DEV Community

Krav
Krav Subscriber

Posted on

Secret Linux Commands:

I’ve noticed many articles like “20 Linux Commands You Must Know” or “Linux Survival Guide,” but they often cover beginner basics like ls or echo. If you’re already familiar with those, this article is for you. I’ll share my personal cheat sheet of advanced commands I use daily at work—designed to boost efficiency and improve Linux management.

-Limux Tools: Utilities: rsync Ldapsearch mkpasswd screen

-Monitoring Tools: uptime w wall top nedu lsof

-Networking Tools: netcat netstat nslookup tcpdump

-List all Systemd services: $ systemctl -l -t service | less

Whether you’re a Sysadmin, Developer, DevOps, Security, or Ops professional, mastering Linux is essential. It’s the backbone of most servers and applications globally.

Best, Krav.

Top comments (1)

Collapse
 
krav24 profile image
Krav

# Quick value add -- Credit to @arazahmadov22 ..

Popular Open-Source Honeypots for Linux
dev.to/arazahmadov22/honeypots-408g - Source, worth the read imo.

If you're looking to set up a honeypot on a Linux system, there are several open-source options available. Each one is suited to different types of threats and research needs:
Honeyd
A low-interaction honeypot that simulates different operating systems and services. It’s great for detecting and logging attempted attacks:
Cowrie
A medium-interaction honeypot focused on SSH and Telnet. It captures login attempts, the commands attackers execute, and any files they try to transfer:
Kippo
The older version of Cowrie, Kippo is another SSH honeypot. It allows attackers to interact with a fake file system, giving you insight into what they’re after:
Dionaea
A low-interaction honeypot designed to catch malware by emulating vulnerable services such as SMB, HTTP, FTP, and more:
Glastopf
This web application honeypot simulates common web vulnerabilities, such as SQL injections or remote file inclusion (RFI/LFI), to gather insights on web-based attacks:
T-Pot
A comprehensive honeypot platform that combines multiple honeypot technologies, such as Cowrie, Dionaea, and others. It’s designed to catch a wider range of threats:
OpenCanary
A simple, low-interaction honeypot that can simulate services like HTTP, FTP, SSH, and SMTP. It helps detect unauthorized access attempts:
Honeytrap
This honeypot framework allows you to build and deploy customized honeypots for specific services:

-Krav