Tuesday, December 27, 2016
Monday, December 19, 2016
A processes elapsed time (etime)
Using ps we can find the elapsed time for a process, when we know its process ID.
ps -eo pid,etime,command | grep
ps -eo pid,etime,command | grep
Monday, December 5, 2016
Screen - Linux Utility
Screen is an linux utility to do tasks on many terminal, with just one SSH connection to a server. We can consider it somewhat like the tabs on our browser.
To start Screen
$ screen -S Bala
The word Bala will be attached to this version of screens. This means to say that I can open another screen which has its one set of tables with another name of Test with the command "screen -S Test"
10 CTRL+A [ To scroll in the screen and press ESC to get out of copy mode.
To start Screen
$ screen -S Bala
The word Bala will be attached to this version of screens. This means to say that I can open another screen which has its one set of tables with another name of Test with the command "screen -S Test"
#
|
Command
|
Definition
|
1
|
CTRL+A
& press c
|
To create a new Tab inside the screen
|
2
|
CTRL+A & press n
|
To switch between the tabs.
|
3
|
CTRL+A
& press d
|
To detach from this screen instance to be
reconnected later.
|
4
|
Screen -ls
|
This can be used to list all screen process like Bala or Test.
|
5
|
Screen -r
|
This can be used to reattach to the detached screen.
|
6
|
CTRL+A & Shift s
|
To Split the screen horizontally
|
7
|
CTRL+A & Tab
|
To move to the split screen.
|
8
|
CTRL+A & press c
|
To get the prompt here
|
9
|
CTRL+A & Shift x
|
To remove the split screen.
|
http://unix.stackexchange.com/questions/26248/tabs-when-using-screen
Put this in .screenrc
Put this in .screenrc
# skip the startup message
startup_message off
# go to home dir
chdir
# Automatically detach on hangup.
autodetach on
# Change default scrollback value for new windows
defscrollback 10000
# start with visual bell as default
vbell on
vbell_msg "bell on %t (%n)"
# look and feel
caption always "%{= bb}%{+b w}%n %t %h %=%l %H %c"
hardstatus alwayslastline "%-Lw%{= BW}%50>%n%f* %t%{-}%+Lw%<"
activity "Activity in %t(%n)"
shelltitle "shell"
shell -$SHELL
Wednesday, June 1, 2016
snort oinkmaster
To modify Signatures using oinkmaster.
modifysid 1000000 "\$EXTERNAL_NET" | "!\$HOME_NET"
modifysid 1000001 "\$EXTERNAL_NET" | "![10.0.0.1,10.0.0.2]"
modifysid 1000001 "\-> any" | "\-> ![10.0.0.1]"
disablesid 1000002
DANGER: Don't you dare leave spaces between the IP address while you are negating them in modifysid shown in the second line. The reference for that is shown below from snort manual.
modifysid 1000000 "\$EXTERNAL_NET" | "!\$HOME_NET"
modifysid 1000001 "\$EXTERNAL_NET" | "![10.0.0.1,10.0.0.2]"
modifysid 1000001 "\-> any" | "\-> ![10.0.0.1]"
disablesid 1000002
DANGER: Don't you dare leave spaces between the IP address while you are negating them in modifysid shown in the second line. The reference for that is shown below from snort manual.
Wednesday, April 6, 2016
Auto shutdown - Debian
http://www.corntab.com/pages/crontab-gui
https://crontab.guru/
5 1 6 4 * /sbin/shutdown -h now /var/log/shut.log
Sunday, March 20, 2016
Different EAP
* Cisco purely password-based Lightweight
EAP(LEAP).
* Other vendors&Microsoft, use EAP and Transport Layer Security (EAP-TLS), which carries out authentication through digital certificates.
If EAP-TLS is being used, the authentication server and wireless device exchange digital certificates for authentication purposes.
When EAP-TLS is being used, the steps the server takes to authenticate to the wireless device are basically the same as when an SSL connection is being set up between a web server and web browser. Once the wireless device receives and validates the server’s digital certificate, it creates a master key, encrypts it with the server’s public key, and sends it over to the authentication server. Now the wireless device and authentication server have a master key, which they use to generate individual symmetric session keys. Both entities use these session keys for encryption and decryption purposes, and it is the use of these keys that sets up a secure channel between the two devices.
* Protective EAP (PEAP), where only the server uses a digital certificate.
If PEAP is being used instead, the user of the wireless device sends the server a password and the server authenticates to the wireless device with its digital certificate.
* EAP-TTLS provides authentication that is as strong as EAP-TLS, but it does not require user certificate. however require server certificates.
User authentication is performed by password, but the password credentials are transported in a securely encrypted tunnel established based upon the server certificates.
* Other vendors&Microsoft, use EAP and Transport Layer Security (EAP-TLS), which carries out authentication through digital certificates.
If EAP-TLS is being used, the authentication server and wireless device exchange digital certificates for authentication purposes.
When EAP-TLS is being used, the steps the server takes to authenticate to the wireless device are basically the same as when an SSL connection is being set up between a web server and web browser. Once the wireless device receives and validates the server’s digital certificate, it creates a master key, encrypts it with the server’s public key, and sends it over to the authentication server. Now the wireless device and authentication server have a master key, which they use to generate individual symmetric session keys. Both entities use these session keys for encryption and decryption purposes, and it is the use of these keys that sets up a secure channel between the two devices.
* Protective EAP (PEAP), where only the server uses a digital certificate.
If PEAP is being used instead, the user of the wireless device sends the server a password and the server authenticates to the wireless device with its digital certificate.
* EAP-TTLS provides authentication that is as strong as EAP-TLS, but it does not require user certificate. however require server certificates.
User authentication is performed by password, but the password credentials are transported in a securely encrypted tunnel established based upon the server certificates.
* EAP-Tunneled TLS (EAP-TTLS) is an EAP
protocol that extends TLS.
Thursday, February 11, 2016
Using Tar
We can use TAR to get a bulk of files and directories from one machine with their absolute path and move to another machine in the same absolute path with the following commands.
$ cat files.txt
/tmp/a.txt
/tmp/folder1/b.txt
/tmp/folder2/
/tmp/folder3
Now for creating a tar file with the directory structure shown above issue the following command.
$ tar cvpfP a.tar -T files.txt
Here
c will create the archive called a.tar
v will give us a verbose output
p will preserve the permission of the file
f will use the following archive file name
P will not ignore the / before the tmp.
Now for deflating all the files and folders in the corresponding absolute path use the following command.
$ tar xvpfP a.tar
$ cat files.txt
/tmp/a.txt
/tmp/folder1/b.txt
/tmp/folder2/
/tmp/folder3
Now for creating a tar file with the directory structure shown above issue the following command.
$ tar cvpfP a.tar -T files.txt
Here
c will create the archive called a.tar
v will give us a verbose output
p will preserve the permission of the file
f will use the following archive file name
P will not ignore the / before the tmp.
Now for deflating all the files and folders in the corresponding absolute path use the following command.
$ tar xvpfP a.tar
Saturday, January 2, 2016
Subscribe to:
Posts (Atom)