https://gist.github.com/VirtuBox/3d6a53df84b49ad0d01545984e380c80
https://gist.github.com/VirtuBox/5fedc39c30813f5373aa8ae9328a0ec3
https://gist.github.com/VirtuBox/3d6a53df84b49ad0d01545984e380c80
https://gist.github.com/VirtuBox/5fedc39c30813f5373aa8ae9328a0ec3
echo "$line" | grep -o -P '(?<=domains/).*(?=/public_html)'
lsof -i tcp:80 | grep LISTEN | awk '{print $2}' | xargs kill
بهترین دستور برای دیدن محتویاتی هست که به آدرسی POST شده است
tshark -i eno16777728 -R 'tcp.port==80 && (http.request.method=="POST" && http.host == "www.mrchagh.com" )' -Tfields -e ip.src -e data -e text
sudo tshark -i eno16777728 -T fields -E separator="|" -t e -R "tcp.port == 80 and http.request" -R "http.request.method == \"POST\"" -e frame.time -e ip.src -e tcp.srcport -e ip.dst -e tcp.dstport -e http.request.method -e http.request.full_uri -e data -e text
yum install https://dev.mysql.com/get/Downloads/Connector-C++/mysql-connector-c++-1.1.9-linux-el7-x86-64bit.rpm
www.mohsendavari.ir/files/tools/mysql-connector-c++-1.1.9-linux-el7-x86-64bit.rpm
nano /usr/lib/firewalld/services/http.xml
firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT_direct 0 -p tcp --dport 80 -m state --state NEW -m recent --set
firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT_direct 1 -p tcp --dport 80 -m state --state NEW -m recent --update --seconds 30 --hitcount 100 -j REJECT --reject-with tcp-reset
firewall-cmd --reload