From 20edb41842624c3535bb20f530e887e908c530a9 Mon Sep 17 00:00:00 2001 From: johannst Date: Fri, 30 Dec 2022 18:05:51 +0000 Subject: deploy: 07bb356630e019ec860bff7a69af819322cd8947 --- print.html | 29 +++++++++++++++++++++++------ 1 file changed, 23 insertions(+), 6 deletions(-) (limited to 'print.html') diff --git a/print.html b/print.html index 5d2fa48..1db1148 100644 --- a/print.html +++ b/print.html @@ -1493,6 +1493,23 @@ gpg --verify <file>.asc <file>
  • http://keyserver.ubuntu.com
  • hkps://pgp.mailbox.org
  • +

    Examples

    +

    List basic key information from file with long keyids

    +
    gpg --keyid-format 0xlong <key.asc>
    +
    +

    Extend expiring key

    +
    gpg --edit-key <key id>
    +
    +# By default we are on the primary key, can switch to sub key.
    +gpg> key 1
    +
    +# Update the expire date.
    +gpg> expire
    +
    +gpg> save
    +
    +# Update keyserver(s) and/or export new pub keyfile.
    +

    gdb(1)

    CLI

      gdb [opts] [prg [-c coredump | -p pid]]
    @@ -1668,7 +1685,7 @@ gpg --verify <file>.asc <file>
         # cmds
       end
     
    -

    Examples

    +

    Examples

    Automatically print next instr

    When ever the debugee stops automatically print the memory at the current instruction pointer ($rip x86) and format as instruction /i.

    @@ -1850,7 +1867,7 @@ gdb -ex 'target remote localhost:1234'
      > r2 -B <baddr> <exe>         # open <exe> mapped to addr <baddr>
       oob <addr>                    # reopen current file at <baddr>
     
    -

    Examples

    +

    Examples

    Patch file (alter bytes)

      > r2 [-w] <file>
       oo+           # re-open for write if -w was not passed
    @@ -2213,7 +2230,7 @@ digraph {
     -s states (UDP)
       Unbound, Idle
     
    -

    Examples

    +

    Examples

    File flags

    Show open files with file flags for process:

    lsof +fg -p <pid>
    @@ -2255,7 +2272,7 @@ digraph {
     
       (EXPR) .............. Group exprs
     
    -

    Examples

    +

    Examples

    Show all tcp IPv4 sockets connecting to port 443:

    ss -4 'dport 443'
     
    @@ -2337,7 +2354,7 @@ opts: trace=signal ............... trace signal related syscalls signal ..................... trace signals delivered to the process -

    Examples

    +

    Examples

    Trace open(2) & socket(2) syscalls for a running process + child processes:

    strace -f -e trace=open,socket -p <pid>
     
    @@ -3891,7 +3908,7 @@ tcp/udp/icmp Filter for protocol.

    Use and/or/not and () to build filter expressions.

    -

    Examples

    +

    Examples

    Capture packets from remote host

    # -k: Start capturing immediately.
     ssh <host> tcpdump -i <IF> -w - | sudo wireshark -k -i -
    -- 
    cgit v1.2.3