====== Troubleshooting ======
==== Packet Sniffing von der Kommandozeile: ====
* [[http://networkingbodges.blogspot.de/2012/11/tshark-one-liners.html|Wireshark (tshark)]]
* [[https://scrutin.wordpress.com/2007/04/06/quick-network-analysis-with-tcpdump/|Tcpdump Tutorial 1]]
* [[https://danielmiessler.com/study/tcpdump/#gs.U9vx26M|Tcpdump Tutorial 2]]
==== IP und DNS Information ====
* http://whatismyip.ch
=== DNSlytics ===
* https://dnslytics.com/tools
* https://dnslytics.com/ip/141.45.184.41
==== Traceroute ====
**Visual Traceroute**
* http://www.monitis.com/traceroute/
**Traceroute mit Anzeige des Autonomen Systems (AS)**
traceroute -a www.spiegel.de
==== HTTP: ====
**HTTP über Telnet:**
telnet www.spiegel.de 80
GET / HTTP/1.1
host: www.spiegel.de
* [[http://www.esqsoft.com/examples/troubleshooting-http-using-telnet.htm]]
* [[https://www.thomas-krenn.com/de/wiki/TCP_Port_80_(http)_Zugriff_mit_telnet_überprüfen]]
**HTTP über openssl:**
* http://www.h-online.com/security/features/Testing-email-with-encryption-812464.html
==== Mail (SMTP): ====
**SMTP über Telnet:**
* [[https://www.thomas-krenn.com/de/wiki/TCP_Port_25_(smtp)_Zugriff_mit_telnet_überprüfen]]
**SMTP über SSL:**
* http://www.h-online.com/security/features/Testing-email-with-encryption-812464.html
==== UDP: ====
=== UDP-Pakete per Kommandozeile senden ===
echo -n "hello" >/dev/udp/localhost/8000 #may prefer IPv6!
echo -n "hello" >/dev/udp/127.0.0.1/8000
* https://help.ubidots.com/developer-guides/sending-tcpudp-packets-using-netcat
* http://stackoverflow.com/questions/9696129/how-to-send-only-one-udp-packet-with-netcat
=== Herausfinden ob UDP-Ports offen sind ===
* http://unix.stackexchange.com/questions/191655/using-bashs-dev-udp-how-would-i-know-if-the-port-was-open
==== NMAP: ====
https://www.cyberciti.biz/networking/nmap-command-examples-tutorials/
==== DNS: ====
http://dnscheck.iis.se/?faq=1&test=standard
==== SSH: ====
Falls SSH nicht funktioniert ist das meistens ein Problem falscher Permissions:
http://www.openssh.com/faq.html
chmod 700 $HOME/.ssh
chmod go-w $HOME $HOME/.ssh
chmod 600 $HOME/.ssh/authorized_keys
chown `whoami` $HOME/.ssh/authorized_keys
===== Verschiedenes =====
==== Herausfinden, welcher Prozess einen bestimmten Port benutzt ====
netstat -vanp tcp | grep 443
lsof -i tcp:443
# anschließend mit ps das Programm ermitteln
ps -p PID
----
==== Linux/Unix Layer-4-Ports ====
* https://www.cyberciti.biz/faq/linux-unix-open-ports/
----
==== Telnet Escape-Character ====
**Mac**
ctrl + ü
**Windows**
ctrl + +
* http://superuser.com/questions/398/how-to-send-the-escape-character-on-os-x-terminal
----