mirror of
https://github.com/tldr-pages/tldr.git
synced 2024-10-28 09:19:47 +01:00
Compare commits
6 commits
bbd29bd845
...
d9cf4dbaba
Author | SHA1 | Date | |
---|---|---|---|
|
d9cf4dbaba | ||
|
9adede99be | ||
|
13dc1d169d | ||
|
9574cfde6a | ||
|
f759bc94b1 | ||
|
73eb9527c4 |
7 changed files with 70 additions and 38 deletions
|
@ -18,7 +18,7 @@
|
|||
|
||||
- Bekijk de documentatie voor het zoeken, bekijken en vergelijken van sleutels:
|
||||
|
||||
`tldr reg {{compare|flags|query}}`
|
||||
`tldr reg {{compare|query}}`
|
||||
|
||||
- Bekijk de documentatie voor het exporteren en importeren van registry sleutels zonder de eigenaar en ACLs te bewaren:
|
||||
|
||||
|
|
|
@ -1,20 +0,0 @@
|
|||
# reg flags
|
||||
|
||||
> 显示或设置注册表键的标志。
|
||||
> 更多信息:<https://learn.microsoft.com/windows-server/administration/windows-commands/reg-flags>.
|
||||
|
||||
- 显示当前指定键的标志:
|
||||
|
||||
`reg flags {{键名}} query`
|
||||
|
||||
- 显示帮助和可用的标志类型:
|
||||
|
||||
`reg flags /?`
|
||||
|
||||
- 为特定键设置指定以空格分隔的标志,并取消设置未提及的标志:
|
||||
|
||||
`reg flags {{键名}} set {{标志 1 标志 2 ..}}`
|
||||
|
||||
- 为指定的键和其子键设置标志:
|
||||
|
||||
`reg flags {{键名}} set {{标志}} /s`
|
20
pages/common/ntpctl.md
Normal file
20
pages/common/ntpctl.md
Normal file
|
@ -0,0 +1,20 @@
|
|||
# ntpctl
|
||||
|
||||
> Display information about the running instance of OpenNTPD.
|
||||
> More information: <https://man.openbsd.org/ntpctl>.
|
||||
|
||||
- Show all data:
|
||||
|
||||
`ntpctl -s {{a|all}}`
|
||||
|
||||
- Show information about each peer:
|
||||
|
||||
`ntpctl -s {{p|peers}}`
|
||||
|
||||
- Show the status of peers and sensors, and whether the system clock is synced:
|
||||
|
||||
`ntpctl -s {{s|status}}`
|
||||
|
||||
- Show information about each sensor:
|
||||
|
||||
`ntpctl -s {{S|Sensors}}`
|
28
pages/common/nxc-mssql.md
Normal file
28
pages/common/nxc-mssql.md
Normal file
|
@ -0,0 +1,28 @@
|
|||
# nxc mssql
|
||||
|
||||
> Pentest and exploit Microsoft SQL servers.
|
||||
> More information: <https://www.netexec.wiki/mssql-protocol>.
|
||||
|
||||
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
|
||||
|
||||
`nxc mssql {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
|
||||
|
||||
- Execute the specified SQL [q]uery on the target server:
|
||||
|
||||
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --query '{{SELECT * FROM sys.databases;}}'`
|
||||
|
||||
- Execute the specified shell command on the target server through MSSQL:
|
||||
|
||||
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} -x {{whoami}}`
|
||||
|
||||
- Execute the specified PowerShell command on the target server through MSSQL without retrieving output:
|
||||
|
||||
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} -X {{whoami}} --no-output`
|
||||
|
||||
- Download a remote file from the target server and store it in the specified location:
|
||||
|
||||
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --get-file {{C:\path\to\remote_file}} {{path/to/local_file}}`
|
||||
|
||||
- Upload a local file to the specified location on the target server:
|
||||
|
||||
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --put-file {{path/to/local_file}} {{C:\path\to\remote_file}}`
|
20
pages/common/nxc-rdp.md
Normal file
20
pages/common/nxc-rdp.md
Normal file
|
@ -0,0 +1,20 @@
|
|||
# nxc rdp
|
||||
|
||||
> Pentest and exploit RDP servers.
|
||||
> More information: <https://www.netexec.wiki/rdp-protocol>.
|
||||
|
||||
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
|
||||
|
||||
`nxc rdp {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
|
||||
|
||||
- Take a screenshot after waiting the for specified number of seconds:
|
||||
|
||||
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --screenshot --screentime {{10}}`
|
||||
|
||||
- Take a screenshot in the specified resolution:
|
||||
|
||||
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --screenshot --res {{1024x768}}`
|
||||
|
||||
- Take a screenshot of the RDP login prompt if Network Level Authentication is disabled:
|
||||
|
||||
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --nla-screenshot`
|
|
@ -1,16 +0,0 @@
|
|||
# reg flags
|
||||
|
||||
> Display or set flags on registry keys.
|
||||
> More information: <https://learn.microsoft.com/windows-server/administration/windows-commands/reg-flags>.
|
||||
|
||||
- Display current flags for a specific key:
|
||||
|
||||
`reg flags {{key_name}} query`
|
||||
|
||||
- Set one or more flags, and unset unmentioned flags, for a specific key:
|
||||
|
||||
`reg flags {{key_name}} set {{flag_name1 flag_name2 ...}}`
|
||||
|
||||
- Set one or more flags for a specific key and its [s]ubkeys:
|
||||
|
||||
`reg flags {{key_name}} set {{flag_name1 flag_name2 ...}} /s`
|
|
@ -18,7 +18,7 @@
|
|||
|
||||
- View documentation for searching, viewing, and comparing keys:
|
||||
|
||||
`tldr reg {{compare|flags|query}}`
|
||||
`tldr reg {{compare|query}}`
|
||||
|
||||
- View documentation for exporting and importing registry keys not preserving the key ownerships and ACLs:
|
||||
|
||||
|
|
Loading…
Reference in a new issue