0.00
0 читателей, 4902 топика

8.Linux для Начинающих - Команды: find, cut, sort, wc


8.Linux для Начинающих — Команды: find, cut, sort, wc

find — найти файл
wc — вывести количество строк, слов, байт
cut – вывести определенное поле из текста
sort – вывести отсортированный текст

Буду рад паре баксов, можно даже Канадских :) www.paypal.me/DenisAstahov

Using awk to analyze Bro logs by Mark Krenz


Originally recorded September 12, 2017

While bro-cut is certainly an important tool in your toolbox, you can expand on your ability to analyze logs and detect a variety of interesting network events through the use of the awk program. In this talk Mark will give an intro to the syntax of the awk command and then show several examples of how awk can be used directly on logs or in a pipeline with other programs. He hopes that you find the examples provided as useful takeaways from BroCon whether you are a beginner or advanced user.

Mark Krenz is the Lead Security Analyst at Indiana University’s Center for Applied Cybersecurity Research where he has participated on projects such as the Center for Trustworthy Scientific Cyberinfrastructure (CTSC) and the Software Assurance Marketplace (SWAMP). In addition to using Bro at work on a small enterprise network, he also uses Bro at home to monitor IoT devices. Mark is also the creator/host of the popular Twitter account @climagic, which provides useful Unix command tips to over 100 thousand command line enthusiasts

Slides: www.bro.org/brocon2017/slides/awk_bro_logs.pdf

Как читать и понимать электрические схемы


Рассмотрим как научиться читать и понимать электрические схемы, состоящие из многих радиоэлектронных компонентов. Для начинающего электронщика важно уметь не только собирать устройства по электронных схемам, но и понимать процессы протекающие в электрических цепях. Любое, даже самое сложное электронное устройство состоит из отдельных узлов или блоком, которые определенным образом взаимосвязаны. Поэтому первым делом нужно уметь выделить эти блоки и понимать их назначение. Если электрическая схема включает в себя микросхемы, то следует изучить функционал микросхемы и ее режимы работы. Характерным подходом при чтении электрических схем является отслеживание протекания тока по электрической цепи. А поскольку ток протекает из точки большего потенциала к точке с более меньшим потенциалом, то следует распознавать где в схеме в любой момент времени буде больший или меньший потенциал. Здесь следует ориентироваться на значение сопротивление на определенном участке электрической цепи. Главное помнить, что сопротивление может выражать не только резистор, но и транзистор и другие электронные компоненты. Чтобы научиться читать электрические схемы следует разбирать до мелочей самые простые схемы, а затем по мере приобретения опыта вы заметить, что самые сложные схемы состоят из самых простых узлов или блоков.

Зачем шунтируют обмотку реле диодом: www.youtube.com/watch?v=GRwPzp7XZEs

Shell Scripting Interview Questions


** Linux Admin Certification Training: www.edureka.co/linux-admin **
This video covers the types of Linux Shell Scripting Interview Questions for candidates of beginners through an advanced level of expertise in Shell Scripting. Each segment comes with ten theory questions and 10 demos, each run on the Linux terminal for a better understanding of the viewers.

#edureka #ShellScriptingInterviewQuestions #LinuxShellScripting #ShellScripting #LinuxEdureka #LinuxTutorial #LinuxOnlineTraining

Check our complete Linux admin playlist here: goo.gl/ZUTGVb

— — — — — — — — — — — — — — — — — Subscribe to our channel to get video updates. Hit the subscribe button above: goo.gl/6ohpTV

Instagram: www.instagram.com/edureka_learning/
Facebook: www.facebook.com/edurekaIN/
Twitter: twitter.com/edurekain
LinkedIn: www.linkedin.com/company/edureka
Telegram: t.me/edurekaupdates
— — — — — — — — — — — — — — — — —

How it Works?

1. This is a 7 Week Instructor led Online Course, 25 hours of assignment and 10 hours of project work
2. We have a 24x7 One-on-One LIVE Technical Support to help you with any problems you might face or any clarifications you may require during the course.
3. At the end of the training you will have to undergo a 2-hour LIVE Practical Exam based on which we will provide you a Grade and a Verifiable Certificate!

— — — — — — — — — — — — — — About the Course:

Edurekas Linux Administration course covers all the concepts on administration methods in Linux. Starting from Linux installation to security administration, networking concepts, file system management, system services, Kernel services, Linux configuration.

— — — — — — — — — — — — — — Who should go for this course?

This course can be taken by any professional who wants to be a Linux Administrator or wants to learn Linux.

— — — — — — — — — — — — — — Why learn Linux Administration?

Linux is everywhere. In your daily life, you are communicating with Linux servers, major internet sites such as Facebook and Google are using Linux servers. In addition, most modern televisions and Android mobiles run on Linux. At the root of it, Linux is free software used to control desktop, laptop, supercomputers, mobile devices, networking equipment, airplanes and automobiles and so on. With Linux knowledge and an inexpensive computer you can create tiny gadgets at home, making it a widely acclaimed weapon in your skills armour.

— — — — — — — — — — — — — — For more information, Please write back to us at sales@edureka.co or call us at IND: 9606058406 / US: 18338555775 (toll free).

IT Automation Full Course for System Administration || IT automation Complete Course


In this full IT automation course you will learn how to automate process and task as an system administration. You will learn how to use ruby script to automate any IT task easily and efficiently.

Table of contents
Introduction to Automation (0:05)
What is Automation (5:00)
What is programming (9:00)
Benefits of Automation (13:30)
Pitfalls of Automation (18:00)
Ruby and Other Scripting Language (25:00)
Ruby Programming (27:00)
Object Oriented Classes (57:00)
System Programming — Mixins, Libraries, Packages
System Programming — read — write file
Intro to IO streams — Standard streams, redirecting streams, Pipe and pipelines
Running System command in Ruby
Scripting Subprocesses
When to use Subprocess, subprocess summary
Writing Scripting from the ground up — Introduction, problem statement, research
planning, writing scripting
Strings — Text Processing, string indexing, string substitution
Regular Expression — what are regular expression, Basic syntax, advance matching
Processing log files
Command line Text processing
Data formats
Reading csv files, searching csv files, modifying files
HTML processing, HTML parsing library
Version control and Automation- Git, Github
How to git, commit message, git workflow, more with git
Git — Branching and merging
What is remote, working with remotes,
Git fetch, pull, push
Version control — test, Test driven development, Black box, white box, test types
Writing unit test in ruby

Automation at scale — what is scale
What is configuration management
Intro to chef
Configuration management using chef
Chef and Ruby
Chef Configurations
Chef local mode, echosystem and architecture
Managing node with chef — Planning, configuration, testing, deploying, Scaling, extending
Automation — What is monitoring
Automation monitoring — Sources of Information metrices
Automation monitoring — Collecting metrices, metric visualization
Automation — Alerting, alert rules, blackbox and whitebox monitoring
Automation — Monitoring Metrics with prometheus
Automation Monitoring — Collecting host level metrics

*******************************************************************
Credit: The creator of this contents is Google. This video was created with the combination of
all other videos of the course.
License: Creative Commons Attribution-ShareAlike 4.0 International License

You can take this professional certificate here: www.coursera.org/specializations/google-it-support

You can take the original Course from: www.coursera.org/learn/it-security
*****************************************************

HackTheBox - Blackfield


00:00 — Intro
01:00 — Start of nmap
03:00 — Enumerating fileshares with SMBClient and CrackMapExec, highlighting some picky syntax
06:15 — Mounting the profiles$ directory so we can build a username list
09:00 — Using Kerbrute to enumerate valid usernames
13:40 — Running GetNPUsers to perform an ASREP Roast
17:50 — Checking what we can do with the Support User from the ASREP Roast
20:45 — Running the python Bloodhound ingestor from Linux
27:55 — Bloodhound ran, playing around with the data, eventually seeing support can reset audit2020s password
32:20 — Setting an Windows users (Audit2020) password from linux using RPCClient
36:45 — Audit2020 has access to the forensic share which has a memory dump of lsass, running pypykatz to extract credentials
42:20 — Using Evil-WinRM to access the box as SVC_Backup and discovering the backup privilege
43:30 — Failing to get WBADMIN to send a backup file to impacket
47:30 — Creating a NTFS Block Device/Partition but does not fix our impacket issues
49:45 — Editing samba to create a windows fileshare from linux. Purposefully dont point it to our NTFS Disk so you can see the errors.
54:54 — Pointing samba to our NTFS Directory, to show it works much better
55:50 — Running wbadmin to create a backup to our fileshare and include ntds.dit
57:00 — Running wbadmin to restore a ntds.dit out of our backup and creating a backup of the SYSTEM Registry hive
1:02:00 — Using secretsdump to extract credentials out of the ntds.dit and show the history flag
1:04:20 — Showing you cant grab the flag as SYSTEM user due to EFS (Encrypted File System). Using WMIExec to get a shell as the actual user
1:12:30 — Using Mimikatz to restore the password of Audit2020, so its like we were never there.

An AWK love story -- Cody Mello


Talk by Cody Mello.

The AWK utility is one of the most useful tools in the Unix toolbox, serving system administrators, programmers, and data scientists alike. Like many others, I started out using AWK as an improved replacement for cut, but it quickly became my Swiss Army knife of text manipulation in the shell. AWKs elegance lies in its ability to grow with the users needs and experience: as I learned more of the AWK programming language, I found myself abandoning my complicated grep, cut and sed pipelines, and reaching for AWK for tasks I would have done by hand in VIM, or solved with a general-purpose scripting language.

In this talk, I will give a quick introduction to AWK for the uninitiated, take a look back at how AWK has evolved 1977, and explore what AWK teaches us about designing new tools and purpose-built languages.

GOTO 2013 • Power Use of UNIX • Dan North


This presentation was recorded at GOTO Aarhus 2013. #gotocon #gotoaar
gotocon.com

Dan North — Agile Troublemaker, Developer, Originator of BDD

ABSTRACT
«Awk» sed Vi, «Ar» sed Ed
Thus begins an old, and sadly lost in the mists of Usenet, love story about Vi and Ed (who becomes her «ex»), told entirely in Unix commands. I had no idea when I started learning these arcane (guess how the «dd» command got its name) and cryptic (what about «grep»?) Unix commands how incredibly useful they would become over the next two decades. If your primary OS is Linux or OSX on the desktop, and maybe iOS or Android on the move, youll find this 40-something year joke («Unix» itself was a bad pun) has managed to embed itself into every facet of your technological life.

Being comfortable at a shell prompt and having a healthy working knowledge of Unix commands and regular expressions will give you a whole new level of capability. In this fun talk Ill introduce a few commands and shell tricks you should have in your back pocket, and show you how to start taking control of your operating system. If you ask nicely Ill even tell you about the production system I wrote using Makefiles.

twitter.com/gotocon
www.facebook.com/GOTOConference
gotocon.com
#Unix #Grep

Бесконечные Зависимые Выпадающие Списки в Google Sheets


Бесконечные Зависимые Выпадающие Списки в Google Sheets

В предыдущем видео «Зависимые выпадающие списки в Google Sheets» (https://youtu.be/tvzHdtW4LBU) был рассмотрен способ организации трёх-уровневого зависимого выпадающего списка с помощью стандартных формул листад.

Здесь эта тема нашла своё продолжена в виде создания зависимых выпадающих списков, размеры которых, ограничены только размером рабочего листа.

Скрипт, описанный в видео, можно найти здесь: it4each.com/blog/beskonechnye-zavisimye-vypadaiushchie-spiski-v-google-sheets/

Продолжение (2-я часть) этого видео смотрите здесь: youtu.be/e3xRFKOojyQ

#DropdownLists #DependentDropdownLists #GoogleAppsScript #GoogleSheets

Массивы в Apps Script и JavaScript. Метод .sort()


Массивы в Apps Script. Метод .sort()

Подробно на конкретных примерах рассматриваются способы сортировки числовых и строковых значений элементов массивов JavaScript и Google Apps Script. Также рассматриваются функции высшего порядка и функции первого класса.

Ссылка на предыдущее видео плейлиста: youtu.be/y84Q5AnN1Es

Скрипты, используемые в этом видео: it4each.com/blog/massivy-google-apps-script-i-javascript-metod-sortirovki-massivov-sort/

 #GoogleAppScript #Arrays #SpreadSheet #JSArray #JSArraysSort