diff --git a/tldr/nnn b/tldr/nnn new file mode 100644 index 00000000..6d64fa1d --- /dev/null +++ b/tldr/nnn @@ -0,0 +1,29 @@ +--- +syntax: markdown +tags: [tldr, common] +source: https://github.com/tldr-pages/tldr.git +--- +# nnn + +> Interactive terminal file manager and disk usage analyzer. +> More information: . + +- Open the current directory (or specify one as the first argument): + +`nnn` + +- Start in detailed mode: + +`nnn -d` + +- Show hidden files: + +`nnn -H` + +- Open an existing bookmark (defined in the `NNN_BMS` environment variable): + +`nnn -b {{bookmark_name}}` + +- Sort files on [a]pparent disk usage / [d]isk usage / [e]xtension / [r]everse / [s]ize / [t]ime / [v]ersion: + +`nnn -T {{a|d|e|r|s|t|v}}` diff --git a/tldr/nxc-ssh b/tldr/nxc-ssh new file mode 100644 index 00000000..9cb28c24 --- /dev/null +++ b/tldr/nxc-ssh @@ -0,0 +1,30 @@ +--- +syntax: markdown +tags: [tldr, common] +source: https://github.com/tldr-pages/tldr.git +--- +# nxc ssh + +> Pentest and exploit SSH servers. +> See also: `hydra`. +> More information: . + +- Spray the specified [p]assword against a list of [u]sernames on the specified target: + +`nxc ssh {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{password}}` + +- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords: + +`nxc ssh {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}` + +- Use the specified private key for authentication, using the supplied [p]assword as the key's passphrase: + +`nxc ssh {{192.186.178.2}} -u {{path/to/usernames.txt}} -p {{password}} --key-file {{path/to/id_rsa}}` + +- Try a combination of [u]sername and [p]assword on a number of targets: + +`nxc ssh {{192.168.178.0/24}} -u {{username}} -p {{password}}` + +- Check for `sudo` privileges on a successful login: + +`nxc ssh {{192.168.178.2}} -u {{username}} -p {{path/to/passwords.txt}} --sudo-check`