Sponsored Content
Top Forums UNIX for Beginners Questions & Answers Grep ssh search with credentials under ip list Post 303045045 by tarantola_it on Wednesday 11th of March 2020 06:33:20 AM
Old 03-11-2020
Grep ssh search with credentials under ip list

Hi,

For my job I must search a clear text password under log files and inside a ip list table. I have login credential and .key file.

I don t know a fast method for do this.

Can anyone help me.
Thk
Andrea Smilie

Last edited by rbatte1; 03-11-2020 at 02:49 PM..
 

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Take a list if strings from a file and search them in a list of files and report them

I have a file 1.txt with the below contents. -----cat 1.txt----- 1234 5678 1256 1234 1247 ------------------- I have 3 more files in a folder -----ls -lrt------- A1.txt A2.txt A3.txt ------------------- The contents of those three files are similar format with different data values... (8 Replies)
Discussion started by: realspirituals
8 Replies

2. UNIX for Dummies Questions & Answers

What does ssh | grep $ do?

Hi, Am trying to debug a script and came across the line below: /usr/bin/ssh -o StrictHostKeyChecking=yes -o NumberOfPasswordPrompts=0 os_oper@bkupserver01 storageproxy mnl001 snap list | grep $ | grep vol_pr01 Am just confused/curious about what the grep $ does? Can anyone... (2 Replies)
Discussion started by: newbie_01
2 Replies

3. UNIX for Advanced & Expert Users

Need to pass credentials in one Go

Hi, We usually switch user using the below command. sudo su - user1 It then prompts for the password which we feed in. I wish to pass both the username and the password in one go thus eliminating the prompt for the password. I am using java standalone to connect to unix using... (11 Replies)
Discussion started by: mohtashims
11 Replies

4. Shell Programming and Scripting

Search string within a file and list common words from the line having the search string

Hi, Need your help for this scripting issue I have. I am not really good at this, so seeking your help. I have a file looking similar to this: Hello, i am human and name=ABCD. How are you? Hello, i am human and name=PQRS. I am good. Hello, i am human and name=ABCD. Good bye. Hello, i... (12 Replies)
Discussion started by: royzlife
12 Replies

5. UNIX for Dummies Questions & Answers

How to search using ssh on multiple hosts?

Hi guys - I am having a hard time trying to figure how to search for a certain string on config files hosted on multiple hosts. This is an example: Hostnames: myhost1.mycompany.com|myhost2.mycompany.com|myhost3.mycompany.com String to search for: myipaddress.somehost.com Directory... (9 Replies)
Discussion started by: DallasT
9 Replies

6. UNIX for Advanced & Expert Users

Help with credentials when using Grep across multiple servers

Hello all, I need some help with a script I have been working on. I was wanting to know if it is possible to add authentication to it for each server it runs across? The credentials are all the same on each server. This is what I am using so far and it seems to work. I am trying to avoid... (3 Replies)
Discussion started by: Smorgen
3 Replies

7. Shell Programming and Scripting

Appending crontab using ssh and sudo without root credentials

Hi, i have two servers say server A and server B. i have a sudo user say user1 with full privilges on server A and B. i am trying to append the crontab entry of root from server A of server B with the following command. But its appending on A. i need to append it on server B. please find the... (4 Replies)
Discussion started by: venkitesh
4 Replies

8. UNIX for Beginners Questions & Answers

Grep/awk using a begin search pattern and end search pattern

I have this fileA TEST FILE ABC this file contains ABC; TEST FILE DGHT this file contains DGHT; TEST FILE 123 this file contains ABC, this file contains DEF, this file contains XYZ, this file contains KLM ; I want to have a fileZ that has only (begin search pattern for will be... (2 Replies)
Discussion started by: vbabz
2 Replies

9. UNIX for Beginners Questions & Answers

How to check via SSH and credentials if file on remote server exists?

Hi there, I am sorry to ask that kind of beginner thing, but all the code I found online didnt work for me. All I want to do is: Check via SSH if a File exists on my webserver. The SSH login has to be with username and password. So I would be very thankful if somebody could write the line.... (8 Replies)
Discussion started by: Jens885544
8 Replies

10. UNIX for Beginners Questions & Answers

How to use a grep search to search for a specific string within multiple directories?

Lets say I have a massive directory which is filled with other directories all filled with different c++ scripts and I want a listing of all the scripts that contain the string: "this string". Is there a way to use a grep search for that? I tried: grep -lr "this string" * but I do not... (3 Replies)
Discussion started by: Circuits
3 Replies
crypt(1)						      General Commands Manual							  crypt(1)

NAME
crypt - encode and decode files SYNOPSIS
[password] DESCRIPTION
reads from the standard input and writes on the standard output. password is a key that selects a particular transformation. If no pass- word is given, demands a key from the terminal and turns off printing while the key is being typed in. encrypts and decrypts with the same key: The latter command decrypts the file and prints the clear version. Files encrypted by are compatible with those treated by the editor in encryption mode (see ed(1)). Security of encrypted files depends on three factors: the fundamental method must be hard to solve; direct search of the key space must be infeasible; "sneak paths" by which keys or clear text can become visible must be minimized. implements a one-rotor machine designed along the lines of the German Enigma, but with a 256-element rotor. Methods of attack on such machines are widely known; thus provides minimal security. The transformation of a key into the internal settings of the machine is deliberately designed to be expensive; that is, to take a substan- tial fraction of a second to compute. However, if keys are restricted to, for example, three lowercase letters, then encrypted files can be read by expending only a substantial fraction of five minutes of machine time. Since the key is an argument to the command, it is potentially visible to users executing the or a derivative (see ps(1)). The choice of keys and key security are the most vulnerable aspect of EXAMPLES
The following example demonstrates the use of to edit a file that the user wants to keep strictly confidential: ... ... ... Note that the option is the encryption mode of and prompts the user for the same key with which the file was encrypted. WARNINGS
If output is piped to and the encryption key is given on the command line, can leave terminal modes in a strange state (see nroff(1) and stty(1)). If two or more files encrypted with the same key are concatenated and an attempt is made to decrypt the result, only the the first of the original files is decrypted correctly. FILES
for typed key SEE ALSO
ed(1), makekey(1), stty(1). crypt(1)
All times are GMT -4. The time now is 11:16 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy