SlideShare a Scribd company logo
Network Tools
Network Basics
• Host – is a computer system on the network.
• Server – provides resources to clients via the network.
• Client – uses services from servers on the network.
• Protocol – a globally defined way for clients and servers
to communicate a service
• With Linux and Unix systems most tools are basing data
transfer on Network transport. The most outstanding
example of this is the X Server and Clients.
These initialize Network connection to provide a GUI
Telnet
• telnet is an application that enables users to connect to
a remote system
• The telnet server simulates a terminal to allow you to
connect to and work on a remote system, including:
– Operating a session on a remote machine.
– Alternating between the remote session and the local
session.
– Accessing machines that do not run under the Unix
environment, and vice versa
• Telnet protocol is very simple – it transfers every key
typed. For this reason the telnet program is sometimes
used to debug problems with servers by emulating
protocols manually
Ftp
• The ftp program is a command line interface to the ftp
protocol for file transfer.
• ftp uses a set of commands to connect, authenticate and
view and transfer files
• The ftp server allows access to the file system of the
host, under certain limits. Ftp allows to transfer files to
and from the remote host.
• Many implementations of ftp exists, including the web
browsers.
• It is much less common today to use the ftp program,
but the ftp protocol is in very common use on the internet
Wget and curl
• In today’s computing world, the internet speaks mainly
http.
• Besides its use as the html protocol, it is now used as a
downloading protocol, besides ftp
• Getting files from the internet can be done with a browser
• But on a server when you don’t have a GUI, a browser is
not available
• There is an exception: the lynx text based browser
displays can be used in terminal windows
• But, if all you want is to download a file when you have a
url, all you need is wget or curl, two tools that will act as
ftp or http clients and will do all that is necessary to
connect, authenticate and deliver the file to your local
system
SSH- secure connection
• SSH is the secured alternative to both trust and telnet
• All traffic in ssh is encrypted, so it cannot be
eavesdropped
• It is very simple to set up a password-less authentication
using a key-pair. There is no way for a third party to pose
as client
SSH- secure connection
• Ssh has a set of utilities for various needs:
– ‘ssh’ remote connect to a system (open a shell by
default, or execute any command using –c)
– ‘scp’ copy files between systems in a format similar to
cp
$ scp fromhost:/frompath tohost:topath
– ‘sftp’ ftp like interactive program with enhanced
security
– SSH tunneling: transfer any protocol over an ssh
connection, securing it
SSH- secure connection
• Linux uses SSH as the main transport for Graphical
Display data, in case these are needed on a remote
machine.
• SSH Tunneling is being used in order to transfer the
data, instead of the older method of working directly with
the X Server
• In order for ssh to support getting the Display data from
a remote hosts, it should be invoked with the ‘-X’ flag
@ Copyrights InterBit LTD.
Networking Subsystem
• NIC configuration entity is called an interface.
• Interface configuration files are located in:
/etc/sysconfig/network-scripts
• NIC drivers need to be compiled into kernel or
loaded as modules.
• Interfaces have names based on their types:
– Ethernet – eth0,eth1,eth2….
– PPP – ppp0,ppp1….
– etc..
@ Copyrights InterBit LTD.
ifconfig
• General network interface configuration
and debugging utility.
• Used to set up network interfaces during boot
time and runtime.
• Supports multiple address families – ipv4, ipv6
@ Copyrights InterBit LTD.
ifconfig
• Interface specific tuning – txqueue length, MTU,
etc..
• Query interface network statistics – packets
tx/rx,packet loss,etc…
• Configuring eth0 interface using ifconfig can be
as easy as:
$ ifconfig eth0 10.0.0.1 up
• Ifconfig will derive the netmask, broadcast
address based on the ip given.
@ Copyrights InterBit LTD.
ifconfig
• Queriying newly set interface eth0:
$ ifconfig eth0
eth0 Link encap:Ethernet HWaddr 00:01:02:F3:36:83
inet addr:10.0.0.1 Bcast:10.255.255.255 Mask:255.0.0.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:5 errors:0 dropped:0 overruns:0 frame:0
TX packets:4 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:100
RX bytes:50 TX bytes:124
Interrupt:20 Base address:0x2280
@ Copyrights InterBit LTD.
Routing
• Routing table is manipulated using /sbin/route.
• Setting default gateway:
$ /sbin/route add default gw 10.0.0.138
• Setting route to specific network:
$ /sbin/route add –net 172.16.0.0 gw  10.0.0.254
• Set a route permanent by either
/etc/sysconfig/route
or by adding the route command to
/etc/rc.d/rc.local
• Removing routing entry:
$ /sbin/route del –net 172.16.0.0 gw  10.0.0.254
@ Copyrights InterBit LTD.
Viewing network connections
• ‘netstat’ prints network connections, routing
table, interface statistics.
• Printing routing table:
$ netstat –r
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window Iface
212.150.51.136 * 255.255.255.248 U 40 eth0
default 212.150.51.137 0.0.0.0 UG 40 eth0
@ Copyrights InterBit LTD.
Viewing network connections
• Listing open connections and their state:
$ netstat –n
Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 32803 212.150.53.141:6881 80.162.21.171:63273 ESTABLISHED
tcp 0 0 212.150.53.141:6882 219.93.56.246:2214 ESTABLISHED
tcp 0 81 212.150.53.141:4982 81.86.150.228:4891 ESTABLISHED
tcp 0 0 212.150.53.141:49525 82.42.56.48:4662 TIME_WAIT
• Printing Varios protocol specific statistics:
$ netstat –s
@ Copyrights InterBit LTD.
Persistent Network config
• Network startup script uses configuration files
to set up networking upon boot.
• Network configuration files are located under
‘/etc/sysconfig/’.
• ‘/etc/sysconfig/network’ file defines non
interface specific network configuration:
– NETWORKING=<YES|NO>.
– GATEWAY=<default gateway ip>.
– GATEWAYDEV=<default gateway interface>.
@ Copyrights InterBit LTD.
Persistent Network config
• Interface specific configuration files located in
‘/etc/sysconfig/network-scripts’.
• Each interface has a corresponding config file of
the following scheme:
ifcfg-<interface>
@ Copyrights InterBit LTD.
Persistent Network config
• Sample
/etc/sysconfig/network-scripts/ifcfg-eth0:
DEVICE=eth0
BOOTPROTO=none # valid values are dhcp,none,bootp
ONBOOT=yes
NETWORK=10.0.1.0
NETMASK=255.255.255.0
IPADDR=10.0.1.27
USERCTL=no # can be controlled by non root
@ Copyrights InterBit LTD.
IP Aliasing
• Method of specifying multiple ip addresses for a
single NIC is called ip aliasing.
• In order to use ip aliasing, a kernel must be
compiled with ip aliasing support.
• Ip aliasing is configured by specifying an
interface of the following form:
<first interface on a nic>:’n’ – where n is a number
@ Copyrights InterBit LTD.
IP Aliasing
• Example:
$ ifconfig eth0 172.16.3.1 up
$ ifconfig eth0:1 172.16.3.10
$ ifconfig –a
eth0
Link encap:10Mbps Ethernet HWaddr 00:8E:B8:83:19:20
inet addr:172.16.3.1 Bcast:172.16.3.255 Mask:255.255.255.0 UP BROADCAST RUNNING
PROMISC MULTICAST MTU:1500 Metric:1
RX packets:334036 errors:0 dropped:0 overruns:0
TX packets:11605 errors:0 dropped:0 overruns:0 Interrupt:7 Base address:0x378
eth0:1
Link encap:10Mbps Ethernet HWaddr 00:8E:B8:83:19:20
inet addr:172.16.3.10 Bcast:172.16.3.255 Mask:255.255.255.0 UP BROADCAST RUNNING
MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0
TX packets:0 errors:0 dropped:0 overruns:0
@ Copyrights InterBit LTD.
IP Aliasing
• Defining boot time ip aliased interfaces is done
similarly to regular interfaces.
• Example:
/etc/sysconfig/network-scripts/ifcfg-eth0:1
DEVICE=eth0:1
BOOTPROTO=none
ONBOOT=yes
NETWORK=172.16.3.0
NETMASK=255.255.255.0
IPADDR=172.16.3.10
USERCTL=no
@ Copyrights InterBit LTD.
NIC link configuration
• Most current NICs and network devices support
auto- negotiation of speed and duplex.
• ‘/sbin/ethtool’ is used to view, manage NIC
auto- negotiation.
• Disabling auto-negotiation and forcing 100Mbit
Full Duplex mode:
$ /sbin/ethtool eth0 –s autoneg off speed 100 duplex full
• Use ethtool eth0 to view current link
configuration.
@ Copyrights InterBit LTD.
NIC link configuration
# ethtool eth0
Settings for eth0:
Supported ports: [ TP MII ]
Supported link modes: 10baseT/Half 10baseT/Full
100baseT/Half 100baseT/Full
Supports auto-negotiation: Yes
Advertised link modes: 10baseT/Half 10baseT/Full
100baseT/Half 100baseT/Full
Advertised auto-negotiation: Yes
Speed: 10Mb/s
Duplex: Half
Port: MII
PHYAD: 1
Transceiver: internal
Auto-negotiation: on
Supports Wake-on: g
Wake-on: g
Current message level: 0x00000007 (7)
Link detected: yes
@ Copyrights InterBit LTD.
Network kernel parameters
• Network related tunable parameters located in
‘/proc/sys/net’
• Ip forwarding enabled/disabled by
‘/proc/sys/net/ipv4/ip_forward’
• Interface specific kernel tunables located at:
‘/proc/sys/net/ipv4/conf/<interface>’
@ Copyrights InterBit LTD.
Network Tracing
• tcpdump is a network tracing tool. It connects
to a network interface, and print out
information about every packet going through
this interface
• Syntax:
tcpdump [options]
• Options:
– -i interface trace packets on interface
– -w file write data to file
@ Copyrights InterBit LTD.
Network Tracing
– -r file get data from file
Note: tcpdump output data files are written in PCAP
format, which is the same format that is used by tools
like ethereal and wireshark

More Related Content

What's hot

Network interview questions
Network interview questionsNetwork interview questions
Network interview questions
rajasekar1712
 
debugging openstack neutron /w openvswitch
debugging openstack neutron /w openvswitchdebugging openstack neutron /w openvswitch
debugging openstack neutron /w openvswitch
어형 이
 
Telnet & SSH Configuration
Telnet & SSH ConfigurationTelnet & SSH Configuration
Telnet & SSH Configuration
Vinod Gour
 
Packet Tracer: SNMP, Netflow, Sys-log
Packet Tracer: SNMP, Netflow, Sys-logPacket Tracer: SNMP, Netflow, Sys-log
Packet Tracer: SNMP, Netflow, Sys-log
Rafat Khandaker
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
inbroker
 
NAT and PAT
NAT and PATNAT and PAT
NAT and PAT
Muuluu
 
pfSense firewall workshop guide
pfSense firewall workshop guidepfSense firewall workshop guide
pfSense firewall workshop guide
Sopon Tumchota
 
6 networking
6 networking6 networking
6 networking
richarddxd
 
CCNA 1 Chapter 6 v5.0 2014
CCNA 1 Chapter 6 v5.0 2014CCNA 1 Chapter 6 v5.0 2014
CCNA 1 Chapter 6 v5.0 2014
Đồng Quốc Vương
 
Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe
Agnieszka Kuba
 
Ssh tunnel
Ssh tunnelSsh tunnel
Ssh tunnel
Amandeep Singh
 
NAT- Network Address Translation
NAT- Network Address TranslationNAT- Network Address Translation
NAT- Network Address Translation
Eng. Emad Al-Atoum
 
(NET404) Making Every Packet Count
(NET404) Making Every Packet Count(NET404) Making Every Packet Count
(NET404) Making Every Packet Count
Amazon Web Services
 
Examen ccna capitulo 6 en ingles
Examen ccna capitulo 6 en inglesExamen ccna capitulo 6 en ingles
Examen ccna capitulo 6 en ingles
Carlos Galviz Sanchez
 
OpenvSwitch Deep Dive
OpenvSwitch Deep DiveOpenvSwitch Deep Dive
OpenvSwitch Deep Dive
rajdeep
 
Sockets in unix
Sockets in unixSockets in unix
Sockets in unix
swtjerin4u
 
Part 6 : Internet applications
Part 6 : Internet applicationsPart 6 : Internet applications
Part 6 : Internet applications
Olivier Bonaventure
 
Server configuration
Server configurationServer configuration
Server configuration
Aisha Talat
 
Network telnet ssh
Network telnet sshNetwork telnet ssh
Network telnet ssh
Stefan Fodor
 
Computer Network - Telnet and Gopher
Computer Network -  Telnet and GopherComputer Network -  Telnet and Gopher
Computer Network - Telnet and Gopher
Manoj Kumar
 

What's hot (20)

Network interview questions
Network interview questionsNetwork interview questions
Network interview questions
 
debugging openstack neutron /w openvswitch
debugging openstack neutron /w openvswitchdebugging openstack neutron /w openvswitch
debugging openstack neutron /w openvswitch
 
Telnet & SSH Configuration
Telnet & SSH ConfigurationTelnet & SSH Configuration
Telnet & SSH Configuration
 
Packet Tracer: SNMP, Netflow, Sys-log
Packet Tracer: SNMP, Netflow, Sys-logPacket Tracer: SNMP, Netflow, Sys-log
Packet Tracer: SNMP, Netflow, Sys-log
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 
NAT and PAT
NAT and PATNAT and PAT
NAT and PAT
 
pfSense firewall workshop guide
pfSense firewall workshop guidepfSense firewall workshop guide
pfSense firewall workshop guide
 
6 networking
6 networking6 networking
6 networking
 
CCNA 1 Chapter 6 v5.0 2014
CCNA 1 Chapter 6 v5.0 2014CCNA 1 Chapter 6 v5.0 2014
CCNA 1 Chapter 6 v5.0 2014
 
Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe
 
Ssh tunnel
Ssh tunnelSsh tunnel
Ssh tunnel
 
NAT- Network Address Translation
NAT- Network Address TranslationNAT- Network Address Translation
NAT- Network Address Translation
 
(NET404) Making Every Packet Count
(NET404) Making Every Packet Count(NET404) Making Every Packet Count
(NET404) Making Every Packet Count
 
Examen ccna capitulo 6 en ingles
Examen ccna capitulo 6 en inglesExamen ccna capitulo 6 en ingles
Examen ccna capitulo 6 en ingles
 
OpenvSwitch Deep Dive
OpenvSwitch Deep DiveOpenvSwitch Deep Dive
OpenvSwitch Deep Dive
 
Sockets in unix
Sockets in unixSockets in unix
Sockets in unix
 
Part 6 : Internet applications
Part 6 : Internet applicationsPart 6 : Internet applications
Part 6 : Internet applications
 
Server configuration
Server configurationServer configuration
Server configuration
 
Network telnet ssh
Network telnet sshNetwork telnet ssh
Network telnet ssh
 
Computer Network - Telnet and Gopher
Computer Network -  Telnet and GopherComputer Network -  Telnet and Gopher
Computer Network - Telnet and Gopher
 

Similar to 14 network tools

Linux network tools (Maarten Blomme)
Linux network tools (Maarten Blomme)Linux network tools (Maarten Blomme)
Linux network tools (Maarten Blomme)
Avansa Mid- en Zuidwest
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
Kailash Kumar
 
Internet Internet Protocols.pptx( technology)
Internet Internet Protocols.pptx( technology)Internet Internet Protocols.pptx( technology)
Internet Internet Protocols.pptx( technology)
ujjawalr9027
 
Byte Ordering - Unit 2.pptx
Byte Ordering - Unit 2.pptxByte Ordering - Unit 2.pptx
Byte Ordering - Unit 2.pptx
RockyBhai46825
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
KushalSrivastava23
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial
junaidahmedsaba
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
AnaniaKapala
 
Harmonia open iris_basic_v0.1
Harmonia open iris_basic_v0.1Harmonia open iris_basic_v0.1
Harmonia open iris_basic_v0.1
Yongyoon Shin
 
packet traveling (pre cloud)
packet traveling (pre cloud)packet traveling (pre cloud)
packet traveling (pre cloud)
iman darabi
 
PYTHON -Chapter 5 NETWORK - MAULIK BORSANIYA
PYTHON -Chapter 5 NETWORK - MAULIK BORSANIYAPYTHON -Chapter 5 NETWORK - MAULIK BORSANIYA
PYTHON -Chapter 5 NETWORK - MAULIK BORSANIYA
Maulik Borsaniya
 
DCUS17 : Docker networking deep dive
DCUS17 : Docker networking deep diveDCUS17 : Docker networking deep dive
DCUS17 : Docker networking deep dive
Madhu Venugopal
 
Networking
NetworkingNetworking
Networking
Tarun Jaiswal
 
Tcpip Intro
Tcpip IntroTcpip Intro
Tcpip Intro
Adil Jafri
 
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
idsecconf
 
Small office Home office , network setup in details
Small office Home office , network setup in detailsSmall office Home office , network setup in details
Small office Home office , network setup in details
apel7
 
Ngrep commands
Ngrep commandsNgrep commands
Ngrep commands
Rishu Seth
 
DevCon 5 (July 2013) - WebSockets
DevCon 5 (July 2013) - WebSocketsDevCon 5 (July 2013) - WebSockets
DevCon 5 (July 2013) - WebSockets
Crocodile WebRTC SDK and Cloud Signalling Network
 
There and back again
There and back againThere and back again
There and back again
Jon Spriggs
 
Application Protocol
Application Protocol Application Protocol
Application Protocol
Chandnigupta80
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5

Similar to 14 network tools (20)

Linux network tools (Maarten Blomme)
Linux network tools (Maarten Blomme)Linux network tools (Maarten Blomme)
Linux network tools (Maarten Blomme)
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Internet Internet Protocols.pptx( technology)
Internet Internet Protocols.pptx( technology)Internet Internet Protocols.pptx( technology)
Internet Internet Protocols.pptx( technology)
 
Byte Ordering - Unit 2.pptx
Byte Ordering - Unit 2.pptxByte Ordering - Unit 2.pptx
Byte Ordering - Unit 2.pptx
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Harmonia open iris_basic_v0.1
Harmonia open iris_basic_v0.1Harmonia open iris_basic_v0.1
Harmonia open iris_basic_v0.1
 
packet traveling (pre cloud)
packet traveling (pre cloud)packet traveling (pre cloud)
packet traveling (pre cloud)
 
PYTHON -Chapter 5 NETWORK - MAULIK BORSANIYA
PYTHON -Chapter 5 NETWORK - MAULIK BORSANIYAPYTHON -Chapter 5 NETWORK - MAULIK BORSANIYA
PYTHON -Chapter 5 NETWORK - MAULIK BORSANIYA
 
DCUS17 : Docker networking deep dive
DCUS17 : Docker networking deep diveDCUS17 : Docker networking deep dive
DCUS17 : Docker networking deep dive
 
Networking
NetworkingNetworking
Networking
 
Tcpip Intro
Tcpip IntroTcpip Intro
Tcpip Intro
 
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
 
Small office Home office , network setup in details
Small office Home office , network setup in detailsSmall office Home office , network setup in details
Small office Home office , network setup in details
 
Ngrep commands
Ngrep commandsNgrep commands
Ngrep commands
 
DevCon 5 (July 2013) - WebSockets
DevCon 5 (July 2013) - WebSocketsDevCon 5 (July 2013) - WebSockets
DevCon 5 (July 2013) - WebSockets
 
There and back again
There and back againThere and back again
There and back again
 
Application Protocol
Application Protocol Application Protocol
Application Protocol
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5
MVA slides lesson 5
 

More from Shay Cohen

Linux Performance Tunning Memory
Linux Performance Tunning MemoryLinux Performance Tunning Memory
Linux Performance Tunning Memory
Shay Cohen
 
Linux Performance Tunning Kernel
Linux Performance Tunning KernelLinux Performance Tunning Kernel
Linux Performance Tunning Kernel
Shay Cohen
 
Linux Performance Tunning introduction
Linux Performance Tunning introductionLinux Performance Tunning introduction
Linux Performance Tunning introduction
Shay Cohen
 
chroot and SELinux
chroot and SELinuxchroot and SELinux
chroot and SELinux
Shay Cohen
 
Linux Internals - Kernel/Core
Linux Internals - Kernel/CoreLinux Internals - Kernel/Core
Linux Internals - Kernel/Core
Shay Cohen
 
Infra / Cont delivery - 3rd party automation
Infra / Cont delivery - 3rd party automationInfra / Cont delivery - 3rd party automation
Infra / Cont delivery - 3rd party automation
Shay Cohen
 
13 process management
13 process management13 process management
13 process management
Shay Cohen
 
12 linux archiving tools
12 linux archiving tools12 linux archiving tools
12 linux archiving tools
Shay Cohen
 
11 linux filesystem copy
11 linux filesystem copy11 linux filesystem copy
11 linux filesystem copy
Shay Cohen
 
10 finding files
10 finding files10 finding files
10 finding files
Shay Cohen
 
08 text processing_tools
08 text processing_tools08 text processing_tools
08 text processing_tools
Shay Cohen
 
07 vi text_editor
07 vi text_editor07 vi text_editor
07 vi text_editor
Shay Cohen
 
06 users groups_and_permissions
06 users groups_and_permissions06 users groups_and_permissions
06 users groups_and_permissions
Shay Cohen
 
05 standard io_and_pipes
05 standard io_and_pipes05 standard io_and_pipes
05 standard io_and_pipes
Shay Cohen
 
04 using and_configuring_bash
04 using and_configuring_bash04 using and_configuring_bash
04 using and_configuring_bash
Shay Cohen
 
03 browsing the filesystem
03 browsing the filesystem03 browsing the filesystem
03 browsing the filesystem
Shay Cohen
 
02 linux desktop usage
02 linux desktop usage02 linux desktop usage
02 linux desktop usage
Shay Cohen
 
09 string processing_with_regex copy
09 string processing_with_regex copy09 string processing_with_regex copy
09 string processing_with_regex copy
Shay Cohen
 
01 linux history overview
01 linux history overview01 linux history overview
01 linux history overview
Shay Cohen
 

More from Shay Cohen (19)

Linux Performance Tunning Memory
Linux Performance Tunning MemoryLinux Performance Tunning Memory
Linux Performance Tunning Memory
 
Linux Performance Tunning Kernel
Linux Performance Tunning KernelLinux Performance Tunning Kernel
Linux Performance Tunning Kernel
 
Linux Performance Tunning introduction
Linux Performance Tunning introductionLinux Performance Tunning introduction
Linux Performance Tunning introduction
 
chroot and SELinux
chroot and SELinuxchroot and SELinux
chroot and SELinux
 
Linux Internals - Kernel/Core
Linux Internals - Kernel/CoreLinux Internals - Kernel/Core
Linux Internals - Kernel/Core
 
Infra / Cont delivery - 3rd party automation
Infra / Cont delivery - 3rd party automationInfra / Cont delivery - 3rd party automation
Infra / Cont delivery - 3rd party automation
 
13 process management
13 process management13 process management
13 process management
 
12 linux archiving tools
12 linux archiving tools12 linux archiving tools
12 linux archiving tools
 
11 linux filesystem copy
11 linux filesystem copy11 linux filesystem copy
11 linux filesystem copy
 
10 finding files
10 finding files10 finding files
10 finding files
 
08 text processing_tools
08 text processing_tools08 text processing_tools
08 text processing_tools
 
07 vi text_editor
07 vi text_editor07 vi text_editor
07 vi text_editor
 
06 users groups_and_permissions
06 users groups_and_permissions06 users groups_and_permissions
06 users groups_and_permissions
 
05 standard io_and_pipes
05 standard io_and_pipes05 standard io_and_pipes
05 standard io_and_pipes
 
04 using and_configuring_bash
04 using and_configuring_bash04 using and_configuring_bash
04 using and_configuring_bash
 
03 browsing the filesystem
03 browsing the filesystem03 browsing the filesystem
03 browsing the filesystem
 
02 linux desktop usage
02 linux desktop usage02 linux desktop usage
02 linux desktop usage
 
09 string processing_with_regex copy
09 string processing_with_regex copy09 string processing_with_regex copy
09 string processing_with_regex copy
 
01 linux history overview
01 linux history overview01 linux history overview
01 linux history overview
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

14 network tools

  • 2. Network Basics • Host – is a computer system on the network. • Server – provides resources to clients via the network. • Client – uses services from servers on the network. • Protocol – a globally defined way for clients and servers to communicate a service • With Linux and Unix systems most tools are basing data transfer on Network transport. The most outstanding example of this is the X Server and Clients. These initialize Network connection to provide a GUI
  • 3. Telnet • telnet is an application that enables users to connect to a remote system • The telnet server simulates a terminal to allow you to connect to and work on a remote system, including: – Operating a session on a remote machine. – Alternating between the remote session and the local session. – Accessing machines that do not run under the Unix environment, and vice versa • Telnet protocol is very simple – it transfers every key typed. For this reason the telnet program is sometimes used to debug problems with servers by emulating protocols manually
  • 4. Ftp • The ftp program is a command line interface to the ftp protocol for file transfer. • ftp uses a set of commands to connect, authenticate and view and transfer files • The ftp server allows access to the file system of the host, under certain limits. Ftp allows to transfer files to and from the remote host. • Many implementations of ftp exists, including the web browsers. • It is much less common today to use the ftp program, but the ftp protocol is in very common use on the internet
  • 5. Wget and curl • In today’s computing world, the internet speaks mainly http. • Besides its use as the html protocol, it is now used as a downloading protocol, besides ftp • Getting files from the internet can be done with a browser • But on a server when you don’t have a GUI, a browser is not available • There is an exception: the lynx text based browser displays can be used in terminal windows • But, if all you want is to download a file when you have a url, all you need is wget or curl, two tools that will act as ftp or http clients and will do all that is necessary to connect, authenticate and deliver the file to your local system
  • 6. SSH- secure connection • SSH is the secured alternative to both trust and telnet • All traffic in ssh is encrypted, so it cannot be eavesdropped • It is very simple to set up a password-less authentication using a key-pair. There is no way for a third party to pose as client
  • 7. SSH- secure connection • Ssh has a set of utilities for various needs: – ‘ssh’ remote connect to a system (open a shell by default, or execute any command using –c) – ‘scp’ copy files between systems in a format similar to cp $ scp fromhost:/frompath tohost:topath – ‘sftp’ ftp like interactive program with enhanced security – SSH tunneling: transfer any protocol over an ssh connection, securing it
  • 8. SSH- secure connection • Linux uses SSH as the main transport for Graphical Display data, in case these are needed on a remote machine. • SSH Tunneling is being used in order to transfer the data, instead of the older method of working directly with the X Server • In order for ssh to support getting the Display data from a remote hosts, it should be invoked with the ‘-X’ flag
  • 9. @ Copyrights InterBit LTD. Networking Subsystem • NIC configuration entity is called an interface. • Interface configuration files are located in: /etc/sysconfig/network-scripts • NIC drivers need to be compiled into kernel or loaded as modules. • Interfaces have names based on their types: – Ethernet – eth0,eth1,eth2…. – PPP – ppp0,ppp1…. – etc..
  • 10. @ Copyrights InterBit LTD. ifconfig • General network interface configuration and debugging utility. • Used to set up network interfaces during boot time and runtime. • Supports multiple address families – ipv4, ipv6
  • 11. @ Copyrights InterBit LTD. ifconfig • Interface specific tuning – txqueue length, MTU, etc.. • Query interface network statistics – packets tx/rx,packet loss,etc… • Configuring eth0 interface using ifconfig can be as easy as: $ ifconfig eth0 10.0.0.1 up • Ifconfig will derive the netmask, broadcast address based on the ip given.
  • 12. @ Copyrights InterBit LTD. ifconfig • Queriying newly set interface eth0: $ ifconfig eth0 eth0 Link encap:Ethernet HWaddr 00:01:02:F3:36:83 inet addr:10.0.0.1 Bcast:10.255.255.255 Mask:255.0.0.0 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:5 errors:0 dropped:0 overruns:0 frame:0 TX packets:4 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:100 RX bytes:50 TX bytes:124 Interrupt:20 Base address:0x2280
  • 13. @ Copyrights InterBit LTD. Routing • Routing table is manipulated using /sbin/route. • Setting default gateway: $ /sbin/route add default gw 10.0.0.138 • Setting route to specific network: $ /sbin/route add –net 172.16.0.0 gw 10.0.0.254 • Set a route permanent by either /etc/sysconfig/route or by adding the route command to /etc/rc.d/rc.local • Removing routing entry: $ /sbin/route del –net 172.16.0.0 gw 10.0.0.254
  • 14. @ Copyrights InterBit LTD. Viewing network connections • ‘netstat’ prints network connections, routing table, interface statistics. • Printing routing table: $ netstat –r Kernel IP routing table Destination Gateway Genmask Flags MSS Window Iface 212.150.51.136 * 255.255.255.248 U 40 eth0 default 212.150.51.137 0.0.0.0 UG 40 eth0
  • 15. @ Copyrights InterBit LTD. Viewing network connections • Listing open connections and their state: $ netstat –n Proto Recv-Q Send-Q Local Address Foreign Address State tcp 0 32803 212.150.53.141:6881 80.162.21.171:63273 ESTABLISHED tcp 0 0 212.150.53.141:6882 219.93.56.246:2214 ESTABLISHED tcp 0 81 212.150.53.141:4982 81.86.150.228:4891 ESTABLISHED tcp 0 0 212.150.53.141:49525 82.42.56.48:4662 TIME_WAIT • Printing Varios protocol specific statistics: $ netstat –s
  • 16. @ Copyrights InterBit LTD. Persistent Network config • Network startup script uses configuration files to set up networking upon boot. • Network configuration files are located under ‘/etc/sysconfig/’. • ‘/etc/sysconfig/network’ file defines non interface specific network configuration: – NETWORKING=<YES|NO>. – GATEWAY=<default gateway ip>. – GATEWAYDEV=<default gateway interface>.
  • 17. @ Copyrights InterBit LTD. Persistent Network config • Interface specific configuration files located in ‘/etc/sysconfig/network-scripts’. • Each interface has a corresponding config file of the following scheme: ifcfg-<interface>
  • 18. @ Copyrights InterBit LTD. Persistent Network config • Sample /etc/sysconfig/network-scripts/ifcfg-eth0: DEVICE=eth0 BOOTPROTO=none # valid values are dhcp,none,bootp ONBOOT=yes NETWORK=10.0.1.0 NETMASK=255.255.255.0 IPADDR=10.0.1.27 USERCTL=no # can be controlled by non root
  • 19. @ Copyrights InterBit LTD. IP Aliasing • Method of specifying multiple ip addresses for a single NIC is called ip aliasing. • In order to use ip aliasing, a kernel must be compiled with ip aliasing support. • Ip aliasing is configured by specifying an interface of the following form: <first interface on a nic>:’n’ – where n is a number
  • 20. @ Copyrights InterBit LTD. IP Aliasing • Example: $ ifconfig eth0 172.16.3.1 up $ ifconfig eth0:1 172.16.3.10 $ ifconfig –a eth0 Link encap:10Mbps Ethernet HWaddr 00:8E:B8:83:19:20 inet addr:172.16.3.1 Bcast:172.16.3.255 Mask:255.255.255.0 UP BROADCAST RUNNING PROMISC MULTICAST MTU:1500 Metric:1 RX packets:334036 errors:0 dropped:0 overruns:0 TX packets:11605 errors:0 dropped:0 overruns:0 Interrupt:7 Base address:0x378 eth0:1 Link encap:10Mbps Ethernet HWaddr 00:8E:B8:83:19:20 inet addr:172.16.3.10 Bcast:172.16.3.255 Mask:255.255.255.0 UP BROADCAST RUNNING MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 TX packets:0 errors:0 dropped:0 overruns:0
  • 21. @ Copyrights InterBit LTD. IP Aliasing • Defining boot time ip aliased interfaces is done similarly to regular interfaces. • Example: /etc/sysconfig/network-scripts/ifcfg-eth0:1 DEVICE=eth0:1 BOOTPROTO=none ONBOOT=yes NETWORK=172.16.3.0 NETMASK=255.255.255.0 IPADDR=172.16.3.10 USERCTL=no
  • 22. @ Copyrights InterBit LTD. NIC link configuration • Most current NICs and network devices support auto- negotiation of speed and duplex. • ‘/sbin/ethtool’ is used to view, manage NIC auto- negotiation. • Disabling auto-negotiation and forcing 100Mbit Full Duplex mode: $ /sbin/ethtool eth0 –s autoneg off speed 100 duplex full • Use ethtool eth0 to view current link configuration.
  • 23. @ Copyrights InterBit LTD. NIC link configuration # ethtool eth0 Settings for eth0: Supported ports: [ TP MII ] Supported link modes: 10baseT/Half 10baseT/Full 100baseT/Half 100baseT/Full Supports auto-negotiation: Yes Advertised link modes: 10baseT/Half 10baseT/Full 100baseT/Half 100baseT/Full Advertised auto-negotiation: Yes Speed: 10Mb/s Duplex: Half Port: MII PHYAD: 1 Transceiver: internal Auto-negotiation: on Supports Wake-on: g Wake-on: g Current message level: 0x00000007 (7) Link detected: yes
  • 24. @ Copyrights InterBit LTD. Network kernel parameters • Network related tunable parameters located in ‘/proc/sys/net’ • Ip forwarding enabled/disabled by ‘/proc/sys/net/ipv4/ip_forward’ • Interface specific kernel tunables located at: ‘/proc/sys/net/ipv4/conf/<interface>’
  • 25. @ Copyrights InterBit LTD. Network Tracing • tcpdump is a network tracing tool. It connects to a network interface, and print out information about every packet going through this interface • Syntax: tcpdump [options] • Options: – -i interface trace packets on interface – -w file write data to file
  • 26. @ Copyrights InterBit LTD. Network Tracing – -r file get data from file Note: tcpdump output data files are written in PCAP format, which is the same format that is used by tools like ethereal and wireshark

Editor's Notes

  1. Discussion - Is working always in ‘network’ mode a good or a bad thing ? Security and Unix Sockets
  2. Show telnet example
  3. show ftp example, man page
  4. Show an example of SSH key authentication and SCP. Discuss SSH Tunneling, security aspects, etc.