Windows, Linux, and Active Directory CTF Notes
search
Ctrlk
  • Table of Content
  • Word of Wisdom
  • Enumerationchevron-right
  • Active Directorychevron-right
  • Windows Privchevron-right
  • Linux Privchevron-right
  • Credential Accesschevron-right
  • Pivoting / Networkchevron-right
  • File Transferchevron-right
  • Web Attackschevron-right
  • Database Attackschevron-right
  • Metasploitchevron-right
  • File Enum & Huntingchevron-right
  • Unix Commandschevron-right
    • awk and sed
    • grep, cut, list size, and sort
    • archive, compress, and extract
  • Code Analysischevron-right
  • Reverse Shellchevron-right
  • Remote Access & Lateral Movement
  • RCE Collectionchevron-right
  • Compilingchevron-right
  • Interactive Shell
  • Reverse Shell
  • Post Exploitationchevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

Unix Commands

awk and sedchevron-rightgrep, cut, list size, and sortchevron-rightarchive, compress, and extractchevron-right
PreviousBinary/Image Analysischevron-leftNextawk and sedchevron-right