mirror of
https://github.com/ivuorinen/cheatsheet-tldr.git
synced 2026-02-05 04:44:12 +00:00
Update cheatsheets
This commit is contained in:
14
tldr/impacket-sniff
Normal file
14
tldr/impacket-sniff
Normal file
@@ -0,0 +1,14 @@
|
||||
---
|
||||
syntax: markdown
|
||||
tags: [tldr, common]
|
||||
source: https://github.com/tldr-pages/tldr.git
|
||||
---
|
||||
# impacket-sniff
|
||||
|
||||
> This command is an alias of `sniff.py`.
|
||||
> Part of the Impacket suite.
|
||||
> More information: <https://github.com/fortra/impacket>.
|
||||
|
||||
- View documentation for the original command:
|
||||
|
||||
`tldr sniff.py`
|
||||
14
tldr/impacket-sniffer
Normal file
14
tldr/impacket-sniffer
Normal file
@@ -0,0 +1,14 @@
|
||||
---
|
||||
syntax: markdown
|
||||
tags: [tldr, common]
|
||||
source: https://github.com/tldr-pages/tldr.git
|
||||
---
|
||||
# impacket-sniffer
|
||||
|
||||
> This command is an alias of `sniffer.py`.
|
||||
> Part of the Impacket suite.
|
||||
> More information: <https://github.com/fortra/impacket>.
|
||||
|
||||
- View documentation for the original command:
|
||||
|
||||
`tldr sniffer.py`
|
||||
@@ -6,7 +6,7 @@ source: https://github.com/tldr-pages/tldr.git
|
||||
# parted
|
||||
|
||||
> A partition manipulation program.
|
||||
> See also: `partprobe`.
|
||||
> See also: `parted`, `partprobe`.
|
||||
> More information: <https://www.gnu.org/software/parted/parted.html>.
|
||||
|
||||
- Start interactive mode with the specified disk selected:
|
||||
|
||||
@@ -8,26 +8,30 @@ source: https://github.com/tldr-pages/tldr.git
|
||||
> Query the user for a system password.
|
||||
> More information: <https://www.freedesktop.org/software/systemd/man/systemd-ask-password.html>.
|
||||
|
||||
- Query a system password with a specific message:
|
||||
- Query a system password with a specific prompt:
|
||||
|
||||
`systemd-ask-password "{{message}}"`
|
||||
`systemd-ask-password "{{prompt}}"`
|
||||
|
||||
- Specify an identifier for the password query:
|
||||
|
||||
`systemd-ask-password --id={{identifier}} "{{message}}"`
|
||||
`systemd-ask-password --id {{identifier}} "{{prompt}}"`
|
||||
|
||||
- Use a kernel keyring key name as a cache for the password:
|
||||
|
||||
`systemd-ask-password --keyname={{key_name}} "{{message}}"`
|
||||
`systemd-ask-password --keyname {{key_name}} "{{prompt}}"`
|
||||
|
||||
- Set a custom timeout for the password query:
|
||||
|
||||
`systemd-ask-password --timeout={{seconds}} "{{message}}"`
|
||||
`systemd-ask-password --timeout {{seconds}} "{{prompt}}"`
|
||||
|
||||
- Force the use of an agent system and never ask on current TTY:
|
||||
|
||||
`systemd-ask-password --no-tty "{{message}}"`
|
||||
`systemd-ask-password --no-tty "{{prompt}}"`
|
||||
|
||||
- Store a password in the kernel keyring without displaying it:
|
||||
|
||||
`systemd-ask-password --no-output --keyname={{key_name}} "{{message}}"`
|
||||
`systemd-ask-password --no-output --keyname {{key_name}} "{{prompt}}"`
|
||||
|
||||
- Pass the asked password to another program:
|
||||
|
||||
`systemd-ask-password | {{command}}`
|
||||
|
||||
18
tldr/sniff.py
Normal file
18
tldr/sniff.py
Normal file
@@ -0,0 +1,18 @@
|
||||
---
|
||||
syntax: markdown
|
||||
tags: [tldr, common]
|
||||
source: https://github.com/tldr-pages/tldr.git
|
||||
---
|
||||
# sniff.py
|
||||
|
||||
> Capture and display network packets using the pcapy library.
|
||||
> Part of the Impacket suite.
|
||||
> More information: <https://github.com/fortra/impacket>.
|
||||
|
||||
- List available network interfaces and select one to start capturing packets (requires `sudo`):
|
||||
|
||||
`sudo sniff.py`
|
||||
|
||||
- Capture packets and save output to a file while displaying it on the terminal:
|
||||
|
||||
`sudo sniff.py | sudo tee {{output_file}}`
|
||||
22
tldr/sniffer.py
Normal file
22
tldr/sniffer.py
Normal file
@@ -0,0 +1,22 @@
|
||||
---
|
||||
syntax: markdown
|
||||
tags: [tldr, common]
|
||||
source: https://github.com/tldr-pages/tldr.git
|
||||
---
|
||||
# sniffer.py
|
||||
|
||||
> Capture and display network packets for specified protocols using raw sockets.
|
||||
> Part of the Impacket suite.
|
||||
> More information: <https://github.com/fortra/impacket>.
|
||||
|
||||
- Capture packets for default protocols (ICMP, TCP, UDP):
|
||||
|
||||
`sniffer.py`
|
||||
|
||||
- Capture packets for specific protocols (e.g., ICMP, TCP):
|
||||
|
||||
`sniffer.py {{protocol1}} {{protocol2}}`
|
||||
|
||||
- Capture packets for specific protocols (e.g., TCP):
|
||||
|
||||
`sniffer.py tcp`
|
||||
Reference in New Issue
Block a user