User talk:Ksaareme

From ICO wiki
Jump to navigationJump to search

Reference page for I600 exam


Useful linux commands

Checking information

  • lsb_release -a to check OS
  • uname -sr to check OS kernel
  • cat /proc/cpuinfo and check processor information.
  • arch to check CPU architecture
  • cat /proc/meminfo to check memory usage, RAM
  • lspci -t -v -nn to enumerate PCI and PCI Express devices
  • lsusb and lsusb -t to enumerate USB devices
  • fdisk -l to enumerate disks and partitions
  • lsblk to enumerate block devices
  • xrandr to enumerate display outputs
  • cat /proc/asound/cards to check which audio devices are available
  • dmidecode to see even more information about your computer
  • ifconfig -a or ip addr list to list all network interfaces
  • iwconfig or iw list to list all wireless network interfaces
  • hcitool dev to list bluetooth host controller.
  • glxinfo to check 3D rendering capabilities, GPU
  • lscpu info about cpu and processing units
  • lshw - short info about hardware units, such as cpu, memory, disk, usb controllers, network adapters
  • hwinfo –short info about hardware utility stuff
  • lspci info about pci buses and devices connected to them
  • lsscsi info about sata/scsi devices
  • lsusb info about usb controllers and devices
  • lsblk block information, harddrive partitions
  • df –H info about disk space and partitions that are mounted
  • fdisk –l info about partitions
  • free –m info about used, free and total amount of RAM
  • hdparm –i info about sata devices


Editing files

  • cp - copy files and directories
  • mv - move or rename files and directories
  • rm - remove files and directories
  • mkdir - create directories

NMAP and SSH

NMAP

  • Find my ip: ifconfig
  • Scan networks: nmap <ip>
  • Find live hosts: nmap -sP 192.168.0.*
  • Scan specific port: nmap -p 80 server2.tecmint.com
  • Scan a single ip address: nmap 192.168.1.1
  • Scan a host name: nmap server1.cyberciti.biz
  • Scan a host name with more info : nmap -v server1.cyberciti.biz
  • Scan with disabled port scan: nmap -sn 192.168.2.1/24
  • Read and scan from txt file: nmap -iL /tmp/test.txt
  • Create the txt file to read from: cat > /tmp/test.txt

SSH

  • Connect: ssh collie.stanford.edu
  • Log-in: ssh jhawkins@collie.stanford.edu