port is 22, can be changed
PermitRootLogin without-password # change "without-password" to "no" to forbid root login
AllowUsers USER_NAME # by allowing a specific user it restricts the others
- restart "ssh" service to activate changes