Convert unix time back to human-readable format | Applications may store their time in the unix time format. To convert this back into a format that we can understand, we will use the date utility. | Leave out the last part to see the long time format |
Format output of mount command | The mount command output can be messy, as it shows a lot of lines and fields. The goal is gain a nicely formatted table of this output. | |
Measure TCP handshake and SSL exchange time | Perform a test of how much time it takes to perform both the TCP handshake and SSL exchange. The longer it takes, the slower the experience is for the guest connecting to the webserver. | |
Monitor directory for file changes | Perform watching on a directory and show any changes to the directories or files, until we cancel it. | Press CTRL+C to stop |
Ping sweep with Nmap | Perform a ping sweep with the Nmap utility. | |
Remove empty directories | Some processes leave a lot of empty directories around. | Use -print instead of -delete, to first show what has been found |
Retry Postfix mail queue delivery | Perform a flush command on the Postfix mail queue, that tells it to forcefully retry sending all queued emails. | |
Run only Lynis tests from one group | While applying system hardening, you may want to perform a quick check if your changes are correct. We tell Lynis just to perform tests from a single group. | |
Show available Nmap scripts | Display all available Nmap script file (NSE) on the system. | |
Show current unix time | Display the time in the unix time format (seconds counted from 1970-01-01). | |
Show processes with most CPU usage | Find the Linux processes that consume the most CPU time. | |
Simulate latency on network connection | For testing purposes, we may want to add latency to an interface. This way we could simulate how an application would respond to the extra delay. | |
Using Nmap to display only the hosts with a specific port opened | Using the grep function of Nmap we can filter out only the hosts that have a particular port opened while ignoring the others. | |
WordPress vulnerability scan with WPScan | Perform a vulnerability scan of a WordPress installation and enumerate plugins | |