一些常用的命令的linux记录 _ 2025

通过终端获取已连接接入点的密码

nmcli device wifi show-password

 

查看某个程序 所有 正在监听的 端口

ip-172-26-11-16:/etc/apache2/sites-enabled# sudo netstat -tlnp | grep apache2
tcp6       0      0 :::80                   :::*                    LISTEN      1415336/apache2 

root@ip-172-26-11-16:/etc/apache2/sites-enabled# lsof -i -P -n | grep apache
apache2 1415336 root 4u IPv6 5537848 0t0 TCP *:80 (LISTEN)
apache2 1415340 www-data 4u IPv6 5537848 0t0 TCP *:80 (LISTEN)
apache2 1415484 www-data 4u IPv6 5537848 0t0 TCP *:80 (LISTEN)
apache2 1416612 www-data 4u IPv6 5537848 0t0 TCP *:80 (LISTEN)
apache2 1416619 www-data 4u IPv6 5537848 0t0 TCP *:80 (LISTEN)
apache2 1416619 www-data 11u IPv6 5565065 0t0 TCP 172.26.11.16:80->182.136.225.194:4199 (ESTABLISHED)
apache2 1419265 www-data 4u IPv6 5537848 0t0 TCP *:80 (LISTEN)
apache2 1419347 www-data 4u IPv6 5537848 0t0 TCP *:80 (LISTEN)
apache2 1419495 www-data 4u IPv6 5537848 0t0 TCP *:80 (LISTEN)
apache2 1419496 www-data 4u IPv6 5537848 0t0 TCP *:80 (LISTEN)
apache2 1419627 www-data 4u IPv6 5537848 0t0 TCP *:80 (LISTEN)
apache2 1419958 www-data 4u IPv6 5537848 0t0 TCP *:80 (LISTEN)


 144 chown -R www-data:www-data /var/www/html/wordpress/ 
145 chmod -R 755 /var/www/html/wordpress/ 
146 chown -R www-data:www-data /var/www/html/wordpress/wp-content/uploads/ 
 99 apt install php php-mysql 
100 systemctl status apache2 
  96 systemctl status apache2 
97 apachectl configtest
 93 apt autoremove php php-mysql


 66 sudo fallocate -l 4G /swapfile 
67 sudo chmod 600 /swapfile 
68 sudo mkswap /swapfile
69 sudo swapon /swapfile 
70 echo '/swapfile none swap sw 0 0' | sudo tee -a /etc/fstab
71 sudo sysctl vm.swappiness=10

 56 ~/.acme.sh/acme.sh --issue -d e.callen.app --standalone
57 cat /root/.acme.sh/e.callen.app_ecc/e.callen.app.key
58 cat /root/.acme.sh/e.callen.app_ecc/fullchain.cer
 17 ~/.acme.sh/acme.sh --issue -d callen.app --standalone
18 ~/.acme.sh/acme.sh --set-default-ca --server letsencrypt
19 ~/.acme.sh/acme.sh --issue -d callen.app --standalone

 

快速过滤你想要的文件....

tree -NCfhl | grep -i iptables

ubuntu 使用 key的配置文件....

   sudo vim /etc/udev/rules.d/99-yubikey.rules
   sudo usermod -aG plugdev calleng

# 重新加载配置文件
   sudo udevadm control --reload-rules
   sudo udevadm trigger

# 检测是否ok
  lsusb | grep -i yubikey
  ls -l /dev/hidraw*

  sudo dmesg | grep -i yubikey | tail -n 20
  sudo vim  /etc/udev/rules.d/99-yubikey.rules 
  dpkg -s libu2f-udev
  sudo apt install libu2f-udev
  sudo rm -rf   /etc/udev/rules.d/99-yubikey.rules 

# Go to https://github.com/Yubico/libfido2/blob/main/udev/70-u2f.rules 
# and download or create a copy of the file named 70-u2f.rules 
# into the Linux directory: /etc/udev/rules.d/.
  sudo '/home/calleng/下载/70-u2f.rules'     /etc/udev/rules.d/99-yubikey.rules 
   sudo mv  '/home/calleng/下载/70-u2f.rules'     /etc/udev/rules.d/99-yubikey.rules 
   udevadm --version
   sudo udevadm control --reload-rules
   sudo udevadm trigger
   ls -l /dev/hidraw*
   lsusb | grep -i "Yubico"
#  开放 snap的 keepass 访问
   sudo snap connect keepassxc:raw-usb
   sudo snap connect keepassxc:hardware-observe

# https://support.yubico.com/hc/en-us/articles/360013708900-Using-Your-YubiKey-with-Linux

 

查找所有的特定的 url 的 sql命令

DELIMITER $$

CREATE PROCEDURE Search_Global(IN search_text VARCHAR(255))
BEGIN
    DECLARE done INT DEFAULT FALSE;
    DECLARE tbl_name VARCHAR(64);
    DECLARE col_name VARCHAR(64);
    DECLARE cur CURSOR FOR 
        SELECT TABLE_NAME, COLUMN_NAME 
        FROM INFORMATION_SCHEMA.COLUMNS 
        WHERE TABLE_SCHEMA = DATABASE() 
        AND DATA_TYPE IN ('text', 'longtext', 'varchar', 'mediumtext');
    
    DECLARE CONTINUE HANDLER FOR NOT FOUND SET done = TRUE;

    DROP TEMPORARY TABLE IF EXISTS search_results;
    CREATE TEMPORARY TABLE search_results (
        table_name VARCHAR(64),
        column_name VARCHAR(64),
        match_value TEXT
    );

    OPEN cur;
    read_loop: LOOP
        FETCH cur INTO tbl_name, col_name;
        IF done THEN
            LEAVE read_loop;
        END IF;
        SET @sql = CONCAT('INSERT INTO search_results (table_name, column_name, match_value) ',
                          'SELECT \'', tbl_name, '\', \'', col_name, '\', `', col_name, '` ',
                          'FROM `', tbl_name, '` WHERE `', col_name, '` LIKE \'%', search_text, '%\';');
        PREPARE stmt FROM @sql;
        EXECUTE stmt;
        DEALLOCATE PREPARE stmt;
    END LOOP;
    CLOSE cur;

    SELECT * FROM search_results;
END $$

DELIMITER ;

CALL Search_Global('https://e.callen.app/wp-');

查找并替换的sql命令, 所有的特定url

DELIMITER $$

CREATE PROCEDURE Replace_Global(IN search_text VARCHAR(255), IN replace_text VARCHAR(255))
BEGIN
    DECLARE done INT DEFAULT FALSE;
    DECLARE tbl_name VARCHAR(64);
    DECLARE col_name VARCHAR(64);
    DECLARE cur CURSOR FOR 
        SELECT TABLE_NAME, COLUMN_NAME 
        FROM INFORMATION_SCHEMA.COLUMNS 
        WHERE TABLE_SCHEMA = DATABASE() 
        AND DATA_TYPE IN ('text', 'longtext', 'varchar', 'mediumtext');
    
    DECLARE CONTINUE HANDLER FOR NOT FOUND SET done = TRUE;

    OPEN cur;
    read_loop: LOOP
        FETCH cur INTO tbl_name, col_name;
        IF done THEN
            LEAVE read_loop;
        END IF;
        SET @sql = CONCAT('UPDATE `', tbl_name, '` SET `', col_name, '` = REPLACE(`', col_name, '`, \'', search_text, '\', \'', replace_text, '\') ',
                          'WHERE `', col_name, '` LIKE \'%', search_text, '%\';');
        PREPARE stmt FROM @sql;
        EXECUTE stmt;
        DEALLOCATE PREPARE stmt;
    END LOOP;
    
    CLOSE cur;
END $$

DELIMITER ;

CALL Replace_Global('//demo.wpcom.cn/sage/wp-content/uploads/sites/15/', '//e.callen.app:9000/wp-content/uploads/');

下载 youtu 的视频

 2021  sudo apt install -y ffmpeg
 2022  ffmpeg -encoders | grep nvenc
 2023  ffmpeg -decoders | grep cuvid
 2024  yt-dlp --cookies  "/home/calleng/下载/www.youtube.com_cookies.txt"  "https://www.youtube.com/watch?v=xmtDP41JYy0"
 2025  yt-dlp --cookies "/home/calleng/下载/www.youtube.com_cookies.txt" -o "%(id)s.%(ext)s" "https://www.youtube.com/watch?v=xmtDP41JYy0"
 2026  ls
 2027  ls -alh
 2028  pwd
 2029  history
(f1613) calleng@wd:~/PycharmProjects1-py390/Project_6T/wenjianbao$