个人常用工具及命令脚本:

1、DDOS攻击工具:
trafgen:
https://www.cnblogs.com/lsgxeva/p/9188556.html
https://github.com/zzygithub/ddos-dos-tools
https://github.com/trafgen/DPDK-Suricata_3.0
https://github.com/trafgen/simpleNids
2、性能测试工具:
思科TRex:
https://tech-zh.netlify.app/articles/zh-cn510086/
3、Bash漏洞利用工具:
https://www.secpulse.com/archives/917.html
4、监控工具:
https://www.jianshu.com/p/500db0de28b5
5、CVE工具:
https://www.tooleyes.com/tag/CVE/
6、解压缩命令:
https://www.linuxprobe.com/linux-tar.html

# Centos7安装python3:https://www.huaweicloud.com/articles/0b72bf69bb70f1c89ef1872ce2c21560.html
yum install -y libpcap-devel
yum install -y gcc gcc-c++
yum install -y tcl tcl-devel
yum install -y libpcap libpcap-devel
yum -y groupinstall development
yum install -y zlib-devel bzip2-devel openssl-devel ncurses-devel sqlite-devel readline-devel tk-devel ibffi-devel
wget https://www.python.org/ftp/python/3.9.7/Python-3.9.7.tgz
tar -zxvf Python-3.9.7.tgz 
mkdir /usr/local/python3
mv Python-3.9.7 /usr/local/python3/
cd /usr/local/python3/
cd Python-3.9.7/
 ./configure --prefix=/usr/local/python3
make && make install
ln -s /usr/local/python3/bin/python3 /usr/bin/python3
ln -s /usr/local/python3/bin/pip3 /usr/bin/pip3
cd /etc/profile.d
echo 'export PATH=$PATH:/usr/local/python3/bin/' > python3.sh
python3

# ab安装:
yum -y install httpd-tools 

#安装hping3:
https://blog.csdn.net/rendong_yang/article/details/88943062
https://www.linuxprobe.com/linux-hping.html
https://tools.kali.org/information-gathering/hping3
https://wangchujiang.com/linux-command/c/hping3.html
https://blog.csdn.net/wuyou1995/article/details/105359014
yum install libpcap-devel tc-devel
yum install wget -y
wget http://www.hping.org/hping3-20051105.tar.gz
tar zxvf hping3-20051105.tar.gz
cd hping3-20051105
yum install -y libpcap-devel
yum install -y gcc gcc-c++
yum install -y tcl tcl-devel
vi bytesex.h
./configure
yum install -y libpcap libpcap-devel
make
find / -name bpf.h
ln -sf /usr/include/pcap-bpf.h /usr/include/net/bpf.h
vi Makefile.in 
make
make strip
make install
mkdir /usr/local/man
mkdir /usr/local/man/man8
mkdir install
hping3 -v

while :
do
	hping3 -2 -s 7788 -p 4153 -k -c 1 -d 5000 10.50.36.40
	hping3 -S -s 7789 -p 4154 -k -c 1 -d 4000 10.50.36.40
	hping3 -1 -d 4500 -c 1 10.50.36.40
sleep 5
done

# nmap安装:
https://www.cnblogs.com/freeweb/p/6903915.html

# vlan工具安装:
http://blog.sina.com.cn/s/blog_69c81c3e0102y6gq.html
yum -y install epel-release
yum -y install vconfig -y

#snmpwalk下载:
yum install net-snmp* -y


----------------------------------------------------------
mysql操作手册:
https://zhuanlan.zhihu.com/p/277889664
https://www.cnblogs.com/alibai/p/4038954.html
# 导出数据库
# mysqldump -u 用户名 -p 数据库名 > 导出的文件名	
mysqldump -u root -p mywaf > test_db.sql
# mysqldump -u 用户名 -p 数据库名 表名> 导出的文件名
mysqldump -u root -p mywaf alarms> test_users.sql

一对:追加:不能重复导入
# 表数据导出到文件中:
select * from alarms into outfile "test.txt";
# 表数据导入到文件中:
load data infile 'test.txt' into table 表 ;
# 清空数据表:
truncate table alarms;
# 导出数据到文件中
mysqldump -u root -p mywaf alarms> test.bak
# 导入数据到表文件中
source /data/mysql/mywaf/test.bak;
#去掉密码自动输入
mysqldump -u root  --password=mywaf mywaf alarms> test2.bak
#basi中启用日志:
/waf/system_service/basic_inspector/basic_inspector.conf 
	log 127.0.0.1 local3 info
	option httplog
	log global
	capture request header Host len 15
	capture request header Content-Type len 30
	capture request header Content-Length len 10
	log-format %ci:%cp/%b/%si:%sp\ %Tq/%Tw/%Tc/%Tr/%Tt\ %ST\ %U/%B\ %hr\ %{+Q}r
	
#syslog中添加路径:
/etc/syslog-ng/syslog-ng.conf:
	destination d_basc { file("/data/logs/basc.log"); };
	filter f_basc { facility(loacl3); };
	log { source(s_udp); filter(f_basc); destination(d_basc); };

# 重启basic:
/waf/system_service/basic_inspector/run
# 重启syslog:
syslog-ng -p /var/run/syslog-ng.pid

-----------****************************
#!/bin/bash
TOP_PATH=$(cd `dirname $0`; pwd) ; cd $TOP_PATH
echo "脚本正在执行,请耐心等待!"
rm -rf /data/tmp_wz
mkdir -p /data/tmp_wz/net/
mysqldump -u root --password=mywaf mywaf web_traffic                >/data/tmp_wz/web_traffic.sql
mysqldump -u root --password=mywaf mywaf web_traffics               >/data/tmp_wz/web_traffics.sql
mysqldump -u root --password=mywaf mywaf web_traffic_tops           >/data/tmp_wz/web_traffic_tops.sql
mysqldump -u root --password=mywaf mywaf web_traffic_index          >/data/tmp_wz/web_traffic_index.sql
mysqldump -u root --password=mywaf mywaf web_traffics_index         >/data/tmp_wz/web_traffics_index.sql
mysqldump -u root --password=mywaf mywaf historial_web_traffic_tops >/data/tmp_wz/historial_web_traffic_tops.sql
cp -af /data/net_traffic_* /data/tmp_wz/net/
find /data/access_input/ -type f | sed '$d' | xargs echo  | xargs tar zcvf /data/tmp_wz/access_input.tgz
sleep 3
tar zcvf /data/tmp_wz.tgz /data/tmp_wz/ --remove-files
echo "脚本执行完毕! 请将 /data/tmp_wz.tgz 下的文件夹拷贝出来,交给相关人员"
-*----------------------------***************************************
#!/usr/bin/bash
echo "脚本正在执行,请耐心等待!"
cd /root/
rm -rf wz
mkdir wz
mkdir wz/net
a="/data/mysql/mywaf/web_traffic.txt"
b="/data/mysql/mywaf/web_traffic_tops.txt"
c="/data/mysql/mywaf/web_traffics.txt"
rm -f $a
rm -f $b
rm -f $c
passwd=mywaf
/usr/bin/mysql -umywaf -p$passwd <<__EOF
use mywaf;
select * from web_traffic into outfile 'web_traffic.txt';
select * from web_traffic_tops into outfile 'web_traffic_tops.txt';
select * from web_traffics into outfile 'web_traffics.txt';
__EOF
mv $a /root/wz/
mv $b /root/wz/
mv $c /root/wz/
cp /data/net_traffic_* /root/wz/net/
tar -zcvf access_input.tar.gz /data/access_input/   # 解压命令:tar zxvf access_input.tar.gz
mv /data/access_input.tar.gz  /root/
mv /root/access_input.tar.gz /root/wz/
echo "脚本执行完毕! 请将/root/wz/下的文件夹拷贝出来,交给相关测试人员"
exit;
-----------------------------------------------------*******************

1、TCP TIME_WAIT:https://cloud.tencent.com/developer/article/1369410?from=article.detail.1752154
2、bind_tcp正向连接在实战中的应用:https://cloud.tencent.com/developer/article/1778292?from=article.detail.1369410
3、reverse_tcp反向连接在实战中的应用:https://cloud.tencent.com/developer/article/1806272?from=article.detail.1778292
3、我们为什么要禁用 THP:https://cloud.tencent.com/developer/article/1727260?from=article.detail.1759056
4、Linux 内核参数优化(for oracle):https://cloud.tencent.com/developer/article/1184190?from=information.detail.%E6%9B%B4%E6%94%B9linux%E5%86%85%E6%A0%B8%E7%89%88%E6%9C%AC%E5%8F%B7
5、Linux 系统运行速度太慢的关键原因,看看这篇:https://cloud.tencent.com/developer/article/1462864?from=article.detail.1511100
6、linux性能优化学习笔记-pidstat:https://cloud.tencent.com/developer/article/1463928?from=article.detail.1507511
#define ICMP_PAYLOAD_SIZE  (htons(ip_hdr(sb)->tot_len) \
                   - sizeof(struct iphdr) \
                   - sizeof(struct icmphdr))


//Cookie中不包含password,但其包含的uid及domain往往并非采用密码登录的用户,先将其排除
if(strstr(data,"Cookie") != NULL){
    data = strstr(data,"Cookie");    
    if(strstr(data,"\r\n")!= NULL) 
        data = strstr(data,"\r\n");  //匹配Cookie结尾处的回车换行\r\n
    else return;
}
https://cloud.tencent.com/developer/article/1541602?from=information.detail.linux%E6%9F%A5%E7%9C%8Barp%E7%BC%93%E5%AD%98%E8%A1%A8

https://blog.csdn.net/ddazz0621/article/details/84977358
https://blog.csdn.net/geekcome/category_786460_3.html
https://www.cnblogs.com/wanpengcoder/category/1691162.html?page=4
https://blog.csdn.net/u010246947/article/details/18220221
https://blog.csdn.net/sophisticated_/category_8236164.html
https://blog.csdn.net/hzj_001/article/details/104327771
https://www.cnblogs.com/wanpengcoder/category/1691162.html?page=4
https://zhuanlan.zhihu.com/p/372279088
https://github.com/beacer/notes/blob/master/kernel/data-receive.md
https://www.ucloud.cn/yun/9865.html
https://www.bbsmax.com/A/kmzLkRMEdG/
http://www.blogjava.net/jb2011/archive/2020/12/09/435744.html
https://jgsun.github.io/2019/01/21/linux-tcpdump/
https://www.ithothub.com/network/2020051913363160.html
https://www.zybuluo.com/myecho/note/1068383
https://colobu.com/2019/12/09/monitoring-tuning-linux-networking-stack-receiving-data/
https://www.jianshu.com/p/3b5cee1e88a2

C7重启卡死:
1.系统挂载错误
journalctl -xb
2.https://www.codeleading.com/article/3079298618/:
这个问题其实是systemd219这个版本的问题(查看systemd版本,请使用systemctl --version)。
由于systemd进程的判断比之前更加严格,如果某些进程不响应SIGTERM信号,可能会导致重启是挂死,该问题和业务进程对SIGTERM信号的处理有关。
3.
https://blog.csdn.net/weixin_33786077
https://blog.csdn.net/weixin_33786077/article/details/86269615?utm_medium=distribute.pc_relevant.none-task-blog-2%7Edefault%7EBlogCommendFromMachineLearnPai2%7Edefault-13.control&depth_1-utm_source=distribute.pc_relevant.none-task-blog-2%7Edefault%7EBlogCommendFromMachineLearnPai2%7Edefault-13.control
https://cloud.tencent.com/developer/article/1533529
https://blog.csdn.net/yaochuh/article/details/100577194?utm_medium=distribute.pc_relevant.none-task-blog-2%7Edefault%7EBlogCommendFromMachineLearnPai2%7Edefault-1.control&depth_1-utm_source=distribute.pc_relevant.none-task-blog-2%7Edefault%7EBlogCommendFromMachineLearnPai2%7Edefault-1.control
https://blog.csdn.net/davion_zhang/article/details/52233043
https://cloud.tencent.com/developer/article/1381198
 
http://blog.chinaunix.net/uid-7319742-id-2059659.html?_t=t
https://zhuanlan.zhihu.com/p/30791159
https://github.com/Urinx/SomeCodes/blob/master/Python/tcp_ip/README.md
https://segmentfault.com/a/1190000022954874
https://c4pr1c3.github.io/cuc-ns-ppt/chap0x05.md.html?print-pdf#/title-slide
http://www.cxyzjd.com/article/qq_38780085/79270421
http://walkerdu.com/2017/04/07/tcp-create-close-note/


https://www.freebuf.com/articles/system/205146.html:僵尸网络
https://blogs.360.cn/cate/%E7%97%85%E6%AF%92%E5%88%86%E6%9E%90?page=2: 僵尸网络
https://www.freebuf.com/articles/network/161286.html
https://www.cnblogs.com/zhongyehai/p/10619917.html
https://www.cnblogs.com/myblog-lyc/p/4176609.html
https://blog.csdn.net/whatday/article/details/103761081?utm_medium=distribute.pc_relevant.none-task-blog-2%7Edefault%7EBlogCommendFromBaidu%7Edefault-2.nonecase&depth_1-utm_source=distribute.pc_relevant.none-task-blog-2%7Edefault%7EBlogCommendFromBaidu%7Edefault-2.nonecase
https://blog.csdn.net/weixin_33881140/article/details/92767924?utm_medium=distribute.pc_relevant.none-task-blog-2%7Edefault%7EBlogCommendFromBaidu%7Edefault-19.nonecase&depth_1-utm_source=distribute.pc_relevant.none-task-blog-2%7Edefault%7EBlogCommendFromBaidu%7Edefault-19.nonecase
PyCryptoMiner加密货币挖矿软件及僵尸网络

垃圾邮件轰炸机:
https://www.skyju.cc/mailhzj.html#!

*************************************************************************
# 软中断解决方法按:
https://blog.csdn.net/yanyangtianzi/article/details/88351691
https://github.com/kargig/itop#readme
https://cloud.tencent.com/developer/article/1637681?ivk_sa=1024320u
# 开启/关闭多核cpu
https://zhuanlan.zhihu.com/p/361436253

systemctl status irqbalance
cat /proc/net/nf_conntrack |  awk '{print $7}' | cut -d, -f2 |sort |uniq -c |sort -n
watch -d -n 1 'cat /proc/softirqs'
grep -A 10 -i network /var/log/messages
grep s1p1 /proc/interrupts | awk '{print $1, $NF}'
cat /proc/irq/64/smp_affinity
cat /sys/class/net/eth0/queues/rx-0/rps_cpus
cat /sys/class/net/s1p2/queues/rx-0/rps_cpus
cat distribute
ls /sys/devices/system/cpu/
cat /sys/devices/system/cpu/cpu1
cat /sys/devices/system/cpu/cpu1/online
echo '0' > /sys/devices/system/cpu/cpu5/online
echo '1' > /sys/devices/system/cpu/cpu5/online
ip linst set down dev Protect3


https://www.cnblogs.com/lsgxeva/p/9188556.html


IOC_HEADER = "pdt_20210129!@3_"

def cal_ioc_hash(src_ip:str):
	ioc =IOC_HEADER + src_ip
	ioc_hash = hashlib.md5(ioc.encode('utf-8')).hexdigest()
	return ioc_hash[8:24]

--------------------SYSLOG服务器启用----------------------------------
$ModLoad imudp    # 接收udp信息
$UDPServerRun 514  #监听514服务进程

# Provides TCP syslog reception
#$ModLoad imtcp
$InputTCPServerRun 514   # 接收tcp信息

$template RemoteLogs,"/var/log/%HOSTNAME%/%PROGRAMNAME%.log"   #syslog日志存放界面
# 接收来自远程与本机的syslog日志信息
*.* ?RemoteLogs   
& ~
fromhost-ip, !isequal, "127.0.0.1"
?Remote
& ~


/etc/rsyslog.conf
开放514端口
firewall-cmd --add-port=514/tcp --permanent
firwall-cmd --reload
# 重启syslog
systemctl restart rsyslog
View Code
请尊重笔者的劳动成果哦,转载请说明出处哦
原文地址:https://www.cnblogs.com/gufengchen/p/15590213.html