欢迎您访问程序员文章站本站旨在为大家提供分享程序员计算机编程知识!
您现在的位置是: 首页

Web安全 渗透测试人员——必备的Linux基础知识

程序员文章站 2022-07-12 13:51:54
...

Linux知识众多,发行版又广,为了避免每次着急使查资料的尴尬情况出现,特此将我平时可能用到的命令都记录下来,以方便后面使用。

更新源

Ubuntu

Bash
# 备份更新源
mv /etc/apt/sources.list /etc/apt/sources.list.bak

# 18.04 阿里源
echo “deb http://mirrors.aliyun.com/ubuntu/ bionic main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb http://mirrors.aliyun.com/ubuntu/ bionic-security main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb http://mirrors.aliyun.com/ubuntu/ bionic-updates main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb http://mirrors.aliyun.com/ubuntu/ bionic-proposed main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb http://mirrors.aliyun.com/ubuntu/ bionic-backports main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb-src http://mirrors.aliyun.com/ubuntu/ bionic main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb-src http://mirrors.aliyun.com/ubuntu/ bionic-security main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb-src http://mirrors.aliyun.com/ubuntu/ bionic-updates main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb-src http://mirrors.aliyun.com/ubuntu/ bionic-proposed main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb-src http://mirrors.aliyun.com/ubuntu/ bionic-backports main restricted universe multiverse” >> /etc/apt/sources.list

# 18.04 清华源
echo “deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ bionic main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ bionic main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ bionic-updates main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ bionic-updates main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ bionic-backports main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ bionic-backports main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ bionic-security main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ bionic-security main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ bionic-proposed main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ bionic-proposed main restricted universe multiverse” >> /etc/apt/sources.list

# 16.04 清华源
echo “deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ xenial main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ xenial main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ xenial-updates main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ xenial-updates main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ xenial-backports main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ xenial-backports main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ xenial-security main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ xenial-security main restricted universe multiverse” >> /etc/apt/sources.list

# 14.04 清华源
echo “deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ trusty main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ trusty main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ trusty-updates main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ trusty-updates main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ trusty-backports main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ trusty-backports main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ trusty-security main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ trusty-security main restricted universe multiverse” >> /etc/apt/sources.list

# 19.04 清华源
echo “deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ disco main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ disco main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ disco-updates main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ disco-updates main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ disco-backports main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ disco-backports main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ disco-security main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ disco-security main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ disco-proposed main restricted universe multiverse” >> /etc/apt/sources.list
echo “deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ disco-proposed main restricted universe multiverse” >> /etc/apt/sources.list

Kali

Bash
# 备份更新源
mv /etc/apt/sources.list /etc/apt/sources.list.bak

# 中科大源
echo “deb http://mirrors.ustc.edu.cn/kali kali-rolling main non-free contrib” >> /etc/apt/sources.list
echo “deb-src http://mirrors.ustc.edu.cn/kali kali-rolling main non-free contrib” >> /etc/apt/sources.list

# 浙大源
echo “deb http://mirrors.zju.edu.cn/kali kali-rolling main contrib non-free” >> /etc/apt/sources.list
echo “deb-src http://mirrors.zju.edu.cn/kali kali-rolling main contrib non-free” >> /etc/apt/sources.list

# 东软大学
echo “deb http://mirrors.neusoft.edu.cn/kali kali-rolling/main non-free contrib” >> /etc/apt/sources.list
echo “deb-src http://mirrors.neusoft.edu.cn/kali kali-rolling/main non-free contrib” >> /etc/apt/sources.list

Debian

Bash
# 备份更新源
mv /etc/apt/sources.list /etc/apt/sources.list.bak

# Debian 10 buster 网易源
echo “deb http://mirrors.163.com/debian/ buster main contrib non-free” >> /etc/apt/sources.list
echo “deb http://mirrors.163.com/debian/ buster-updates main contrib non-free” >> /etc/apt/sources.list
echo “deb http://mirrors.163.com/debian/ buster-backports main contrib non-free” >> /etc/apt/sources.list
echo “deb http://mirrors.163.com/debian-security buster/updates main contrib non-free” >> /etc/apt/sources.list

# Debian 9 stretch 网易源
echo “deb http://mirrors.163.com/debian/ stretch main contrib non-free” >> /etc/apt/sources.list
echo “deb http://mirrors.163.com/debian/ stretch-updates main contrib non-free” >> /etc/apt/sources.list
echo “deb http://mirrors.163.com/debian/ stretch-backports main contrib non-free” >> /etc/apt/sources.list
echo “deb http://mirrors.163.com/debian-security stretch/updates main contrib non-free” >> /etc/apt/sources.list

# Debian 8 jessie 网易源
echo “deb http://mirrors.163.com/debian/ jessie main contrib non-free” >> /etc/apt/sources.list
echo “deb http://mirrors.163.com/debian/ jessie-updates main contrib non-free” >> /etc/apt/sources.list
echo “deb http://mirrors.163.com/debian/ jessie-backports main contrib non-free” >> /etc/apt/sources.list
echo “deb http://mirrors.163.com/debian-security jessie/updates main contrib non-free” >> /etc/apt/sources.list

CentOS

Bash
# 备份更新源
mv /etc/yum.repos.d/CentOS-Base.repo /etc/yum.repos.d/CentOS-Base.repo.bak

# 阿里云的CentOS-Base.repo 到/etc/yum.repos.d/
wget -O /etc/yum.repos.d/CentOS-Base.repo http://mirrors.aliyun.com/repo/Centos-7.repo

# 刷新源
yum update

# 生成缓存
yum makecache

这里我用的是CentOS7的更新源,其他源参考如下:

Bash
# CentOS 5 国内源替换
wget -O /etc/yum.repos.d/CentOS-Base.repo http://mirrors.aliyun.com/repo/Centos-5.repo

# CentOS 6 国内源替换
wget -O /etc/yum.repos.d/CentOS-Base.repo http://mirrors.aliyun.com/repo/Centos-6.repo

proxychains

安装

Ubuntu/Debian

Bash
apt install  proxychains

CentOS

Bash
# 下载到指定目录
cd /usr/local/src
git clone https://github.com/rofl0r/proxychains-ng.git
cd proxychains-ng

# 安装GCC
yum install gcc

# 手动编译
./configure
make && make install
make install-config

配置

Kali/Ubuntu/Debian

Bash
vim /etc/proxychains.conf

CentOS

Bash
vim /usr/local/etc/proxychains.conf

测试

Bash
proxychains curl https://www.google.com

zsh

Ubuntu/Kali/Debian安装

Bash
# 安装zsh
apt install zsh

# 更改默认shell为zsh
chsh -s /bin/zsh

# 安装oh-my-zsh
sh -c $(curl -fsSL https://raw.githubusercontent.com/robbyrussell/oh-my-zsh/master/tools/install.sh)

# 下载命令补全插件
git clone git://github.com/zsh-users/zsh-autosuggestions $ZSH_CUSTOM/plugins/zsh-autosuggestions

# zshrc配置文件中修改如下内容
plugins=(git zsh-autosuggestions)

# 重新加载zsh配置
zsh

CentOS安装

Bash
# 安装zsh
yum install zsh

除了安装使用`yum以外,其他配置方法和上面其他发行版系统一样,这里就不再赘述了。

zsh插件

CentOS7安装zsh一些插件和macOS下安装相差不多,这里就简单提一下吧:

autojump

快捷目录跳转插件

Bash
yum install autojump autojump-zsh -y

~/.zshrc 中配置

plugins=(其他的插件 autojump)

输入zsh命令生效配置后即可正常使用j命令,下面是简单的演示效果:

Bash
# root @ centos in ~/test/23333 [18:45:14]
$ pwd
/root/test/23333

# root @ centos in ~/test/23333 [18:45:16]
$ cd ~

# root @ centos in ~ [18:45:17] 直接 j 2 就跳转到历史目录了
$ j 2
/root/test/23333

# root @ centos in ~/test/23333 [18:45:20]
$ pwd
/root/test/23333

zsh-syntax-highlighting

命令输入正确会绿色高亮显示,可以有效地检测命令语法是否正确

Bash
cd ~/.oh-my-zsh/custom/plugins
git clone https://github.com/zsh-users/zsh-syntax-highlighting.git

~/.zshrc 中配置

plugins=(其他的插件 zsh-syntax-highlighting)

输入zsh命令生效配置

autosuggestions

终端下自动提示接下来可能要输入的命令,这个实际使用效率还是比较高的

Bash
cd ~/.oh-my-zsh/custom/plugins
git clone https://github.com/zsh-users/zsh-autosuggestions.git

~/.zshrc 中配置

plugins=(其他的插件 zsh-autosuggestions)

输入zsh命令生效配置

SSH

安装SSH

Ubuntu

Bash
# 直接安装报错
 apt install openssh-server

居然报错了,内容如下:

下列软件包有未满足的依赖关系:
 openssh-server : 依赖: openssh-client (= 1:7.6p1-4)
                  依赖: openssh-sftp-server 但是它将不会被安装
                  推荐: ssh-import-id 但是它将不会被安装
E: 无法修正错误,因为您要求某些软件包保持现状,就是它们破坏了软件包间的依赖关系。

手动解决依赖,这里是因为openssh-server是依赖于openssh-clien的,那我们手动安装下指定的版本的openssh-client

Bash
# 手动解决依赖
apt install openssh-client=1:7.6p1-4

# 重新安装openssh-server
apt install openssh-server

CentOS

Bash
# 安装SSH
yum install openssh-server

Kali/Debian

Bash
apt install openssh-server

允许root远程登陆

Ubuntu

Bash
# 允许root远程登陆
echo "PermitRootLogin yes" >> /etc/ssh/sshd_config

# SSH开机自启
systemctl enable ssh

# 开启SSH
/etc/init.d/ssh start

CentOS/Debian/Kali

Bash
# 允许root远程登陆
echo "PermitRootLogin yes" >> /etc/ssh/sshd_config

# SSH开机自启
systemctl enable sshd

# 开启SSH
systemctl start sshd

ssh连接非22端口

Bash
 ssh -p 端口 x.x.x.x

ssh使用公私钥登陆

Bash
 # 生成公私钥
 ssh-******

# 到ssh公私钥放的文件夹
cd /root/.ssh/

# 将公钥的内容拷贝到authorized_keys文件中
cat id_rsa.pub >> authorized_keys

# 关闭密码登陆
echo “PasswordAuthentication no” >> /etc/ssh/sshd_config

# 重启ssh
/etc/init.d/ssh restart

效果如下:

Web安全 渗透测试人员——必备的Linux基础知识
将服务器的rsa私钥下载下来,然后拷贝到自己的机器上。此时必须使用私钥匙登陆才可以成功:

Bash
# 将拷贝下来的私钥设置600权限
chmod 600 ~/Downloads/test_rsa

# 使用私钥登陆
ssh -i ~/Downloads/test_rsa aaa@qq.com

Web安全 渗透测试人员——必备的Linux基础知识

一台电脑保存多SSH KEY

假设有这样一个场景

服务器IP 私钥位置
1.1.1.1 ~/.ssh/id_rsa_a
2.2.2.2 ~/.ssh/id_rsa_b

想要自己的电脑保存这两台服务器的私钥的话,可以这样配置:

~/.ssh 目录下创建 config 文件:

Bash
vim ~/.ssh/config

输入以下信息:

Bash
Host 1.1.1.1
    IdentityFile ~/.ssh/id_rsa_a

Host 2.2.2.2
IdentityFile ~/.ssh/id_rsa_b

然后设置私钥的权限:

Bash
chmod 600 ~/.ssh/id_rsa_a
chmod 600 ~/.ssh/id_rsa_b

ssh取消公私钥登陆

Bash
# 清空.ssh文件夹
rm -rf /root/.ssh/*

# 允许密码登陆
echo “PasswordAuthentication yes” >> /etc/ssh/sshd_config

# 重启SSH服务
/etc/init.d/ssh restart

# CentOS 服务器这样重启
systemctl restart sshd

scp拷贝文件

Bash
scp 本地文件 用户名@服务器地址:要拷贝的路径

Web安全 渗透测试人员——必备的Linux基础知识

scp拷贝非22端口文件

Bash
 scp -P端口 本地文件 用户名@服务器地址:要拷贝的路径

FTP

连接FTP

最基本的连接方式:

Bash
ftp ip

FTP连接非默认端口

Bash
ftp ip port

或者:

Bash
➜  ~ ftp
ftp> open ip port

一个完整的登录示例:

Bash
➜  ~ ftp 116.xx.xx.xx 21
Connected to 116.xx.xx.xx.
220 Welcome to www.net.cn FTP service.
Name (116.xx.xx.xx:sqlsec): hyuxxxxxxxxxx
331 Please specify the password.
Password:
230 Login successful.
ftp>

基本操作

目录相关

Bash
pwd               # 显示远程计算机上的当前目录
ls/dir            # 列出当前远程目录的内容,可以使用该命令在Linux下的任何合法的ls选项
cd                # 移动到cd 后的目录
cdup/cd ..        # 返回上一级目录
lcd               # 列出当前本地目录路径

mkdir # 在远程系统中创建目录
rname # 重命名一个文件或目录
redir # 删除远程目录
delete # 删除远程文件
mdelete # 删除多个远程文件

文件上传下载

Bash
binary            # 用于二进制文件传送(图像文件等)
ascii             # 用于文本文件传送
get/mget          # 在当前远程目录下复制(一个/多个)文件到本地文件系统当前目录
put/mput          # 从当前目录把文件复制到当前远程目录

退出

Bash
!                 # 临时退出ftp模式,返回本地Linux Shell模式,键入exit返回
close             # 关闭当前连接
bye/quit          # 关闭连接并退出ftp命令模式

JDK

因为JDK官网需要登录验证才可以下载的原因,不能直接通过wget来下载tar.gz安装包了,得自己手动copy一下。

Bash
# 解压到/usr/lib/目录下
sudo tar -zxvf jdk-8u221-linux-x64.tar.gz -C /usr/lib/

# 编辑/etc/profile 配置文件
sudo vim /etc/profile

末尾添加如下内容:

Bash
JAVA_HOME=/usr/lib/jdk1.8.0_221
PATH=$JAVA_HOME/bin:$PATH
CLASSPATH=$JAVA_HOME/jre/lib/ext:$JAVA_HOME/lib/tools.jar
export PATH JAVA_HOME CLASSPATH
Bash
# 重新载入配置文件
source /etc/profile

# 验证是否安装成功
java -version

Python

Centos 7

Centos7 自带Python2版本和pip2,所以我们只要直接安装Python3即可:

Bash
# 搜索可用的Python3版本
yum search python3

# 安装Python3.6版本
yum install python36

# 查看Python版本
python3 -V
Python 3.6.8

# 查看pip版本
pip3 -V
pip 9.0.3 from /usr/lib/python3.6/site-packages (python 3.6)

# 升级pip版本
pip install --upgrade pip
pip3 install --upgrade pip

# 安装ipython
pip install ipython
pip3 install ipython

安装pyenv

pyenv Python多版本管理神器,安装起来也很简单:

Bash
# 安装基础依赖
yum install zlib-devel bzip2-devel openssl-devel ncurses-devel sqlite-devel readline-devel tk-devel gdbm-devel db4-devel libpcap-devel xz-devel -y

# 下载pyenv
git clone https://github.com/pyenv/pyenv.git ~/.pyenv

# 配置pyenv
echo ‘export PYENV_ROOT=“KaTeX parse error: Expected 'EOF', got '&' at position 58: …oken operator">&̲gt;&gt;</span> …PYENV_ROOT/bin:KaTeX parse error: Expected 'EOF', got '&' at position 51: …oken operator">&̲gt;&gt;</span> …(pyenv init -)”’ >> ~/.zshrc
zsh

基础入门使用可以参考我的这篇文章macOS pyenv入门使用记录

Ubuntu

pip3安装

Bash
sudo apt update
sudo apt install python3-pip

grep

搜索文件内容

Bash
# 搜索/home/sqlsec/Desktop/BBS/中的所有php后缀中的password关键词
grep -r "password" --include="*.php"  /home/sqlsec/Desktop/BBS/

# 可以添加多个后缀
grep -r “关键词” --include=".后缀1" --include=".后缀2" 目标路径

# 搜索/home/sqlsec/Desktop/BBS/中的所有php后缀中的password关键词
# 不搜索js后缀
grep -r “password” --include=".php" --exclude=".js" /home/sqlsec/Desktop/BBS/

用户

修改用户密码

Bash
# 修改当前用户密码
passwd

# 修改指定用户密码
passwd 用户名

# 修改root密码
sudo passwd

adduser 新建用户

Bash
adduser test 

Web安全 渗透测试人员——必备的Linux基础知识

useradd 新建用户

Bash
# 创建test用户并自动生成主目录且指定shell为bash
useradd -d /home/test -m test -s /bin/bash

# 设置test用户密码
passwd test

删除用户

Bash
# 只删除用户
sudo userdel 用户名

# 连同用户主目录一块删除
sudo userdel -r 用户名

MySQL

Ubuntu

Bash
# 安装MySQL客户端
apt install mysql-client

# 安装MySQL服务端
apt install mysql-server

# 启动MySQL
/etc/init.d/mysql start

# 初始化MySQL
sudo mysql_secure_installation

Debian/Kali

Bash
# 安装MySQL客户端
apt install mariadb-client

# 安装MySQL服务端
apt install mariadb-server

# 启动MySQL
/etc/init.d/mysql start

# 初始化MySQL
sudo mysql_secure_installation

CentOS

Bash
# 安装客户端和服务端 默认root密码为空
yum install mariadb-server

# 启动 mariadb
sudo systemctl start mariadb

# 设置开机自启
sudo systemctl enable mariadb

# 查看mariadb状态
sudo systemctl status mariadb

# 初始化MySQL
sudo mysql_secure_installation

允许root远程登陆

SQL
# 允许root外部访问连接
GRANT ALL PRIVILEGES ON *.* TO 'root'@'%' IDENTIFIED BY '这里是root密码' WITH GRANT OPTION;

刷新权限

FLUSH PRIVILEGES;

连接非3306默认端口

Bash
mysql -h目标IP地址 -u用户名 -p密码 -P端口
mysql -h10.211.55.9 -uroot -ppassword -P 33060

进程

查看进程

Bash
ps -a
ps -au
ps -aux
ps -ef

杀掉进程

Bash
kill -9 pid号

Docker

CentOS7

以下所有操作都是以 root 用户执行

Bash
# 更新到最新 yum 包
yum update -y

# 安装Docker以及Docker-compose
yum install -y yum-utils device-mapper-persistent-data lvm2
&& yum-config-manager
–add-repo
https://download.docker.com/linux/centos/docker-ce.repo
&& yum install -y docker-ce docker-ce-cli containerd.io
&& systemctl start docker
&& yum -y install epel-release
&& yum -y install python-pip
&& pip install --upgrade pip
&& pip install docker-compose

# 查看Docker版本
$ docker version
Client: Docker Engine - Community
Version: 19.03.5
API version: 1.40
Go version: go1.12.12
Git commit: 633a0ea
Built: Wed Nov 13 07:25:41 2019
OS/Arch: linux/amd64
Experimental: false

Server: Docker Engine - Community
Engine:
Version: 19.03.5
API version: 1.40 (minimum version 1.12)
Go version: go1.12.12
Git commit: 633a0ea
Built: Wed Nov 13 07:24:18 2019
OS/Arch: linux/amd64
Experimental: false
containerd:
Version: 1.2.10
GitCommit: b34a5c8af56e510852c35414db4c1f4fa6172339
runc:
Version: 1.0.0-rc8+dev
GitCommit: 3e425f80a8c931f88e6d94a8c831b9d5aa481657
docker-init:
Version: 0.18.0
GitCommit: fec3683

# 查看Docker-compose版本
$ docker-compose version
docker-compose version 1.25.4, build unknown
docker-py version: 4.1.0
CPython version: 3.6.8
OpenSSL version: OpenSSL 1.0.2k-fips 26 Jan 201

        </div>
        <hr>

        

<div class="reprint" id="reprint-statement">
    
        <div class="reprint__author">
            <span class="reprint-meta" style="font-weight: bold;">
                <i class="fas fa-user">
                    文章作者:
                </i>
            </span>
            <span class="reprint-info">
                <a href="https://www.sqlsec.com" rel="external nofollow noreferrer">国光</a>
            </span>
        </div>
        <div class="reprint__type">
            <span class="reprint-meta" style="font-weight: bold;">
                <i class="fas fa-link">
                    文章链接:
                </i>
            </span>
            <span class="reprint-info" style="overflow: hidden; text-overflow: ellipsis; width:auto; display:block;">
                <a href="https://www.sqlsec.com/2019/10/linux.html">https://www.sqlsec.com/2019/10/linux.html</a>
            </span>
        </div>
        <div class="reprint__notice">
            <span class="reprint-meta" style="font-weight: bold;">
                <i class="fas fa-copyright">
                    版权声明:
                </i>
            </span>
            <span class="reprint-info">
                本博客所有文章除特別声明外,均采用
                <a href="https://creativecommons.org/licenses/by/4.0/deed.zh" rel="external nofollow noreferrer" target="_blank">CC BY 4.0</a>
                许可协议。转载请注明来源
                <a href="https://www.sqlsec.com" target="_blank">国光</a>
                !
            </span>
        </div>
    
</div>

<script async="" defer="">
  document.addEventListener("copy", function (e) {
    let toastHTML = '<span>复制成功,请遵循本文的转载规则</span><button class="btn-flat toast-action" onclick="navToReprintStatement()" style="font-size: smaller">查看</a>';
    M.toast({html: toastHTML})
  });

  function navToReprintStatement() {
    $("html, body").animate({scrollTop: $("#reprint-statement").offset().top - 80}, 800);
  }
</script>



        <div class="tag_share" style="display: block;">
            <div class="post-meta__tag-list" style="display: inline-block;">
                
                    <div class="article-tag">
                        
                            <a href="/tags/Linux/">
                                <span class="chip tag-color">Linux</span>
                            </a>
                        
                    </div>
                
            </div>
            <div class="post_share" style="zoom: 80%; width: fit-content; display: inline-block; float: right; margin: -0.15rem 0;">
                <link rel="stylesheet" type="text/css" href="/libs/share/css/share.min.css">
<div class="social-share share-component" data-sites="qq,wechat,weibo" data-wechat-qrcode-helper="<p>微信扫一扫即可分享!</p>"><a class="social-share-icon icon-qq" href="http://connect.qq.com/widget/shareqq/index.html?url=https%3A%2F%2Fwww.sqlsec.com%2F2019%2F10%2Flinux.html&amp;title=Web%E7%8B%97%E7%9A%84%E8%A6%81%E6%87%82%E7%9A%84Linux%E5%9F%BA%E7%A1%80%E7%9F%A5%E8%AF%86%20%7C%20%E5%9B%BD%E5%85%89&amp;source=Web%E7%8B%97%E7%9A%84%E8%A6%81%E6%87%82%E7%9A%84Linux%E5%9F%BA%E7%A1%80%E7%9F%A5%E8%AF%86%20%7C%20%E5%9B%BD%E5%85%89&amp;desc=%0ALinux%E7%9F%A5%E8%AF%86%E4%BC%97%E5%A4%9A%EF%BC%8C%E5%8F%91%E8%A1%8C%E7%89%88%E5%8F%88%E5%B9%BF%EF%BC%8C%E4%B8%BA%E4%BA%86%E9%81%BF%E5%85%8D%E6%AF%8F%E6%AC%A1%E7%9D%80%E6%80%A5%E4%BD%BF%E6%9F%A5%E8%B5%84%E6%96%99%E7%9A%84%E5%B0%B4%E5%B0%AC%E6%83%85%E5%86%B5%E5%87%BA%E7%8E%B0%EF%BC%8C%E7%89%B9%E6%AD%A4%E5%B0%86%E6%88%91%E5%B9%B3%E6%97%B6%E5%8F%AF%E8%83%BD%E7%94%A8%E5%88%B0%E7%9A%84%E5%91%BD%E4%BB%A4%E9%83%BD%E8%AE%B0%E5%BD%95%E4%B8%8B%E6%9D%A5%EF%BC%8C%E4%BB%A5%E6%96%B9%E4%BE%BF%E5%90%8E%E9%9D%A2%E4%BD%BF%E7%94%A8%E3%80%82%0A%0A%0A%E6%9B%B4%E6%96%B0%E6%BA%90Ubuntu%23%20%E5%A4%87%E4%BB%BD%E6%9B%B4%E6%96%B0%E6%BA%90%0Amv%20%2Fetc%2Fapt%2Fsources.list%20%2Fetc%2Fapt%2Fso&amp;pics=https%3A%2F%2Fimage.3001.net%2Fimages%2F20191031%2F15724874583730.png&amp;summary=&quot;%0ALinux%E7%9F%A5%E8%AF%86%E4%BC%97%E5%A4%9A%EF%BC%8C%E5%8F%91%E8%A1%8C%E7%89%88%E5%8F%88%E5%B9%BF%EF%BC%8C%E4%B8%BA%E4%BA%86%E9%81%BF%E5%85%8D%E6%AF%8F%E6%AC%A1%E7%9D%80%E6%80%A5%E4%BD%BF%E6%9F%A5%E8%B5%84%E6%96%99%E7%9A%84%E5%B0%B4%E5%B0%AC%E6%83%85%E5%86%B5%E5%87%BA%E7%8E%B0%EF%BC%8C%E7%89%B9%E6%AD%A4%E5%B0%86%E6%88%91%E5%B9%B3%E6%97%B6%E5%8F%AF%E8%83%BD%E7%94%A8%E5%88%B0%E7%9A%84%E5%91%BD%E4%BB%A4%E9%83%BD%E8%AE%B0%E5%BD%95%E4%B8%8B%E6%9D%A5%EF%BC%8C%E4%BB%A5%E6%96%B9%E4%BE%BF%E5%90%8E%E9%9D%A2%E4%BD%BF%E7%94%A8%E3%80%82%0A%0A%0A%E6%9B%B4%E6%96%B0%E6%BA%90Ubuntu%23%20%E5%A4%87%E4%BB%BD%E6%9B%B4%E6%96%B0%E6%BA%90%0Amv%20%2Fetc%2Fapt%2Fsources.list%20%2Fetc%2Fapt%2Fso&quot;" target="_blank"></a><a class="social-share-icon icon-wechat" href="javascript:"><div class="wechat-qrcode"><h4>微信扫一扫:分享</h4><div class="qrcode" title="https://www.sqlsec.com/2019/10/linux.html"><canvas width="100" height="100" style="display: none;"></canvas><img alt="Scan me!" style="display: block;" src="data:image/png;base64,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"></div><div class="help"><p>微信扫一扫即可分享!</p></div></div></a><a class="social-share-icon icon-weibo" href="https://service.weibo.com/share/share.php?url=https%3A%2F%2Fwww.sqlsec.com%2F2019%2F10%2Flinux.html&amp;title=Web%E7%8B%97%E7%9A%84%E8%A6%81%E6%87%82%E7%9A%84Linux%E5%9F%BA%E7%A1%80%E7%9F%A5%E8%AF%86%20%7C%20%E5%9B%BD%E5%85%89&amp;pic=https%3A%2F%2Fimage.3001.net%2Fimages%2F20191031%2F15724874583730.png&amp;appkey=" target="_blank"></a></div>
<script src="/libs/share/js/social-share.min.js"></script>
            </div>
        </div>
        
    </div>
</div>










    <style>
.valine-card {
    margin: 1.5rem auto;
}

.valine-card .card-content {
    padding: 20px 20px 5px 20px;
}

#vcomments textarea {
    box-sizing: border-box;
    background: url("/medias/comment_bg.png") 100% 100% no-repeat;
}

#vcomments p {
    margin: 2px 2px 10px;
    font-size: 1.05rem;
    line-height: 1.78rem;
}

#vcomments blockquote p {
    text-indent: 0.2rem;
}

#vcomments a {
    padding: 0 2px;
    color: #42b983;
    font-weight: 500;
    text-decoration: none;
}

#vcomments img {
    max-width: 100%;
    height: auto;
    cursor: pointer;
}

#vcomments ol li {
    list-style-type: decimal;
}

#vcomments ol,
ul {
    display: block;
    padding-left: 2em;
    word-spacing: 0.05rem;
}

#vcomments ul li,
ol li {
    display: list-item;
    line-height: 1.8rem;
    font-size: 1rem;
}

#vcomments ul li {
    list-style-type: disc;
}

#vcomments ul ul li {
    list-style-type: circle;
}

#vcomments table, th, td {
    padding: 12px 13px;
    border: 1px solid #dfe2e5;
}

#vcomments table, th, td {
    border: 0;
}

table tr:nth-child(2n), thead {
    background-color: #fafafa;
}

#vcomments table th {
    background-color: #f2f2f2;
    min-width: 80px;
}

#vcomments table td {
    min-width: 80px;
}

#vcomments h1 {
    font-size: 1.85rem;
    font-weight: bold;
    line-height: 2.2rem;
}

#vcomments h2 {
    font-size: 1.65rem;
    font-weight: bold;
    line-height: 1.9rem;
}

#vcomments h3 {
    font-size: 1.45rem;
    font-weight: bold;
    line-height: 1.7rem;
}

#vcomments h4 {
    font-size: 1.25rem;
    font-weight: bold;
    line-height: 1.5rem;
}

#vcomments h5 {
    font-size: 1.1rem;
    font-weight: bold;
    line-height: 1.4rem;
}

#vcomments h6 {
    font-size: 1rem;
    line-height: 1.3rem;
}

#vcomments p {
    font-size: 1rem;
    line-height: 1.5rem;
}

#vcomments hr {
    margin: 12px 0;
    border: 0;
    border-top: 1px solid #ccc;
}

#vcomments blockquote {
    margin: 15px 0;
    border-left: 5px solid #42b983;
    padding: 1rem 0.8rem 0.3rem 0.8rem;
    color: #666;
    background-color: rgba(66, 185, 131, .1);
}

#vcomments pre {
    font-family: monospace, monospace;
    padding: 1.2em;
    margin: .5em 0;
    background: #272822;
    overflow: auto;
    border-radius: 0.3em;
    tab-size: 4;
}

#vcomments code {
    font-family: monospace, monospace;
    padding: 1px 3px;
    font-size: 0.92rem;
    color: #e96900;
    background-color: #f8f8f8;
    border-radius: 2px;
}

#vcomments pre code {
    font-family: monospace, monospace;
    padding: 0;
    color: #e8eaf6;
    background-color: #272822;
}

#vcomments pre[class*="language-"] {
    padding: 1.2em;
    margin: .5em 0;
}

#vcomments code[class*="language-"],
pre[class*="language-"] {
    color: #e8eaf6;
}

#vcomments [type="checkbox"]:not(:checked), [type="checkbox"]:checked {
    position: inherit;
    margin-left: -1.3rem;
    margin-right: 0.4rem;
    margin-top: -1px;
    vertical-align: middle;
    left: unset;
    visibility: visible;
}

#vcomments b,
strong {
    font-weight: bold;
}

#vcomments dfn {
    font-style: italic;
}

#vcomments small {
    font-size: 85%;
}

#vcomments cite {
    font-style: normal;
}

#vcomments mark {
    background-color: #fcf8e3;
    padding: .2em;
}

#vcomments table, th, td {
    padding: 12px 13px;
    border: 1px solid #dfe2e5;
}

table tr:nth-child(2n), thead {
    background-color: #fafafa;
}

#vcomments table th {
    background-color: #f2f2f2;
    min-width: 80px;
}

#vcomments table td {
    min-width: 80px;
}

#vcomments [type="checkbox"]:not(:checked), [type="checkbox"]:checked {
    position: inherit;
    margin-left: -1.3rem;
    margin-right: 0.4rem;
    margin-top: -1px;
    vertical-align: middle;
    left: unset;
    visibility: visible;
}
表情 | 预览
????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????✌️????????????????????????????????????????????????????????????????????❤️????????⭐️⚡️☀️☁️❄️☔️☕️✈️⚓️⌚️☎️⌛️✉️✂️✒️✏️♻️Ⓜ️ℹ️™️©️®️
回复
5 评论
Web安全 渗透测试人员——必备的Linux基础知识
Anonymous Chrome 79.0.3945.130 Windows 7
2020-01-29 回复

学习了

            </div>
        </div></div><div class="vcard" id="5e10a88456207100776e855e"><img class="vimg" src="https://gravatar.loli.net/avatar/d41d8cd98f00b204e9800998ecf8427e?d=identicon&amp;v=1.3.10">
        <div class="vh" rootid="5e10a88456207100776e855e">
            <div class="vhead"><span class="vnick">亚索</span> <span class="vsys">Quark 3.8.1.125</span> <span class="vsys">Android 10</span></div>
            <div class="vmeta">
                <span class="vtime">2020-01-04</span>
                <span class="vat">回复</span>
            </div>
            <div class="vcontent">
                <p>膜拜大佬</p>

            </div>
        </div></div><div class="vcard" id="5decda4afbf47f0067525deb"><img class="vimg" src="https://gravatar.loli.net/avatar/6cab4c017038308ef5fed7af1e34248e?d=identicon&amp;v=1.3.10">
        <div class="vh" rootid="5decda4afbf47f0067525deb">
            <div class="vhead"><span class="vnick">小又</span> <span class="vsys">Chrome 69.0.3497.86</span> <span class="vsys">Android 9</span></div>
            <div class="vmeta">
                <span class="vtime">2019-12-08</span>
                <span class="vat">回复</span>
            </div>
            <div class="vcontent">
                <p>受教了????</p>

            </div>
        </div></div><div class="vcard" id="5dbee24beaa375006c5a91a8"><img class="vimg" src="https://gravatar.loli.net/avatar/0d92b8c085a894b75b4165e4fd934444?d=identicon&amp;v=1.3.10">
        <div class="vh" rootid="5dbee24beaa375006c5a91a8">
            <div class="vhead"><a class="vnick" rel="nofollow" href="https://www.ced.sdf" target="_blank">dd</a> <span class="vsys">Firefox 69.0</span> <span class="vsys">Linux </span></div>
            <div class="vmeta">
                <span class="vtime">2019-11-04</span>
                <span class="vat">回复</span>
            </div>
            <div class="vcontent">
                <p>????????</p>

            </div>
        </div></div><div class="vcard" id="5dbee2266e9ba1006d735abe"><img class="vimg" src="https://gravatar.loli.net/avatar/0d92b8c085a894b75b4165e4fd934444?d=identicon&amp;v=1.3.10">
        <div class="vh" rootid="5dbee2266e9ba1006d735abe">
            <div class="vhead"><a class="vnick" rel="nofollow" href="https://www.ced.sdf" target="_blank">dd</a> <span class="vsys">Firefox 69.0</span> <span class="vsys">Linux </span></div>
            <div class="vmeta">
                <span class="vtime">2019-11-04</span>
                <span class="vat">回复</span>
            </div>
            <div class="vcontent">
                <p>nn</p>

            </div>
        </div></div></div><div class="vempty" style="display:none;"></div><div class="vpage txt-center"></div><div class="info"><div class="power txt-right">Powered By <a href="https://valine.js.org" target="_blank">Valine</a><br>v1.3.10</div></div></div>
    <div class="article col s12 m6 aos-init" data-aos="fade-up">
        <div class="article-badge left-badge text-color">
            <i class="fas fa-chevron-left"></i>&nbsp;上一篇</div>
        <div class="card">
            <a href="/2019/10/hashcat.html">
                <div class="card-image">
                    
                    <img src="https://dn-coding-net-tweet.codehub.cn/photo/2019/34d2fad4-eb6e-4808-b874-56b7f2d4628d.jpg" class="responsive-img" alt="Hashcat学习记录">
                    
                    <span class="card-title">Hashcat学习记录</span>
                </div>
            </a>
            <div class="card-content article-content">
                <div class="summary block-with-text">

Hashcat是一款密码**神器,信息安全必备工具之一,特此写篇文章记录总结之,以备不时之需。

简介Hashcat是世界上最快的密码**程序,是一个支持多平台、多算法的开源的分布式工具。
官方:https://hashcat.net/

                </div>
                <div class="publish-info">
                    <span class="publish-date">
                        <i class="far fa-clock fa-fw icon-date"></i>2019-10-31
                    </span>
                    <span class="publish-author">
                        
                        <i class="fas fa-bookmark fa-fw icon-category"></i>
                        
                        <a href="/ggs/Others/" class="post-category">
                                Others
                            </a>
                        
                        
                    </span>
                </div>
            </div>
            
            <div class="card-action article-tags">
                
                <a href="/tags/%E7%A5%9E%E5%99%A8/">
                    <span class="chip tag-color">神器</span>
                </a>
                
                <a href="/tags/Hastcat/">
                    <span class="chip tag-color">Hastcat</span>
                </a>
                
            </div>
            
        </div>
    </div>
    
    
    <div class="article col s12 m6 aos-init" data-aos="fade-up">
        <div class="article-badge right-badge text-color">
            下一篇&nbsp;<i class="fas fa-chevron-right"></i>
        </div>
        <div class="card">
            <a href="/2019/10/kali.html">
                <div class="card-image">
                    
                    <img src="https://dn-coding-net-tweet.codehub.cn/photo/2019/a15b1766-8ba4-4270-ae86-a0f7744711fd.jpg" class="responsive-img" alt="Kali Linux配置记录">
                    
                    <span class="card-title">Kali Linux配置记录</span>
                </div>
            </a>
            <div class="card-content article-content">
                <div class="summary block-with-text">

Kali Linux白帽子必备操作系统,有时候重新安装又得折腾下,特此这里总结一下,减少一些不必要的坑。

更新源vim /etc/apt/sources.list
官方源记住这个官方源就好了,不要被网上辣鸡文章误导,官方源会自动选择最

转自:https://www.sqlsec.com/2019/10/linux.html#toc-heading-42
作者:国光

相关标签: Linux