diff --git a/tldr/impacket-sniff b/tldr/impacket-sniff new file mode 100644 index 00000000..9da17285 --- /dev/null +++ b/tldr/impacket-sniff @@ -0,0 +1,14 @@ +--- +syntax: markdown +tags: [tldr, common] +source: https://github.com/tldr-pages/tldr.git +--- +# impacket-sniff + +> This command is an alias of `sniff.py`. +> Part of the Impacket suite. +> More information: . + +- View documentation for the original command: + +`tldr sniff.py` diff --git a/tldr/impacket-sniffer b/tldr/impacket-sniffer new file mode 100644 index 00000000..3473cfdf --- /dev/null +++ b/tldr/impacket-sniffer @@ -0,0 +1,14 @@ +--- +syntax: markdown +tags: [tldr, common] +source: https://github.com/tldr-pages/tldr.git +--- +# impacket-sniffer + +> This command is an alias of `sniffer.py`. +> Part of the Impacket suite. +> More information: . + +- View documentation for the original command: + +`tldr sniffer.py` diff --git a/tldr/linux/parted-interactive b/tldr/linux/parted-interactive index 57e6e6b5..3c0c140e 100644 --- a/tldr/linux/parted-interactive +++ b/tldr/linux/parted-interactive @@ -6,7 +6,7 @@ source: https://github.com/tldr-pages/tldr.git # parted > A partition manipulation program. -> See also: `partprobe`. +> See also: `parted`, `partprobe`. > More information: . - Start interactive mode with the specified disk selected: diff --git a/tldr/linux/systemd-ask-password b/tldr/linux/systemd-ask-password index 0c1e1a67..40f29ac0 100644 --- a/tldr/linux/systemd-ask-password +++ b/tldr/linux/systemd-ask-password @@ -8,26 +8,30 @@ source: https://github.com/tldr-pages/tldr.git > Query the user for a system password. > More information: . -- Query a system password with a specific message: +- Query a system password with a specific prompt: -`systemd-ask-password "{{message}}"` +`systemd-ask-password "{{prompt}}"` - Specify an identifier for the password query: -`systemd-ask-password --id={{identifier}} "{{message}}"` +`systemd-ask-password --id {{identifier}} "{{prompt}}"` - Use a kernel keyring key name as a cache for the password: -`systemd-ask-password --keyname={{key_name}} "{{message}}"` +`systemd-ask-password --keyname {{key_name}} "{{prompt}}"` - Set a custom timeout for the password query: -`systemd-ask-password --timeout={{seconds}} "{{message}}"` +`systemd-ask-password --timeout {{seconds}} "{{prompt}}"` - Force the use of an agent system and never ask on current TTY: -`systemd-ask-password --no-tty "{{message}}"` +`systemd-ask-password --no-tty "{{prompt}}"` - Store a password in the kernel keyring without displaying it: -`systemd-ask-password --no-output --keyname={{key_name}} "{{message}}"` +`systemd-ask-password --no-output --keyname {{key_name}} "{{prompt}}"` + +- Pass the asked password to another program: + +`systemd-ask-password | {{command}}` diff --git a/tldr/sniff.py b/tldr/sniff.py new file mode 100644 index 00000000..8d85c696 --- /dev/null +++ b/tldr/sniff.py @@ -0,0 +1,18 @@ +--- +syntax: markdown +tags: [tldr, common] +source: https://github.com/tldr-pages/tldr.git +--- +# sniff.py + +> Capture and display network packets using the pcapy library. +> Part of the Impacket suite. +> More information: . + +- List available network interfaces and select one to start capturing packets (requires `sudo`): + +`sudo sniff.py` + +- Capture packets and save output to a file while displaying it on the terminal: + +`sudo sniff.py | sudo tee {{output_file}}` diff --git a/tldr/sniffer.py b/tldr/sniffer.py new file mode 100644 index 00000000..81420365 --- /dev/null +++ b/tldr/sniffer.py @@ -0,0 +1,22 @@ +--- +syntax: markdown +tags: [tldr, common] +source: https://github.com/tldr-pages/tldr.git +--- +# sniffer.py + +> Capture and display network packets for specified protocols using raw sockets. +> Part of the Impacket suite. +> More information: . + +- Capture packets for default protocols (ICMP, TCP, UDP): + +`sniffer.py` + +- Capture packets for specific protocols (e.g., ICMP, TCP): + +`sniffer.py {{protocol1}} {{protocol2}}` + +- Capture packets for specific protocols (e.g., TCP): + +`sniffer.py tcp`