curl-常见的使用场景

curl--使用详细记录

常见用法
1. curl http://myip.ipip.net
直接访问

2. curl -A "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90Safari/537.36" http://myip.ipip.net
-A 参数指定客户端用户代理的标识头,UA,默认是curl/7.68.0

3. curl -H "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90Safari/537.36" http://myip.ipip.net
-H 也可以直接HTTP请求头,更改User-Agent

4. curl -b 'cntf=fuck' https://myip.ipip.net
-b 用来向服务器发送cookie

5. curl -c cookies.txt https://myip.ipip.net
-c 将服务端设置的cookie在本地生成一个文件写入进去

6. curl -d 'login=bab&password=shit' -x POST https://myip.ipip.net
-d 参数用于发送 POST 请求的数据体(body体) 使用-d参数,HTTP 请求会自动加上标头Content-Type : application/x-www-form-urlencoded。并且会自动将请求转为 POST 方法,因此可以省略-X POST

7. curl -d '@cookies.txt' https://myip.ipip.net
-d 参数也可以读取本地文本数据,向服务端发送

8. curl --data-urlencode 'cntf=shit hehe' http://myip.ipip.net
--data-urlencode 参数等同于-d参数,也是发送POST请求数据,区别是会自动将需要发送的数据进行URL编码

9. curl -e 'https://www.qq.com' https://myip.ipip.net
-e 参数用来设置HTTP的请求头Referer用来表示请求来源,当然这里也可以使用-H参数来表示,区别是要把完整的请求头写出来,包括Referer写进去,而-e参数不需要写入Referer

10. curl -F 'file=@cntf' https://myip.ipip.net
-F 参数可以用来向服务器上传二进制文件,这里cntf就是要给二进制文件,上面的命令在HTTP请求中加上了头Content-Type: multipart/form-data 然后将文件cntf作为file字段上传

11. curl -F 'file=@cntf.png;type=image/png' https://myip.ipip.net
-F 参数也可以指定MIME类型

12. curl -G -d 'wd=test' -d 'count=30' https://www.baidu.com/s
-G 参数用来构造URL查询字符串  类似构造成这个 https://www.baidu.com/s?wd=test&count=20 

13. curl -i https://myip.ipip.net
-i 参数打印出服务器响应的HTTP头,上面的命令操作完成之后会先输出服务器响应的头,然后再空一行,再输出网页源码

14. curl -I https://www.qq.com
-I 参数向服务器发送HEAD请求,然后将服务器返回的HTTP响应头打印出来,不返回输出源码信息

15. curl --head https://www.qq.com
--head 参数跟-I参数一样的功能

16. curl -k https://myip.ipip.net
-k 参数指定跳过SSL检测,上面的命令不会检查服务器的SSL证书是否正确

17. curl -L http://qq.com
-L 参数会让HTTP请求跟随服务器重定向,默认情况下curl是不会跟随重定向的

18. curl --limit-rate 1k https://www.qq.com
--limit-rate 参数是用来限制HTTP请求和响应的带宽大小,一把用来模拟网速慢得环境,上面得命令表示将带宽限制在每秒1k字节

19. curl -o test.html https://myip.ipip.net
-o 参数是将服务器的响应内容保存成文件,相当于wget命令来下载文件了,上面的命令是将响应的内容保存成test.html文件

20. curl -O https://www.ruanyifeng.com/blog/2019/09/curl-reference.html
-O 参数将服务器响应内容保存成文件,并URL的最后一部分当作文件名称

21. curl -s https://myip.ipip.net1
-s 参数是将不输出错误和进度信息,上面的命令是故意写错域名,访问结果是不返回任何信息,如果不发送错误,会显示正确的结果

22. curl -s -o /dev/null https://myip.ipip.net
-s&-o /dev/null  参数加了/dev/null表示不管正确错误与否都不显示出来

23. curl -u 'cntf:cntf' https://myip.ipip.net
-u 参数用来设置服务器认证的用户名和密码,上面的命令操作完成之后会将HTTP头变成401认证那种形式类似Authorization: Basic xxxxxx
其他形式:
curl https://cntf:cntf@https://myip.ipip.net
或者
curl -u 'cntf' https://myip.ipip.net 完成之后会让你输入密码

24. curl -v https://myip.ipip.net
-v 参数用于输出整个通信过程,一把用于调试

25. curl --trace - https://myip.ipip.net
--trace - 参数也是可以用于调试,而且还会显示输出原始的二进制数据内容

26. curl -x socks5://10.0.1.251:10808 https://www.facebook.com
-x 参数只当http请求代理,上面的命令是使用socks5代理,而且没有用户名和密码认证

27. curl -x socks5://cntf:cntf@10.0.1.251:10808 https://www.facebook.com
上面是带认证的socks5代理

28. curl -x 10.0.1.251:10808 https://www.facebook.com
如果没有指定使用哪种代理协议,默认情况下是http代理协议

29. curl -X POST https://myip.ipip.net
-X 参数用于指定HTTP请求的请求方法

30. curl --trace output.txt https://myip.ipip.net
--trace 参数调试过程输出到文本中,里面有16进制内容,正常显示响应内容

31. curl --trace-ascii out.txt https://myip.ipip.net
--trace-ascii 跟上面结果一样,区别是没有16进制内容

32. curl -X POST --data-urlencode "date=May 13" https://myip.ipip.net
-X POST --data-urlencode POST请求进行url编码

33. curl --referer https://shit.qq.com https://myip.ipip.net
--referer 在HTTP请求中添加referer头

34. curl --user-agent "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90Safari/537.36" https://myip.ipip.net
--user-agent 参数同样是指定user-agent头

35. curl --header "Content-Type:application/json" https://myip.ipip.net
--header 参数指定一个HTTP请求头

36. curl -d 'login=cntf' -d 'password=cntfshit' https://myip.ipip.net
-d  使用多个-d参数配置更整洁的POST请求,使用了-d参数就可以省略添加POST的操作

37. curl -d '{"login": "cntf", "pass":"cntfshit"}' -H 'Content-Type: application/json' https://myip.ipip.net
-d  使用POST请求提交一个json格式的数据

38. curl -d '<user><login>cntf</login><password>cntfshit</password></user>' -H 'Content-Type: text/xml' https://myip.ipip.net
-d  使用POST请求提交一个xml格式的数据

39. curl -d 'hello cntf' -H 'Content-Type: text/plain' https://myip.ipip.net
-d  使用POST请求提交一个纯文本内容

40. curl -d '@data.txt' https://myip.ipip.net
-d  使用POST请求从一个文本文件加载内容并提交

41. curl --data-urlencode 'comment=hello cntf' https://myip.ipip.net
--data-urlencode 使用POST请求提交一个url编码的信息

42. curl -A '' https://myip.ipip.net
-A  移除一个user-agent

43. curl -A '' -H 'User-Agent:' https://myip.ipip.net
-A -H  发送一个空User-Agent

44. curl -c cookies.txt https://myip.ipip.net
-c  参数保存cookie内容到一个文件

45. curl -b cookies.txt https://myip.ipip.net
-b  参数从一个文件内容加载cookies

46. curl -e 'https://shit.hehe.com' https://myip.ipip.net
-e  参数添加一个referer头

47. curl -e '' https://myip.ipip.net
-e  发送一个空referer头

48. curl -H 'https://shit.hehe.com' https://myip.ipip.net
-H  参数-H添加referer头

49. curl -s -o /dev/null -D - https://myip.ipip.net
-s -o /dev/null -D -  参数只输出响应头信息

50. curl -x socks4:10.0.1.251:10808 https://www.google.com
-x socks4  参数使用socks4代理无需认证

51. curl -1 https://myip.ipip.net
-1  参数数字-1表示使用SSLv1(TLSv1) ,数字-0是使用HTTP1.0 数字-2表示curl使用SSLv2(SSL) -3 表示curl使用SSLv3(SSL)

52. curl --trace - --trace-time https://myip.ipip.net
--trace - --trace-time  参数显示详细的访问开始时间和结束时间

53. curl -v -s -o /dev/null --stderr - https://myip.ipip.net | grep '^>'
-v -s -o /dev/null --stderr - 仅显示HTTP请求头信息

54. curl -w '%{response_code}' -s -o /dev/null https://myip.ipip..net
-w '%{response_code}' -s -o /dev/null  仅显示HTTP响应码

55. curl -# -o centos7.2009-everything.iso -C - http://mirrors.aliyun.com/centos/7/isos/x86_64/CentOS-7-x86_64-Everything-2009.iso
-o  显示下载进度,断点续传

56. curl -# -o centos7.2009-everything.iso http://mirrors.aliyun.com/centos/7/isos/x86_64/CentOS-7-x86_64-Everything-2009.iso
-o  简单进度条显示

参考:
https://catonmat.net/cookbooks/curl

man手册
https://curl.se/docs/manpage.html

kali@kali:~$ curl --help
Usage: curl [options...] <url>
     --abstract-unix-socket <path> Connect via abstract Unix domain socket
     --alt-svc <file name> Enable alt-svc with this cache file
     --anyauth       Pick any authentication method
 -a, --append        Append to target file when uploading
     --basic         Use HTTP Basic Authentication
     --cacert <file> CA certificate to verify peer against
     --capath <dir>  CA directory to verify peer against
 -E, --cert <certificate[:password]> Client certificate file and password
     --cert-status   Verify the status of the server certificate
     --cert-type <type> Certificate file type (DER/PEM/ENG)
     --ciphers <list of ciphers> SSL ciphers to use
     --compressed    Request compressed response
     --compressed-ssh Enable SSH compression
 -K, --config <file> Read config from a file
     --connect-timeout <seconds> Maximum time allowed for connection
     --connect-to <HOST1:PORT1:HOST2:PORT2> Connect to host
 -C, --continue-at <offset> Resumed transfer offset
 -b, --cookie <data|filename> Send cookies from string/file
 -c, --cookie-jar <filename> Write cookies to <filename> after operation
     --create-dirs   Create necessary local directory hierarchy
     --crlf          Convert LF to CRLF in upload
     --crlfile <file> Get a CRL list in PEM format from the given file
 -d, --data <data>   HTTP POST data
     --data-ascii <data> HTTP POST ASCII data
     --data-binary <data> HTTP POST binary data
     --data-raw <data> HTTP POST data, '@' allowed
     --data-urlencode <data> HTTP POST data url encoded
     --delegation <LEVEL> GSS-API delegation permission
     --digest        Use HTTP Digest Authentication
 -q, --disable       Disable .curlrc
     --disable-eprt  Inhibit using EPRT or LPRT
     --disable-epsv  Inhibit using EPSV
     --disallow-username-in-url Disallow username in url
     --dns-interface <interface> Interface to use for DNS requests
     --dns-ipv4-addr <address> IPv4 address to use for DNS requests
     --dns-ipv6-addr <address> IPv6 address to use for DNS requests
     --dns-servers <addresses> DNS server addrs to use
     --doh-url <URL> Resolve host names over DOH
 -D, --dump-header <filename> Write the received headers to <filename>
     --egd-file <file> EGD socket path for random data
     --engine <name> Crypto engine to use
     --etag-save <file> Get an ETag from response header and save it to a FILE
     --etag-compare <file> Get an ETag from a file and send a conditional request
     --expect100-timeout <seconds> How long to wait for 100-continue
 -f, --fail          Fail silently (no output at all) on HTTP errors
     --fail-early    Fail on first transfer error, do not continue
     --false-start   Enable TLS False Start
 -F, --form <name=content> Specify multipart MIME data
     --form-string <name=string> Specify multipart MIME data
     --ftp-account <data> Account data string
     --ftp-alternative-to-user <command> String to replace USER [name]
     --ftp-create-dirs Create the remote dirs if not present
     --ftp-method <method> Control CWD usage
     --ftp-pasv      Use PASV/EPSV instead of PORT
 -P, --ftp-port <address> Use PORT instead of PASV
     --ftp-pret      Send PRET before PASV
     --ftp-skip-pasv-ip Skip the IP address for PASV
     --ftp-ssl-ccc   Send CCC after authenticating
     --ftp-ssl-ccc-mode <active/passive> Set CCC mode
     --ftp-ssl-control Require SSL/TLS for FTP login, clear for transfer
 -G, --get           Put the post data in the URL and use GET
 -g, --globoff       Disable URL sequences and ranges using {} and []
     --happy-eyeballs-timeout-ms <milliseconds> How long to wait in milliseconds for IPv6 before trying IPv4
     --haproxy-protocol Send HAProxy PROXY protocol v1 header
 -I, --head          Show document info only
 -H, --header <header/@file> Pass custom header(s) to server
 -h, --help          This help text
     --hostpubmd5 <md5> Acceptable MD5 hash of the host public key
     --http0.9       Allow HTTP 0.9 responses
 -0, --http1.0       Use HTTP 1.0
     --http1.1       Use HTTP 1.1
     --http2         Use HTTP 2
     --http2-prior-knowledge Use HTTP 2 without HTTP/1.1 Upgrade
     --http3         Use HTTP v3
     --ignore-content-length Ignore the size of the remote resource
 -i, --include       Include protocol response headers in the output
 -k, --insecure      Allow insecure server connections when using SSL
     --interface <name> Use network INTERFACE (or address)
 -4, --ipv4          Resolve names to IPv4 addresses
 -6, --ipv6          Resolve names to IPv6 addresses
 -j, --junk-session-cookies Ignore session cookies read from file
     --keepalive-time <seconds> Interval time for keepalive probes
     --key <key>     Private key file name
     --key-type <type> Private key file type (DER/PEM/ENG)
     --krb <level>   Enable Kerberos with security <level>
     --libcurl <file> Dump libcurl equivalent code of this command line
     --limit-rate <speed> Limit transfer speed to RATE
 -l, --list-only     List only mode
     --local-port <num/range> Force use of RANGE for local port numbers
 -L, --location      Follow redirects
     --location-trusted Like --location, and send auth to other hosts
     --login-options <options> Server login options
     --mail-auth <address> Originator address of the original email
     --mail-from <address> Mail from this address
     --mail-rcpt <address> Mail to this address
 -M, --manual        Display the full manual
     --max-filesize <bytes> Maximum file size to download
     --max-redirs <num> Maximum number of redirects allowed
 -m, --max-time <seconds> Maximum time allowed for the transfer
     --metalink      Process given URLs as metalink XML file
     --negotiate     Use HTTP Negotiate (SPNEGO) authentication
 -n, --netrc         Must read .netrc for user name and password
     --netrc-file <filename> Specify FILE for netrc
     --netrc-optional Use either .netrc or URL
 -:, --next          Make next URL use its separate set of options
     --no-alpn       Disable the ALPN TLS extension
 -N, --no-buffer     Disable buffering of the output stream
     --no-keepalive  Disable TCP keepalive on the connection
     --no-npn        Disable the NPN TLS extension
     --no-progress-meter Do not show the progress meter
     --no-sessionid  Disable SSL session-ID reusing
     --noproxy <no-proxy-list> List of hosts which do not use proxy
     --ntlm          Use HTTP NTLM authentication
     --ntlm-wb       Use HTTP NTLM authentication with winbind
     --oauth2-bearer <token> OAuth 2 Bearer Token
 -o, --output <file> Write to file instead of stdout
 -Z, --parallel      Perform transfers in parallel
     --parallel-immediate Do not wait for multiplexing (with --parallel)
     --parallel-max  Maximum concurrency for parallel transfers
     --pass <phrase> Pass phrase for the private key
     --path-as-is    Do not squash .. sequences in URL path
     --pinnedpubkey <hashes> FILE/HASHES Public key to verify peer against
     --post301       Do not switch to GET after following a 301
     --post302       Do not switch to GET after following a 302
     --post303       Do not switch to GET after following a 303
     --preproxy [protocol://]host[:port] Use this proxy first
 -#, --progress-bar  Display transfer progress as a bar
     --proto <protocols> Enable/disable PROTOCOLS
     --proto-default <protocol> Use PROTOCOL for any URL missing a scheme
     --proto-redir <protocols> Enable/disable PROTOCOLS on redirect
 -x, --proxy [protocol://]host[:port] Use this proxy
     --proxy-anyauth Pick any proxy authentication method
     --proxy-basic   Use Basic authentication on the proxy
     --proxy-cacert <file> CA certificate to verify peer against for proxy
     --proxy-capath <dir> CA directory to verify peer against for proxy
     --proxy-cert <cert[:passwd]> Set client certificate for proxy
     --proxy-cert-type <type> Client certificate type for HTTPS proxy
     --proxy-ciphers <list> SSL ciphers to use for proxy
     --proxy-crlfile <file> Set a CRL list for proxy
     --proxy-digest  Use Digest authentication on the proxy
     --proxy-header <header/@file> Pass custom header(s) to proxy
     --proxy-insecure Do HTTPS proxy connections without verifying the proxy
     --proxy-key <key> Private key for HTTPS proxy
     --proxy-key-type <type> Private key file type for proxy
     --proxy-negotiate Use HTTP Negotiate (SPNEGO) authentication on the proxy
     --proxy-ntlm    Use NTLM authentication on the proxy
     --proxy-pass <phrase> Pass phrase for the private key for HTTPS proxy
     --proxy-pinnedpubkey <hashes> FILE/HASHES public key to verify proxy with
     --proxy-service-name <name> SPNEGO proxy service name
     --proxy-ssl-allow-beast Allow security flaw for interop for HTTPS proxy
     --proxy-tls13-ciphers <list> TLS 1.3 ciphersuites for proxy (OpenSSL)
     --proxy-tlsauthtype <type> TLS authentication type for HTTPS proxy
     --proxy-tlspassword <string> TLS password for HTTPS proxy
     --proxy-tlsuser <name> TLS username for HTTPS proxy
     --proxy-tlsv1   Use TLSv1 for HTTPS proxy
 -U, --proxy-user <user:password> Proxy user and password
     --proxy1.0 <host[:port]> Use HTTP/1.0 proxy on given port
 -p, --proxytunnel   Operate through an HTTP proxy tunnel (using CONNECT)
     --pubkey <key>  SSH Public key file name
 -Q, --quote         Send command(s) to server before transfer
     --random-file <file> File for reading random data from
 -r, --range <range> Retrieve only the bytes within RANGE
     --raw           Do HTTP "raw"; no transfer decoding
 -e, --referer <URL> Referrer URL
 -J, --remote-header-name Use the header-provided filename
 -O, --remote-name   Write output to a file named as the remote file
     --remote-name-all Use the remote file name for all URLs
 -R, --remote-time   Set the remote file's time on the local output
 -X, --request <command> Specify request command to use
     --request-target Specify the target for this request
     --resolve <host:port:address[,address]...> Resolve the host+port to this address
     --retry <num>   Retry request if transient problems occur
     --retry-connrefused Retry on connection refused (use with --retry)
     --retry-delay <seconds> Wait time between retries
     --retry-max-time <seconds> Retry only within this period
     --sasl-authzid <identity>  Use this identity to act as during SASL PLAIN authentication
     --sasl-ir       Enable initial response in SASL authentication
     --service-name <name> SPNEGO service name
 -S, --show-error    Show error even when -s is used
 -s, --silent        Silent mode
     --socks4 <host[:port]> SOCKS4 proxy on given host + port
     --socks4a <host[:port]> SOCKS4a proxy on given host + port
     --socks5 <host[:port]> SOCKS5 proxy on given host + port
     --socks5-basic  Enable username/password auth for SOCKS5 proxies
     --socks5-gssapi Enable GSS-API auth for SOCKS5 proxies
     --socks5-gssapi-nec Compatibility with NEC SOCKS5 server
     --socks5-gssapi-service <name> SOCKS5 proxy service name for GSS-API
     --socks5-hostname <host[:port]> SOCKS5 proxy, pass host name to proxy
 -Y, --speed-limit <speed> Stop transfers slower than this
 -y, --speed-time <seconds> Trigger 'speed-limit' abort after this time
     --ssl           Try SSL/TLS
     --ssl-allow-beast Allow security flaw to improve interop
     --ssl-no-revoke Disable cert revocation checks (Schannel)
     --ssl-reqd      Require SSL/TLS
 -2, --sslv2         Use SSLv2
 -3, --sslv3         Use SSLv3
     --stderr        Where to redirect stderr
     --styled-output Enable styled output for HTTP headers
     --suppress-connect-headers Suppress proxy CONNECT response headers
     --tcp-fastopen  Use TCP Fast Open
     --tcp-nodelay   Use the TCP_NODELAY option
 -t, --telnet-option <opt=val> Set telnet option
     --tftp-blksize <value> Set TFTP BLKSIZE option
     --tftp-no-options Do not send any TFTP options
 -z, --time-cond <time> Transfer based on a time condition
     --tls-max <VERSION> Set maximum allowed TLS version
     --tls13-ciphers <list> TLS 1.3 ciphersuites (OpenSSL)
     --tlsauthtype <type> TLS authentication type
     --tlspassword   TLS password
     --tlsuser <name> TLS user name
 -1, --tlsv1         Use TLSv1.0 or greater
     --tlsv1.0       Use TLSv1.0 or greater
     --tlsv1.1       Use TLSv1.1 or greater
     --tlsv1.2       Use TLSv1.2 or greater
     --tlsv1.3       Use TLSv1.3 or greater
     --tr-encoding   Request compressed transfer encoding
     --trace <file>  Write a debug trace to FILE
     --trace-ascii <file> Like --trace, but without hex output
     --trace-time    Add time stamps to trace/verbose output
     --unix-socket <path> Connect through this Unix domain socket
 -T, --upload-file <file> Transfer local FILE to destination
     --url <url>     URL to work with
 -B, --use-ascii     Use ASCII/text transfer
 -u, --user <user:password> Server user and password
 -A, --user-agent <name> Send User-Agent <name> to server
 -v, --verbose       Make the operation more talkative
 -V, --version       Show version number and quit
 -w, --write-out <format> Use output FORMAT after completion
     --xattr         Store metadata in extended file attributes
kali@kali:~$
迷茫的人生,需要不断努力,才能看清远方模糊的志向!
原文地址:https://www.cnblogs.com/autopwn/p/14820783.html