commit fec810fdfd40ac8323ac87031bad59654f181659
parent 082070711748846628114a827ee039ce9323a9cb
Author: mayfrost <mayfrost@cock.li>
Date: Sun, 14 Oct 2018 00:34:29 +0000
Update NETWORKING.md
Diffstat:
| M | NETWORKING.md | | | 84 | +++++++++++++++++++++++++++++++++++++++++-------------------------------------- |
1 file changed, 44 insertions(+), 40 deletions(-)
diff --git a/NETWORKING.md b/NETWORKING.md
@@ -34,86 +34,90 @@ You can save either example in a script to activate the Wi-Fi whenever you want.
## Next
### ufw
-sudo ufw status
-sudo ufw enable
-sudo ufw disable
-sudo ufw default deny
-sudo ufw default allow
-sudo ufw allow PORT_NUMBER
+`sudo ufw status`
+`sudo ufw enable`
+`sudo ufw disable`
+`sudo ufw default deny`
+`sudo ufw default allow`
+`sudo ufw allow PORT_NUMBER`
* delete a rule
-sudo ufw delete allow PORT_NUMBER
+`sudo ufw delete allow PORT_NUMBER`
* allow everything for a specific address
-sudo ufw allow from IP_ADDRESS
+`sudo ufw allow from IP_ADDRESS`
* allow a specific port for a specific address
-sudo ufw allow from IP_ADDRESS to any port PORT_NUMBER
+`sudo ufw allow from IP_ADDRESS to any port PORT_NUMBER`
### tcpdump
* dump all
-sudo tcpdump
+`sudo tcpdump`
* dump 5 packets
-sudo tcpdump -c 5
+`sudo tcpdump -c 5`
* dump in ASCii format
-sudo tcpdump -A
+`sudo tcpdump -A`
* dump in hexadecimal format
-sudo tcpdump -xx
+`sudo tcpdump -xx`
* dump from an specific interface
-sudo tcpdump -i INTERFACE_NAME
+`sudo tcpdump -i INTERFACE_NAME`
* dump from a specific port
-sudo tcpdump port PORT_NUMBER
+`sudo tcpdump port PORT_NUMBER`
* dump 5 packets in hexadecimal from an specific interface and a specific port
-sudo tcpdump -c 5 -xx -i INTERFACE port PORT_NUMBER
+`sudo tcpdump -c 5 -xx -i INTERFACE port PORT_NUMBER`
### netstat
* show routing table, including gateway
-netstat -nr
+`netstat -nr`
* show all ports
-netstat -tulpn
+`netstat -tulpn`
* show network usage of devices
-netstat -i
+`netstat -i`
* show active connections
-netstat -ta
+`netstat -ta`
* show active connections, but show ip addresses instead
-netstat -tan
+`netstat -tan`
### traceroute
* show which route your connection takes between your computer to the destination
-traceroute WEBNAME_OR_IP
+`traceroute WEBNAME_OR_IP`
### nmap
* scan a specific ip address (including devices)
-nmap IP_NUMBER
+`nmap IP_NUMBER`
* scan a specific website
-nmap WEBSITE_NAME
+`nmap WEBSITE_NAME`
* scan a specific ip address (including devices) with more information
-nmap -v IP_NUMBER
+`nmap -v IP_NUMBER`
* scan two ip address (including devices), 192.168.0.1 and 192.168.0.54
-nmap 192.168.0.1,54
+`nmap 192.168.0.1,54`
* scan a range of ip address (including devices), from 192.168.0.1 to 192.168.0.100
-nmap 192.168.0.1-100
+`nmap 192.168.0.1-100`
* scan all ip address (including devices) from network 192.168.0.0
-nmap 192.168.0.*
+`nmap 192.168.0.*`
* scan address from a file
-nmap -il FILE
+`nmap -il <FILE>`
* scan address and identify OS and running services
-nmap -A IP_NUMBER
+`nmap -A IP_NUMBER`
* check if target is up
-nmap -sP IP_NUMBER
+`nmap -sP IP_NUMBER`
* check reason for services states
-nmap --reason IP_NUMBER
+`nmap --reason IP_NUMBER`
* show host interfaces
-nmap --iflist IP_NUMBER
+`nmap --iflist IP_NUMBER`
### SSH
* login to remote host
-ssh ADDRESS
+`ssh ADDRESS`
* login to remote host as user USER
-ssh USER@ADDRESS
+`ssh USER@ADDRESS`
* set ssh server configuration in /etc/ssh/sshd_config
-Port 22 # default port
-PermitRootLogin without-password # change "without-password" to "no"
-AllowUsers USER_NAME # by allowing a specific user it restricts the others
+```
+Port 22 # default port
+PermitRootLogin without-password # change "without-password" to "no"
+AllowUsers USER_NAME # by allowing a specific user it restricts the others
+```
* restart "ssh" service to activate changes
## /etc/network/interfaces
-* use last 8 octets for hosts
-255.255.255.0
+```
+# use last 8 octets for hosts
+255.255.255.0
+```