Linux User Controls

Akash Venky
3 min readApr 16, 2022

--

What is Linux

Just like Windows, iOS, and Mac OS, Linux is an operating system. In fact, one of the most popular platforms on the world, Android, is powered by the Linux operating system. To make it simple, the operating system (OS) manages the communication between your software and hardware. Without the operating system (OS), the software wouldn’t function. and Yes, Linux is an Open-source.

Distribution of Linux

  • LINUX MINT
  • CENT
  • MANJARO
  • DEBIAN
  • UBUNTU
  • SANTIAGO
  • FEDORA
  • KALI
  • PARROT OS and many more

User Controls / Tools

Ping

To check whether the Systems can be connected together.

Curl

To make an HTTP request with the target, such as Post, put, delete etc

Httpie

Similar to CURL

Wget

Used to download files from server`s

TC

To check and break the target`s Internet

DIG

To get more details about the Target Domain by DNS query.

Nslookup

Similar to DIG

Whois

Checking for the domain registration and more details

SSH

Provides a secure encrypted connection between two hosts over an insecure network.

SCP

When you need to copy files while SSHing

rSync

When you need to copy a few selected files while SSHing

Ngrep

Command-line nix utility that analyzes network packets and searches for them on a given regex pattern. It has a command-line interface and relies upon the pcap library and the GNU regex library.

Tcpdump

command-line packets sniffer or package analyzer tool which is used to capture or filter TCP/IP packets that are received or transferred over a network on a specific interface.

Wireshark

Checking for the Complete network packets IN & OUT.

Tshark

When you want to analyze the captured network patterns

TCPflow

Command-line based tool for analyzing network traffic

Ifconfig

My current IP status

Route

When you want to work with the IP/kernel routing table. It is mainly used to set up static routes to specific hosts or networks via an interface.

ARP (Address resolution manipulations)

Manipulates or displays the kernel’s IPv4 network neighbor cache. It can add entries to the table, delete one, or display the current content.

MitmProxy

Powerful python tool that allows you to capture ongoing and outgoing HTTP or HTTPS data from a specific application or from all apps on the device.

Nmap

Linux command-line tool that is used to scan IP addresses and ports in a network and to detect installed applications. Nmap allows network admins to find which devices are running on their network, discover open ports and services, and detect vulnerabilities.

Zenmap

Similar to NMAP works in Windows

Wireguard

WireGuard uses modern cryptography and network code to create an encrypted tunnel between two devices. Using some clever strategies, it even works when the client device’s IP address changes.

NC

Reads and writes data across network connections, using the TCP or UDP protocols. It is one of the most powerful tools in the network and system administrators' arsenal, and it is considered a Swiss army knife of networking tools.

Telnet

Used to create a remote connection with a system over a TCP/IP network. It allows us to administrate other systems by the terminal. We can run a program to conduct administration.

FTP

Connects a computer system to a remote server using the FTP protocol. Once connected, it also lets users transfer files between the local machine and the remote system, and manage files and directories on the remote system.

Netstat

Prints network connections, routing tables, interface statistics, masquerade connections, and multicast memberships. Netstat can be used to diagnose network issues and service problems.

Hping

Hping performs an ICMP ping scan by specifying the argument -1 on the command line.

Traceroute

Prints the route that a packet takes to reach the host. This command is useful when you want to know about the route and about all the hops that a packet takes.

Suggestions are most welcomed, Please write a mail to Akash.venky091@gmail.com,

Also, you can follow me here for more updates on Security, Ethical hacking Akash Venky, or contact me @ https://www.linkedin.com/in/akash-h-c-4a4090a7/

--

--

Akash Venky
Akash Venky

No responses yet