[go: up one dir, main page]

0% found this document useful (0 votes)
263 views4 pages

Linux Commands For Cybersecurity Analysts

This document provides a comprehensive list of Linux commands essential for cybersecurity analysts, categorized into various sections such as system information, user management, file operations, networking, and more. Each command is accompanied by a brief description of its function, aiding analysts in performing tasks related to system monitoring, user management, and network analysis. The guide serves as a quick reference for executing critical commands in a Linux environment.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
263 views4 pages

Linux Commands For Cybersecurity Analysts

This document provides a comprehensive list of Linux commands essential for cybersecurity analysts, categorized into various sections such as system information, user management, file operations, networking, and more. Each command is accompanied by a brief description of its function, aiding analysts in performing tasks related to system monitoring, user management, and network analysis. The guide serves as a quick reference for executing critical commands in a Linux environment.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Linux Commands for Cybersecurity Analysts

1. System Information & Host Enumeration


uname -a
Shows kernel version, OS, architecture

hostname
Displays system hostname

whoami
Prints current user

id
Shows UID, GID, and groups

uptime
Shows system uptime

cat /etc/os-release
Displays Linux distribution info

2. User Management
users
Lists currently logged-in users

who
Displays logged-in sessions

adduser username_here
Creates a new user

passwd username_here
Changes password for a user

sudo su
Switches to root user

su - username_here
Switches to a different user

3. File and Directory Operations


ls -al
Lists files with permissions and metadata

cd /path_here
Changes current directory

cat file_name_here
Displays file content
Linux Commands for Cybersecurity Analysts

cp source dest
Copies file from source to dest

mv old new
Renames or moves file

rm file_name_here
Deletes a file

find / -name file


Finds files with given name

4. Permission & Ownership


chmod 755 file_here
Changes file permissions

chown user:group file


Changes file owner and group

ls -l
Displays file ownership and permission

5. Networking & Reconnaissance


ip a
Displays IP address and interfaces

ifconfig
Shows network interface config (deprecated)

ping ip_here
Pings an IP address

traceroute ip_here
Traces route to target IP

netstat -tulnp
Lists open ports and services

ss -tuln
Displays listening ports

nmap ip_here
Scans target for open ports

6. Packet Analysis & Sniffing


tcpdump -i interface_here
Captures network packets
Linux Commands for Cybersecurity Analysts

tcpdump port port_number_here


Captures packets on specified port

7. Process & Service Monitoring


ps aux
Shows all running processes

top
Displays real-time system processes

htop
Interactive process viewer

kill pid_here
Terminates a process

systemctl status service


Checks service status

8. Logs & Auditing


journalctl
Displays journal logs

cat /var/log/auth.log
Views authentication logs

dmesg
Displays kernel messages

9. Archiving & Compression


tar -czvf file.tar.gz dir
Creates a compressed archive

unzip file.zip
Extracts zip archive

10. SSH & Remote Access


ssh user@ip_here
SSH into remote server

scp file user@ip:/path


Securely copies file to remote host

11. Firewall & IPTables


ufw status
Checks UFW firewall status
Linux Commands for Cybersecurity Analysts

iptables -L
Lists iptables rules

iptables -A INPUT -p tcp --dport 22 -j ACCEPT


Allows SSH port

12. File Integrity & Hashing


md5sum file
Generates MD5 hash

sha256sum file
Generates SHA256 hash

13. Malware Analysis & Forensics


strings binary_file
Extracts printable strings from binary

file binary_file
Identifies file type

lsof -i
Lists open internet sockets

14. Scripting & Automation


bash script.sh
Runs a bash script

crontab -e
Edits crontab for scheduling tasks

You might also like