- Find all the files sizes in Gb, Mbโฆ ordered by descending:
- Get all the info of your operating system
- Get the content of a .sh:
- Get the PATH:
- Get the bash functions available:
- To count the results:
- List a function definition:
- Use a funtion:
- If you donโt have Internet, try this:
-
SUID:
-
Files with the SUID bit set when executed are run with the permissions of the owner of the file. So if there is an binary that is owned by root and it has the SUID bit set we could theoretically use this binary to elevate our permissions.
To find SUID binaries, we can run the following command:
-
- How to find any file:
- Get the size of a file:
- BASH math โ https://phoenixnap.com/kb/bash-math
ERROR: Unable to negotiate with X.X.X.X port 22: no matching host key type found. Their offer: ssh-rsa,ssh-dss
- To encrypt an external or internal hard drive or USB:
- Compare the size of two remote files using ssh:
- How to remove a package on linux:
- How to upload files remotely via sftp:
- Check your open ports:
- Use the tool tac for printing files when cat, vi, vimโฆ are blocked or not permitted:
- Get everything of a website to obtain flags:
- Locate any file with
find
:
- Unzip a file on Linux using Python:
- Transfer a file from remote host to yours using scp:
- If the linux machine doesnโt have
wget
, we can try:- Using Netcat ๐ผ
- Or the following:
- Add a host to the known hosts:
- Find open ports internally:
- Download a file from attackerโs machine using
scp
:
- If you find a
.db
try to enter to it by:
- Upload the modified database:
- Analyze services and running processes:
- Get to know which kind of file it is:
- Find
user.txt
flag:
- Mount a remote directory to our machine:
- Check if your cpu is 32 or 64 bits: