Update cheatsheets

This commit is contained in:
ivuorinen
2025-03-17 00:19:24 +00:00
parent 07c7ca9e90
commit 9cdd033c95
6 changed files with 80 additions and 8 deletions

14
tldr/impacket-sniff Normal file
View File

@@ -0,0 +1,14 @@
---
syntax: markdown
tags: [tldr, common]
source: https://github.com/tldr-pages/tldr.git
---
# impacket-sniff
> This command is an alias of `sniff.py`.
> Part of the Impacket suite.
> More information: <https://github.com/fortra/impacket>.
- View documentation for the original command:
`tldr sniff.py`

14
tldr/impacket-sniffer Normal file
View File

@@ -0,0 +1,14 @@
---
syntax: markdown
tags: [tldr, common]
source: https://github.com/tldr-pages/tldr.git
---
# impacket-sniffer
> This command is an alias of `sniffer.py`.
> Part of the Impacket suite.
> More information: <https://github.com/fortra/impacket>.
- View documentation for the original command:
`tldr sniffer.py`

View File

@@ -6,7 +6,7 @@ source: https://github.com/tldr-pages/tldr.git
# parted
> A partition manipulation program.
> See also: `partprobe`.
> See also: `parted`, `partprobe`.
> More information: <https://www.gnu.org/software/parted/parted.html>.
- Start interactive mode with the specified disk selected:

View File

@@ -8,26 +8,30 @@ source: https://github.com/tldr-pages/tldr.git
> Query the user for a system password.
> More information: <https://www.freedesktop.org/software/systemd/man/systemd-ask-password.html>.
- Query a system password with a specific message:
- Query a system password with a specific prompt:
`systemd-ask-password "{{message}}"`
`systemd-ask-password "{{prompt}}"`
- Specify an identifier for the password query:
`systemd-ask-password --id={{identifier}} "{{message}}"`
`systemd-ask-password --id {{identifier}} "{{prompt}}"`
- Use a kernel keyring key name as a cache for the password:
`systemd-ask-password --keyname={{key_name}} "{{message}}"`
`systemd-ask-password --keyname {{key_name}} "{{prompt}}"`
- Set a custom timeout for the password query:
`systemd-ask-password --timeout={{seconds}} "{{message}}"`
`systemd-ask-password --timeout {{seconds}} "{{prompt}}"`
- Force the use of an agent system and never ask on current TTY:
`systemd-ask-password --no-tty "{{message}}"`
`systemd-ask-password --no-tty "{{prompt}}"`
- Store a password in the kernel keyring without displaying it:
`systemd-ask-password --no-output --keyname={{key_name}} "{{message}}"`
`systemd-ask-password --no-output --keyname {{key_name}} "{{prompt}}"`
- Pass the asked password to another program:
`systemd-ask-password | {{command}}`

18
tldr/sniff.py Normal file
View File

@@ -0,0 +1,18 @@
---
syntax: markdown
tags: [tldr, common]
source: https://github.com/tldr-pages/tldr.git
---
# sniff.py
> Capture and display network packets using the pcapy library.
> Part of the Impacket suite.
> More information: <https://github.com/fortra/impacket>.
- List available network interfaces and select one to start capturing packets (requires `sudo`):
`sudo sniff.py`
- Capture packets and save output to a file while displaying it on the terminal:
`sudo sniff.py | sudo tee {{output_file}}`

22
tldr/sniffer.py Normal file
View File

@@ -0,0 +1,22 @@
---
syntax: markdown
tags: [tldr, common]
source: https://github.com/tldr-pages/tldr.git
---
# sniffer.py
> Capture and display network packets for specified protocols using raw sockets.
> Part of the Impacket suite.
> More information: <https://github.com/fortra/impacket>.
- Capture packets for default protocols (ICMP, TCP, UDP):
`sniffer.py`
- Capture packets for specific protocols (e.g., ICMP, TCP):
`sniffer.py {{protocol1}} {{protocol2}}`
- Capture packets for specific protocols (e.g., TCP):
`sniffer.py tcp`