Compare commits

...

11 Commits

Author SHA1 Message Date
03bb651bf0 Version bump 2014-12-29 21:45:46 -05:00
c4a5ca3900 Merge pull request #198 from thylong/ssh_forward
Update cheat ssh
2014-12-29 21:37:39 -05:00
03b587f538 Merge pull request #196 from Mic92/patch-7
ss
2014-12-29 21:36:59 -05:00
e4d7722476 Merge pull request #195 from Mic92/master
ping6
2014-12-29 21:36:18 -05:00
3807aa5433 Merge pull request #194 from Mic92/patch-6
smbclient
2014-12-29 21:35:40 -05:00
956ce7fadd Update cheat ssh 2014-12-26 15:57:01 -05:00
58abb16ca1 ss 2014-12-24 21:42:16 +01:00
54e30022f0 ping6: fix typo 2014-12-24 18:08:56 +01:00
c412cd0534 ping6 2014-12-24 12:15:03 +01:00
2d67038188 smbclient 2014-12-24 12:13:29 +01:00
603bc360c0 Version bump 2014-12-09 20:58:15 -05:00
6 changed files with 30 additions and 2 deletions

View File

@ -38,7 +38,7 @@ from docopt import docopt
if __name__ == '__main__':
# parse the command-line options
options = docopt(__doc__, version='cheat 2.1.0')
options = docopt(__doc__, version='cheat 2.1.2')
# list directories
if options['--directories']:

2
cheat/cheatsheets/ping6 Normal file
View File

@ -0,0 +1,2 @@
# get all ipv6 neighbors via broadcast ping
ping6 -I eth0 ff02::1

View File

@ -0,0 +1,5 @@
# To display public shares on the server:
smbclient -L <hostname> -U%
# To connect to a share:
smbclient //<hostname>/<share> -U<username>%<password>

18
cheat/cheatsheets/ss Normal file
View File

@ -0,0 +1,18 @@
ss
Utility to investigate sockets
Args
-4/-6 list ipv4/ipv6 sockets
-n numeric addresses instead of hostnames
-l list listing sockets
-u/-t/-x list udp/tcp/unix sockets
-p Show process(es) that using socket
# show all listing tcp sockets including the corresponding process
ss -tlp
# show all sockets connecting to 192.168.2.1 on port 80
ss -t dst 192.168.2.1:80
# show all ssh related connection
ss -t state established '( dport = :ssh or sport = :ssh )'

View File

@ -4,6 +4,9 @@ ssh -i /path/to/file.pem user@example.com
# To connect on an non-standard port:
ssh -p 2222 user@example.com
# To connect and forward the authentication agent
ssh -A user@example.com
# To execute a command on a remote server:
ssh -t user@example.com 'the-remote-command'

View File

@ -3,7 +3,7 @@ import os
setup(
name = 'cheat',
version = '2.1.0',
version = '2.1.2',
author = 'Chris Lane',
author_email = 'chris@chris-allen-lane.com',
license = 'GPL3',