Skip to content

Linux Command Cheat Sheet

Beginner Linux Command Line

This reference page contains a short list of commonly used Linux commands to help you get up and running with Linux in the Cyber Range.


Changes the current working directory

cd -

Changes to the previous directory

cd ~

Changes to the $HOME directory

cd ../

Changes to the parent directory


Prints the current working directory


Will list files in the current directory or a specified directory - Example: ls /home/user

ls -al

Will list files in "long" format and show hidden files

ls -ltr

Will list files in long format, by age, and in reverse

man ls

Allows a user to read the user manual for a specific command


Allows a user to create a directory - Example: mkdir myNewDirectory

mkdir -p 1/2

Make directory 1 along with subdirectory 2

rmdir dir1

Will remove the empty directory dir1

rm file

Will remove a specified file

rm file*

Will remove all files starting with "file"

rm -r oldir

Will Recursively remove oldir & and all folder contents

touch fileX

Creates an empty file called "fileX", or will update the time of an existing file

cat f1 f2

Concatenate and print files f1 & f2

nano file1

Nano editor, create or edit file1 (easy, simple)

vim file1

Vim editor, create or edit file1 (difficult, powerful)

leafpad f1

Leafpad graphical file editor (in XCFE, easiest)

ristretto f.jpg

Default graphic viewer in XFCE

wget www

Web/file downloader (www= a full URL)

curl -L | bash -c

Download & run a www hosted script locally

grep XX [file]

Filter & print any lines in file with XX in it

grep "^Nmap"

Filter & print any lines ^(beginning with) "Nmap"

somecommand | mail -s "Subject"

Send output from somecommand to email in order to send an email to


Print the time/date

date +%y-%m-%d

Prints formatted YY-mm-dd date

$(date +%y-%m-%d)

Run embedded command and return text

cat /etc/passwd | cut -f1 -d":" | mail -s "Usernames on $HOST"

Prints out all usernames on a system, cut the 1st column, and email it to me.

sudo su -

Super User Do, run the "su -" command to become root (if allowed)

ps auxw | less

List all processes, their PID #s, stats and process names (with less pager)

pstree | less

List all processes in a relational tree format (with less pager)

Networking & Network Security Commands


Please run any potentially dangerous system/network security commands in a safe environment (like the Cyber Range) or on a system where you have permission to do so!

ifconfig eth0

Show IP and VLSM(255) subnet mask

ip addr show eth0

Show IP and CIDR(/24) subnet mask - The number of IPs on your LAN = 2^(32 - CIDR#) e.g. 2^(32-24) = 256 IPs.

hostname -f

Show the machine's (f)ull hostname

hostname -i

Show (I)P address of the hostname

ping -c 3

Ping Google's nameserver ( three times

netstat -antp

*Show (a)ll local to remote (T)CP IP/port connections & (p)rocess names

iptables -L -n

*(L)ist of firewall settings (n)umerically

route -n

Show IP routing tables (n)umerically

nmap -sP [IP/N]

**Ping scan the [IP/subnet address space of hosts]

nmap -sP -nS -oG..

**Ping scan (provide IP OR Network) and output in greppable format

nmap -oG - ..| 

**Same, but pipe scan stdOut [-] to other command(s) (like grep)

nmap -O -n - [IP/N]

**Nmap OS fingerprint scan with no DNS

nmap -O --osscan-limit [IP/N]

**Limit OS port scan to promising targets

nc -lnk [IP#] [port#]

Have netcat listen locally on [your IP#] and [port#] * root needed for ports under 1024

echo "can you hear me?" | nc [remote IP] [remote Port]

Send a message to a remote process/listener on remote IP on a remote port number

#nikto -h   - Removing the # will allow the command to run


Scan webserver for known vulnerabilities. This command must be run as root, or via sudo command. WARNING! Do not run this without the target-host or network owner's permission.

Have a Question? Contact Support


Students, please reach out to your instructor who can submit a ticket to our Support Team on your behalf.

We're here to help you. If you still have questions after reviewing the information above, please feel free to submit a ticket with our Support Team and we'll get back to you as soon as possible.