# Linux network tools
# Networking tools
- ping
- curl
- httpie
- wget: download files
- tc
- dig / nslookup
whois
: check domain registeredssh
: secure shellscp
: copy files (over ssh)rsync
: copy only changed files (over ssh)- ngrep: grep ur network
- tcpdump: show me all packets on port 80
- wireshark
- tshark
- tcpflow
- ifconfig: what is my IP address
- route: view for change the route table
ip
: replace ifconfig, route, ...- arp: see ARP table
- mitmproxy: spy on SSL connections ur programs r making
nmap
: scanning ports- zenmap: GUI for nmap
p0f
: identify OS of hosts connecting to you- openvpn: a VPN
- wireguard: newer VPN
- nc: netcat, make TCP connections manually
- socat: proxy a TCP socket to a unit domain socket ...
telnet
: like ssh but insecure- fpt / sftp: copy files
- netstat / ss /
lsof
/fuser
: what ports are servers using iptables
: setup firewalls & NAT- nftables: new version of iptables
- hping 3: construct any TCP packet u want
- traceroute / mtr: what servers are on the way to that server
- tcptraceroute: use tcp packets instead of
icmp
totraceroute
- ethtool
- iw / iwconfig
- sysctl
openssl
: do literally anything with SSL certificatesstunnel
: make a SSL proxy for an insecure server- iptraf / nethogs / iftap / ntap
- ab / nload / iperf: benchmarking tools
- ipcalc
- nsenter: enter a container process's network namespace
# Find & kill Process Id
Way 1: Using fuser
fuser -k 80/tcp
-k
: kill
Way 2: Using fuser
pid=$(lsof -t -i :80) && kill $pid
-t
: TCP connections-i
: filter
It's recommended to use the first method (fuser -k 80/tcp
) as it directly terminates the process. The second method might require additional parsing depending on the output of lsof
.