1
0
Fork 0
mirror of https://github.com/tldr-pages/tldr.git synced 2024-10-28 09:19:47 +01:00

Compare commits

...

6 commits

Author SHA1 Message Date
Sebastiaan Speck
d9cf4dbaba
Merge f759bc94b1 into 9adede99be 2024-10-28 06:41:47 +01:00
Juri Dispan
9adede99be
nxc-rdp: add page (#14384) 2024-10-28 06:40:59 +01:00
Juri Dispan
13dc1d169d
nxc-mssql: add page (#14385) 2024-10-28 06:40:45 +01:00
Lena
9574cfde6a
ntpctl: add page (#14382) 2024-10-27 20:47:14 -07:00
Sebastiaan Speck
f759bc94b1 reg-flags: delete removed commands 2024-10-26 17:19:56 +02:00
Sebastiaan Speck
73eb9527c4 reg-flags: delete removed commands 2024-10-26 17:19:19 +02:00
7 changed files with 70 additions and 38 deletions

View file

@ -18,7 +18,7 @@
- Bekijk de documentatie voor het zoeken, bekijken en vergelijken van sleutels:
`tldr reg {{compare|flags|query}}`
`tldr reg {{compare|query}}`
- Bekijk de documentatie voor het exporteren en importeren van registry sleutels zonder de eigenaar en ACLs te bewaren:

View file

@ -1,20 +0,0 @@
# reg flags
> 显示或设置注册表键的标志。
> 更多信息:<https://learn.microsoft.com/windows-server/administration/windows-commands/reg-flags>.
- 显示当前指定键的标志:
`reg flags {{键名}} query`
- 显示帮助和可用的标志类型:
`reg flags /?`
- 为特定键设置指定以空格分隔的标志,并取消设置未提及的标志:
`reg flags {{键名}} set {{标志 1 标志 2 ..}}`
- 为指定的键和其子键设置标志:
`reg flags {{键名}} set {{标志}} /s`

20
pages/common/ntpctl.md Normal file
View file

@ -0,0 +1,20 @@
# ntpctl
> Display information about the running instance of OpenNTPD.
> More information: <https://man.openbsd.org/ntpctl>.
- Show all data:
`ntpctl -s {{a|all}}`
- Show information about each peer:
`ntpctl -s {{p|peers}}`
- Show the status of peers and sensors, and whether the system clock is synced:
`ntpctl -s {{s|status}}`
- Show information about each sensor:
`ntpctl -s {{S|Sensors}}`

28
pages/common/nxc-mssql.md Normal file
View file

@ -0,0 +1,28 @@
# nxc mssql
> Pentest and exploit Microsoft SQL servers.
> More information: <https://www.netexec.wiki/mssql-protocol>.
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
`nxc mssql {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
- Execute the specified SQL [q]uery on the target server:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --query '{{SELECT * FROM sys.databases;}}'`
- Execute the specified shell command on the target server through MSSQL:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} -x {{whoami}}`
- Execute the specified PowerShell command on the target server through MSSQL without retrieving output:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} -X {{whoami}} --no-output`
- Download a remote file from the target server and store it in the specified location:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --get-file {{C:\path\to\remote_file}} {{path/to/local_file}}`
- Upload a local file to the specified location on the target server:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --put-file {{path/to/local_file}} {{C:\path\to\remote_file}}`

20
pages/common/nxc-rdp.md Normal file
View file

@ -0,0 +1,20 @@
# nxc rdp
> Pentest and exploit RDP servers.
> More information: <https://www.netexec.wiki/rdp-protocol>.
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
`nxc rdp {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
- Take a screenshot after waiting the for specified number of seconds:
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --screenshot --screentime {{10}}`
- Take a screenshot in the specified resolution:
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --screenshot --res {{1024x768}}`
- Take a screenshot of the RDP login prompt if Network Level Authentication is disabled:
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --nla-screenshot`

View file

@ -1,16 +0,0 @@
# reg flags
> Display or set flags on registry keys.
> More information: <https://learn.microsoft.com/windows-server/administration/windows-commands/reg-flags>.
- Display current flags for a specific key:
`reg flags {{key_name}} query`
- Set one or more flags, and unset unmentioned flags, for a specific key:
`reg flags {{key_name}} set {{flag_name1 flag_name2 ...}}`
- Set one or more flags for a specific key and its [s]ubkeys:
`reg flags {{key_name}} set {{flag_name1 flag_name2 ...}} /s`

View file

@ -18,7 +18,7 @@
- View documentation for searching, viewing, and comparing keys:
`tldr reg {{compare|flags|query}}`
`tldr reg {{compare|query}}`
- View documentation for exporting and importing registry keys not preserving the key ownerships and ACLs: