企业案例
Posted yangjuncheng0826
tags:
篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了企业案例相关的知识,希望对你有一定的参考价值。
案例1 awk 的匹配过滤功能
[[email protected] ~]# awk ‘BEGIN{h[110]="lee";h[114]="xo";print h[110],h[114]}‘
lee xo
[[email protected] oldboy]# vim url.txt
[[email protected] oldboy]# awk -F "[/.]+" ‘{print $2}‘ url.txt (/+表示连续的斜线) ([/.]表示取出的是www.内容)
www
www
post
mp3
post
www
www
[[email protected] oldboy]# awk -F "[/.]+" ‘{h[$2]=h[$2]+1}END {print h["www"],h["post"],h["mp3"]}‘ url.txt (统计第二例每个字符串出现的次数)
4 2 1
[[email protected] oldboy]# awk -F "[/.]+" ‘{h[$2]=h[$2]+1}END {for(pol in h) print pol}‘ url.txt (显示变量里面的名称)
pol 表示变量 h 表示变量的名称
www
mp3
post
[[email protected] oldboy]# awk -F "[/.]+" ‘{h[$2]=h[$2]+1}END {for(pol in h) print pol,h[pol]}‘ url.txt (统计出现的次数)
www 4
mp3 1
post 2
企业案例2
统计secure.log中 每个破解你密码的ip的出现次数
[[email protected] files]# awk ‘/Failed password/{h[$(NF-3)]++}END{for(pol in h) print pol,h[pol]}‘ secure-20161219 |sort -rnk2|head
统计access.log 中 每个ip地址出现的次数
[[email protected] files]# awk ‘{h[$1]++}END{for(pol in h) print pol,h[pol]}‘ access.log |sort -rnk2 |head
Failed 是用户登陆失败,连续多次的登陆失败,就是在暴力破解密码。
/Failed/ 关键词查找
$ (NF-3) 表示倒数第四列
fa[$(NF-3)]++ 使用数组,对不同的ip分类累加
for(pol in fa) for循环 使用pol 变量,逐个的取出fa[$(NF-3)] 数组中的内容。
print pol,fa[pol] 显示数组的内容,以及pol的次数,即统计.
案例2 判断命令行传参个数是否等于2
[[email protected] scripts]# vim /server/scripts/arg.sh
#!/bin/bash
#
#
[ $# -eq 2 ] && echo "arg:" $#
[[email protected] scripts]# sh /server/scripts/arg.sh
[[email protected] scripts]# sh /server/scripts/arg.sh a b
arg: 2
[[email protected] scripts]# sh /server/scripts/arg.sh a b c d
案例3判断/oldboy目录是否存在不存在则创建
[ -d /oldboy ] || mkdir -p /oldboy
如果/root/oldboy.txt 存在则提示文件已存在
[[email protected] ~]# [ -f /root/oldboy.txt ] && echo file esists file esists
file esists file esists
案例4 优化Linux的启动项,只保留crond;sshd;network;sysstat,其它的都关闭
[[email protected] scripts]# chkconfig |egrep "crond|sshd|rsyslog|network|sysstat" (取出这5个开机要启动的服务名称)
crond 0:off 1:off 2:on 3:on 4:on 5:on 6:off
network 0:off 1:off 2:on 3:on 4:on 5:on 6:off
rsyslog 0:off 1:off 2:on 3:on 4:on 5:on 6:off
sshd 0:off 1:off 2:on 3:on 4:on 5:on 6:off
sysstat 0:off 1:on 2:on 3:on 4:on 5:on 6:off
第二步:
[email protected] scripts]# chkconfig |egrep "crond|sshd|rsyslog|network|sysstat" -v ( 排除这5个服务后,把别的其它的开机服务都显示出来)
[[email protected] scripts]# chkconfig |egrep "crond|sshd|rsyslog|network|sysstat" -v
abrt-ccpp 0:off 1:off 2:off 3:on 4:off 5:on 6:off
abrtd 0:off 1:off 2:off 3:on 4:off 5:on 6:off
acpid 0:off 1:off 2:on 3:on 4:on 5:on 6:off
atd 0:off 1:off 2:off 3:on 4:on 5:on 6:off
第三步:
[[email protected] scripts]# chkconfig |egrep "crond|sshd|rsyslog|network|sysstat" -v|awk ‘{print $1}‘ 取出开机启动的第一列服务名称
abrt-ccpp
abrtd
acpid
atd
auditd
blk-availability
cpuspeed
haldaemon
ip6tables
iptables
第四步
把 chkconfig |egrep "crond|sshd|rsyslog|network|sysstat" -v|awk ‘{print $1}‘ 放到for循环里面
[[email protected] scripts]# for i in $(chkconfig |egrep "crond|sshd|rsyslog|network|sysstat" -v|awk ‘{print $1}‘ )
> do
> echo chkconfig $i off
> done
chkconfig abrt-ccpp off
chkconfig abrtd off
chkconfig acpid off
chkconfig atd off
chkconfig auditd off
chkconfig blk-availability off
chkconfig cpuspeed off
chkconfig haldaemon off
chkconfig ip6tables off
chkconfig iptables off
chkconfig irqbalance off
chkconfig kdump off
chkconfig lvm2-monitor off
chkconfig mdmonitor off
chkconfig messagebus off
chkconfig netconsole off
chkconfig netfs off
chkconfig nfs-rdma off
chkconfig ntpd off
chkconfig ntpdate off
chkconfig postfix off
chkconfig psacct off
chkconfig quota_nld off
chkconfig rdisc off
chkconfig rdma off
chkconfig restorecond off
chkconfig rngd off
chkconfig saslauthd off
chkconfig smartd off
chkconfig svnserve off
chkconfig udev-post off
[[email protected] scripts]# vim bb.sh
#!/bin/bash
for i in $(chkconfig |egrep "crond|sshd|rsyslog|network|sysstat" -v|awk ‘{print $1}‘)
do
chkconfig $i off
done
[[email protected] scripts]# sh bb.sh
[[email protected] scripts]# chkconfig|grep 3:on
crond 0:off 1:off 2:on 3:on 4:on 5:on 6:off
network 0:off 1:off 2:on 3:on 4:on 5:on 6:off
rsyslog 0:off 1:off 2:on 3:on 4:on 5:on 6:off
sshd 0:off 1:off 2:on 3:on 4:on 5:on 6:off
sysstat 0:off 1:on 2:on 3:on 4:on 5:on 6:off
[[email protected] scripts]# sh -x bb.sh (-x 表示脚本的执行过程) +号表示脚本里面执行的命令 -号表示显示在屏幕上面
+ chkconfig cpuspeed off
+ for i in ‘$(chkconfig |egrep "crond|sshd|rsyslog|network|sysstat" -v|awk ‘‘‘{print $1}‘‘‘)‘
+ chkconfig haldaemon off
+ for i in ‘$(chkconfig |egrep "crond|sshd|rsyslog|network|sysstat" -v|awk ‘‘‘{print $1}‘‘‘)‘
思路就是往for循环的格式里面套
for i in $() <in后面可以写成 $()或者``反引号都行>
do
echo chkconfig $i off (执行关闭服务的名称的动作)
done
企业案例5 批量创建linux用户并设置随机密码
linux生成随机密码有很多方法,这里介绍两种,一种是内部系统变量($RANDOM),另一种是使用openssl。
内部系统变量($RANDOM)直接echo就可以获取到一组随机数:
# echo $RANDOM
30468
获取8位随机数:
#echo $RANDOM|md5sum |cut -c 1-8 (-c:仅显示行中指定范围的字符)
393c839b
使用openssl命令获取随机数:
# openssl rand -base64 8
qpIpWLYS6Yk=
获取8位随机数:
# openssl rand -base64 8|cut -c 1-8
GPHYu+MU
批量创建10个系统用户,并且设置随机数密码脚本为:
# cat useradd.sh
#!/bin/bash
for i in `seq -w 10`
do
pass=`echo $RANDOM|md5sum |cut -c 1-8` #使用随机数做密码的时候,一定要定义变量,否则生成的密码和最后记录的密码不统一
useradd user$i && echo $pass |passwd --stdin user$i
echo -e "user:user$i pass:$pass" >>/tmp/user.log
done
[[email protected] ~]# cat /etc/passwd
user1:x:1000:1000::/home/user1:/bin/bash
user2:x:1001:1000::/home/user2:/bin/bash
user3:x:1002:1000::/home/user3:/bin/bash
user4:x:1003:1000::/home/user4:/bin/bash
[[email protected] ~]# cat /etc/shadow
user1:$6$KETlofyM$xc64WO81G9c/8m9G4haAYsHd1jz5gALrcv.aBbJnMoaAf6NHac4PPBBiXxHtT.jBfz81dYb/C6GHfGg2XsMfl1:17857:0:99999:7:::
user2:$6$vAreFUg1$d7ndikXTXjHKKl/W1pJ7lnfmXxgH2nF/.MCsrrv5vGF8zNObsGOZtb4FC6wm9x/I9kywQ2GaiKvO16O1E8Wah.:17857:0:99999:7:::
user3:$6$rLPVSz3q$wD8SbTZP62zM0nTRZDkB09WtzizqEPR.jch3EJwCivI1LmnlIRTf.Pu0Z5zXo6rz2jiBaVtPANDe9FabkJ03/1:17857:0:99999:7:::
user4:$6$0IHJRla2$kXnAV.bkVBA7D3k
案例5 网络异常是的拍错命令
[[email protected] ~]# ping -c 3 www.baidu.com
PING www.a.shifen.com (220.181.111.37) 56(84) bytes of data.
64 bytes from 220.181.111.37: icmp_seq=1 ttl=128 time=7.87 ms
64 bytes from 220.181.111.37: icmp_seq=2 ttl=128 time=8.51 ms
64 bytes from 220.181.111.37: icmp_seq=3 ttl=128 time=8.50 ms
-- www.a.shifen.com ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2015ms (ping 了三次没有丢包)
rtt min/avg/max/mdev = 7.874/8.297/8.516/0.317 ms
[[email protected] ~]# ping -c 4 -i 3 223.5.5.5 (-c 表示4次数 -i 表示每隔3秒 -q 表示只显示结果不显示过程的参数)
PING 223.5.5.5 (223.5.5.5) 56(84) bytes of data.
64 bytes from 223.5.5.5: icmp_seq=2 ttl=128 time=65.1 ms
64 bytes from 223.5.5.5: icmp_seq=3 ttl=128 time=77.3 ms
64 bytes from 223.5.5.5: icmp_seq=4 ttl=128 time=82.5 ms
--- 223.5.5.5 ping statistics ---
4 packets transmitted, 3 received, 25% packet loss, time 12014ms
rtt min/avg/max/mdev = 65.183/75.022/82.522/7.269 ms
[[email protected] ~]# ping -c 4 -i 2 -q 223.5.5.5
PING 223.5.5.5 (223.5.5.5) 56(84) bytes of data.
--- 223.5.5.5 ping statistics ---
4 packets transmitted, 2 received, 50% packet loss, time 8015ms
rtt min/avg/max/mdev = 74.905/79.363/83.822/4.467 ms
[[email protected] ~]# ping -c 1000 223.5.5.5
PING 223.5.5.5 (223.5.5.5) 56(84) bytes of data.
64 bytes from 223.5.5.5: icmp_seq=1 ttl=128 time=130 ms
64 bytes from 223.5.5.5: icmp_seq=3 ttl=128 time=75.5 ms
64 bytes from 223.5.5.5: icmp_seq=4 ttl=128 time=83.9 ms
^C
--- 223.5.5.5 ping statistics ---
5 packets transmitted, 3 received, 40% packet loss, time 4322ms
rtt min/avg/max/mdev = 75.566/96.641/130.447/24.147 ms
[[email protected] ~]# ping -c 1000 223.5.5.5 -f (-c 指1000个包 -f 表示快速得到结果)
PING 223.5.5.5 (223.5.5.5) 56(84) bytes of data.
..
--- 223.5.5.5 ping statistics ---
10 packets transmitted, 8 received, 20% packet loss, time 266ms
rtt min/avg/max/mdev = 58.122/66.048/74.597/4.992 ms, pipe 7, ipg/ewma 29.657/68.129 ms
[[email protected] ~]# nmap 10.0.0.200 -p 22 -p 指端口号
Starting Nmap 5.51 ( http://nmap.org ) at 2018-11-24 12:31 CST
Nmap scan report for oldboy02 (10.0.0.200)
Host is up (0.000052s latency).
PORT STATE SERVICE
22/tcp open ssh( 表示状态是开启的)
Nmap done: 1 IP address (1 host up) scanned in 0.06 seconds
[[email protected] ~]# nmap 10.0.0.200 -p 10-40 (10-40 表示10到40之间开启的端口)
[[email protected] ~]# nmap 223.5.5.5 -p 10-40
Starting Nmap 5.51 ( http://nmap.org ) at 2018-11-24 12:36 CST
Nmap scan report for public1.alidns.com (223.5.5.5)
Host is up (0.00047s latency).
All 31 scanned ports on public1.alidns.com (223.5.5.5) are filtered
Nmap done: 1 IP address (1 host up) scanned in 1.57 seconds
以上信息表示没有开启这个数值之间的端口
以上是关于企业案例的主要内容,如果未能解决你的问题,请参考以下文章