Useful Linux🐧 Networking🌐 Commands📜 for Sysadmins/Regular Users🧑‍💻

A thread🧵
Hello everyone👋, Today I'll be doing another quick, easy to follow thread🧵 on some of the most used command-line tools and utilities for network management in Linux

#infosec #CyberSecurity #Linux
1. Ifconfig🌐
Ifconfig stands for Interface Configurator, it is one of the most used commands for finding network details, nitialize an interface, assign IP address, enable or disable an interface. It also display route and network interface.
2. Ip🌐
ip command is the latest version of ifconfig. It is more powerful than ifconfig command as it can perform several other tasks that the ifconfig cannot do. The utility is used for displaying and manipulating routing, network devices, interfaces.
3. Traceroute🌐
Traceroute - network troubleshooting utility for tracing the full path/route of packet from your local system to another network system.
On the above output traceroute was only displaying asterisks, here is how the issue is fixed.
By enabling ICMP ECHO for probes, we able to get rid of the asterisks
4. Tracepath🌐
It is similar to traceroute command, but it doesn't require root privileges. By default, it is installed in Ubuntu. If it's not found in your system you have to install using the below easy to follow procedure.
Tracepath traces the network path of the specified destination and reports each hop along the path. If you have a slow network then tracepath will show you where your network is weak.
5. Ping🌐
Packet Internet Gropper (Ping) - it is used to check the connectivity between two hosts/nodes on a Local Area Network or Wide Area Network. It makes use of the ICMPs (Internet Control Message Protocol) to make communicate with end nodes.
6. Netstat🌐
Netstat command stands for Network statistics . It displays information about different interface statistics, including open sockets, routing tables, and connection information. Here is an example of displaying all network connections.
The netstat command supports various command-line options, few free to check netstat man pages.
7. ss🌐
The ss command is a replacement for netstat command. This command gives more information in comparison to the netstat. It is also faster than netstat as it gets all information from kernel userspace.

Here is a full thread on the ss command.

8. dig🌐
Dig stands for domain internet gropper is ar simple DNS lookup utility, that is used to query DNS related information such as A Record, CNAME, MX Record etc. It mainly deals with troubleshooting DNS related problems.
9. Nslookup🌐
This is also another command-line utility to query DNS servers both interactively and non-interactively. It is used to query DNS resource records (RR). You can find out the “A” record (IP address) of a domain.
10. route🌐
The route command displays and manipulate IP routing table for your system.
11. host🌐
the host command displays domain name for given IP address or vice-versa. It also performs DNS lookups related to the DNS query.
12. arp🌐
The command arp stands for Address Resoslution Protocol. It allows us to view or add content into kernel's ARP table.
13. iwconfig🌐
The command iwconfig configures a wireless network interface. You can view and set basic wi-fi details like SSID and encryption. For more details on this command please refer man page of iwconfig.
14. Hostname🌐
the hostname command allows us to set and view /show system's hostname. A hostname is the name of any computer that is connected to a network that is uniquely identified over a network.
15. Whois🌐
The whois command displays information about a website's record. You may get all the information about a website regarding its registration and owner's information.
That's it for today's thread! Thank💌 you for reading📚If you liked the thread and found it useful, give me a follow (@xtremepentest) for future Linux, Networking and Security content!. Be sure to also add some commands for text manipulation, would love to know them as well.😇

• • •

Missing some Tweet in this thread? You can try to force a refresh

Keep Current with Xtreme Pentesting

Xtreme Pentesting Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!


Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @xtremepentest

17 Nov
Basic Linux 🐧Commands📜 For Text Manipulation

A thread🧵

Hello everyone👋, Today I'll be doing a quick, easy to follow thread🧵 on basic Linux commands for text manipulation.
#infosec #cybersecurity #Linux
1. Echo🐧
The echo command is used to display line of text to the standard output(stdout).
2. Cat🐧
The cat command is used concatenate files and print their contents on the standard output. In other words it's just used to display the contents of a file.
Read 27 tweets
16 Nov
OSCP (Offensive Security Certified Professional) Pass and Preparation - Tips and Tricks💡

A thread🧵

#oscp #CyberSecurity #infosec
2. [0x4D31/awesome-oscp: A curated list of awesome OSCP resources (](…)
Read 16 tweets
15 Nov
Abusing SUDO rights and popping r00t shells

A thread🧵
#infosec #CyberSecurity #bugbountytips Image
In this thread🧵, I will be discussing how you can pop a root shell by abusing SUDO rights misconfiguration and will be demonstrating this using this box:…
First things first, let’s start with theoretical concepts!!😄
What is SUDO👑?
Sudo (Superuser Do) - is a Unix and Linux based utility that gives users permissions to run commands at the `root` level (most powerful user).
Read 21 tweets
14 Nov
The Linux🐧 commands you should NEVER use.
Disclaimer DON'T🚫 run these commands.

A thread🧵👇
#CyberSecurity #infosec #Linux Image
1. Recursive Deletion🔁🗑️
This is one of the most dangerous commands. Once this command is run, it deletes all the content of the root directory forcefully and recursively. Thus, all your directories and subdirectories will be deleted and the data will be lost. Image
2. Fork Bomb🍴💣

My personal best😄,this is a simple bash recursive function which once executed creates copies of itself which in turn creates another set of copies of itself. This consumes the CPU time and memory. Thus, it runs recursively until the system freezes. Image
Read 14 tweets
6 Oct
/A thread🧵👇
There was part one be sure to check it out.

#cybersecurity #infosec #Security

- Corey Schafer (@CoreyMSchafer)- YouTube -
- code with tim python (@TechWithTimm) - YouTube
Read 14 tweets
6 Oct

Do yourself a favour and learn to hack🐞.

You just have to START!🏁, you will be good in no time⏱️.

/ A mega thread🧵👇

Here are a few resources for you to get started.
#cybersecurity #CyberAttack #infosec #hacker
Also, please note that I'm not a professional hacker or pentester. I'm still learning to be, so these are the resources I have found useful along my journey.

1) Basic IT skills.👶🍼
If you are brand new to IT, I strongly recommend this course.
This is a FREE course by Professor Messer –…
Read 24 tweets

Did Thread Reader help you today?

Support us! We are indie developers!

This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Thank you for your support!

Follow Us on Twitter!