find and grep
Linux:$ find / -name jre 2>&1 | grep -v "Permission denied"
$ find / -name jre 2>/dev/null
openssl
Export cert from keystore
$ openssl pkcs12 -in keystore.p12 -out cert.pem -nodes
Show cert details
$ openssl x509 -in cert.pem -text -noout
Export public key from cert
$ openssl x509 -pubkey -noout -in cert.crt > pubkey.pem
Export private key from keystore in pem format
$ openssl pkcs12 -in keystore.p12 -nocerts -nodes -out key.pem
Convert key from pem to der format
$ openssl rsa -pubin -inform PEM -in pubkey.pem -outform DER -out pubkey.der
$ openssl rsa -pubin -inform PEM -in key.pem -outform DER -out key.der
Decrypt private key
$ openssl rsa -in key.pem -out private.key
Calculate Shake256 hash
$ cat public.key | openssl shake256
nc
telnet
touch
$ touch -a -m -t 202108180130.09 <file name>
networking
show
$ netstat -rn
delete
$ sudo route delete default gw 192.168.88.1 eth1
curl
send post request
$ curl -H "Content-Type: application/json" --data @body.json http://localhost:8080/ui/webapp/confsend GET request
$ curl http://localhost:8080/ui/webapp/conf
tar
Extract
$ tar -xvzf image.tar.gz
Create
$ tar -czvf image.tar.gz /path/to/dir
Show content
$ tar -ztvf image.tar.gz
dd
Add padding to file
$ dd if=/dev/zero bs=1 count=8 >> public.pad.key
sed
Replace A to B in file
$ cat input.file | sed 's/A/B/g' > output.file
keytool
Show contains
$ keytool -list -v -keystore keystore.jks
Convert keystore in JCEKS format to P12
$ keytool -importkeystore -srckeystore keystore.jks -destkeystore keystore.p12 -srcstoretype jceks -alias mycert
Import key/cert into jceks keystore from other
$ keytool -importkeystore -srckeystore source.jks -destkeystore keystore.jceks -srcstoretype jceks -alias mycert
Change password for key in keystore:
$ keytool -keypasswd -alias mycert -keystore keystore.jks
Delete alias from keystore:
$ keytool -delete -alias mycert -keystore keystore.jks
No comments:
Post a Comment