🔐
oneforall
  • Welcome
  • ETHICAL HACKING METHODOLOGY / USUAL AND USEFUL TOOLS
    • Reconnaissance
      • Overview
    • Enumeration
      • Scanning
      • Ports
    • Exploitation
    • Post-exploitation
      • Password cracking
      • File transfers
      • Maintaining access
      • Pivoting
      • Cleaning up & Covering tracks
  • Active Directory
    • Basics
    • Attack vectors
      • Network poisoning
      • SMB services
      • LDAP
      • OSINT
    • Post-compromise
      • Enumeration
        • PowerView
        • Bloodhound
      • Attacks
        • Pass the hash / password
        • Token impersonation
        • Kerberoasting
        • GPP / cPassword
        • Mimikatz
  • WEB
    • TOP 10 OWASP
  • WEB SERVER
    • SQL Injection
    • Authentication
    • OS injection
    • CSRF
  • WIRELESS
    • WPA2 PSK
  • FORENSIC
    • Radare2
    • Obtaining Memory Samples
    • Volatility
    • USB forensic
  • EXPLOIT DEVELOPMENT
    • Buffer Overflow
  • SCRIPTING AND PL
    • HTML
    • C basics
    • Python
      • Libraries & hacking usages
    • Bash basics
      • Hacking usages
    • Powershell basics
    • PHP
  • NETWORK SECURITY
    • Network reminders
    • CCNAv7
      • LAN security concepts
      • Switch security configuration
    • Wireshark
  • MISC
    • VIM basics
    • Metasploit Cheatsheet
    • Common ports & protocols
    • Tmux Cheatsheet
    • Linux reminders
  • STEGANOGRAPHY
    • Steganography
  • Privilege Escalation
    • Linux
    • Windows
  • CRYPTO
    • Encryption
    • Hashing
    • RSA
      • Tools
      • Factorisarion
Powered by GitBook
On this page
  • Mount
  • SSH with key
  • SUID / SGID / Sticky Bit
  • File descriptors

Was this helpful?

  1. MISC

Linux reminders

PreviousTmux CheatsheetNextSteganography

Last updated 4 years ago

Was this helpful?

Mount

showmount -e <remote_machine_ip>

#mount /var/tmp in our machine

mkdir /mnt/kenobiNFS
mount machine_ip:/var /mnt/kenobiNFS
ls -la /mnt/kenobiNFS

SSH with key

chmod 600 id_rsa
ssh -i id_rsa <user>@<ip>

SUID / SGID / Sticky Bit

Permission

On Files

On Directories

SUID Bit

User executes the file with permissions of the file owner

/

SGID Bit

User executes the file with the permission of the group owner

File created in directory gets the same group owner

Sticky Bit

No meaning

Users are prevented from deleting files from other users

File descriptors

Integer value

Name

0

STDIN_FILENO

stdin

1

STDOUT_FILENO

stdout

2

STDERR_FILENO

stderr

<> symbolic constant

<> file stream

unistd.h
stdio.h
Standard input
Standard output
Standard error