Kali Linux-এর সব বেসিক কমান্ড থেকে শুরু করে Nmap, Whois, theHarvester, Recon-ng, DNSrecon সহ সব Reconnaissance টুলের সম্পূর্ণ command reference। From essential Kali Linux commands to Nmap, Whois, theHarvester, Recon-ng, DNSrecon — a complete command reference for all Reconnaissance tools.
Kali Linux হলো Offensive Security তৈরি একটি Debian-based Linux distribution যেটি বিশেষভাবে Penetration Testing, Digital Forensics এবং Security Auditing-এর জন্য তৈরি। এতে ৬০০+ pre-installed security tool রয়েছে।Kali Linux is a Debian-based Linux distribution by Offensive Security, specially built for Penetration Testing, Digital Forensics, and Security Auditing. It comes with 600+ pre-installed security tools.
| Shortcut | কাজFunction | গুরুত্বImportance |
|---|---|---|
Ctrl + C | চলমান process বন্ধ করোStop running process | অবশ্যই জানো |
Ctrl + Z | Process suspend করো (background)Suspend process (background) | জরুরি |
Ctrl + L | Terminal clear করোClear terminal | দরকারী |
Tab | Auto-complete command/pathAuto-complete command/path | অবশ্যই জানো |
↑ / ↓ | আগের command historyPrevious command history | অবশ্যই জানো |
Ctrl + R | Command history searchSearch command history | দরকারী |
Ctrl + A | Line-এর শুরুতে যাওGo to beginning of line | দরকারী |
Ctrl + E | Line-এর শেষে যাওGo to end of line | দরকারী |
!! | আগের command আবার চালাওRepeat last command | জরুরি |
sudo !! | আগের command sudo দিয়ে চালাওRun last command with sudo | অবশ্যই জানো |
| কমান্ডCommand | কাজFunction | উদাহরণExample |
|---|---|---|
| pwd | বর্তমান directory দেখাওShow current directory | pwd |
| ls | Directory-র contents দেখাওList directory contents | ls -la |
| ls -la | Hidden file সহ সব file ও permission দেখাওShow all files including hidden, with permissions | ls -la /etc |
| ls -lh | Human-readable size সহ file listList files with human-readable sizes | ls -lh /var/log |
| cd [dir] | Directory বদলাওChange directory | cd /opt/tools |
| cd .. | একধাপ উপরে যাওGo up one level | cd ../.. |
| cd ~ | Home directory-তে যাওGo to home directory | cd ~ |
| cd - | আগের directory-তে ফিরে যাওGo back to previous directory | cd - |
| tree | Directory tree structure দেখাওShow directory tree structure | tree -L 2 /var |
| কমান্ডCommand | কাজFunction | উদাহরণExample |
|---|---|---|
| cat | File-এর content দেখাওShow file content | cat /etc/passwd |
| less | বড় file scroll করে দেখোView large files with scrolling | less /var/log/syslog |
| head -n | File-এর প্রথম n লাইন দেখাওShow first n lines of file | head -n 20 log.txt |
| tail -n | File-এর শেষ n লাইন দেখাওShow last n lines of file | tail -n 50 log.txt |
| tail -f | Real-time-এ file update দেখো (live log)Watch file updates in real-time (live log) | tail -f /var/log/auth.log |
| cp | File copy করোCopy file | cp file.txt /tmp/ |
| cp -r | Directory সহ copy করোCopy directory recursively | cp -r /opt/tool /tmp/ |
| mv | File move বা rename করোMove or rename file | mv old.txt new.txt |
| rm | File delete করোDelete file | rm file.txt |
| rm -rf | Directory সহ force delete ⚠️Force delete directory ⚠️ | rm -rf /tmp/folder |
| mkdir | নতুন directory তৈরি করোCreate new directory | mkdir -p /opt/recon |
| touch | নতুন empty file তৈরি করোCreate new empty file | touch output.txt |
| file | File-এর type জানোDetermine file type | file malware.bin |
| wc -l | File-এ কতটি লাইন আছে গণনা করোCount number of lines in file | wc -l wordlist.txt |
| diff | দুটি file-এর পার্থক্য দেখাওShow difference between two files | diff file1 file2 |
| chmod | File permission পরিবর্তন করোChange file permissions | chmod +x script.sh |
| chown | File-এর owner পরিবর্তন করোChange file owner | chown root:root file |
| কমান্ডCommand | কাজFunction | উদাহরণExample |
|---|---|---|
| find / -name | নাম দিয়ে file খোঁজোFind file by name | find / -name "passwd" |
| find / -perm -4000 | SUID bit আছে এমন file খোঁজো (PrivEsc!)Find SUID files (PrivEsc!) | find / -perm -4000 2>/dev/null |
| find / -writable | Writable file/folder খোঁজোFind writable files/dirs | find / -writable -type d 2>/dev/null |
| find / -user root | Root-owned file খোঁজোFind root-owned files | find / -user root -type f |
| find / -mtime -7 | গত ৭ দিনে পরিবর্তিত file খোঁজোFind files modified in last 7 days | find /etc -mtime -7 |
| grep -r "text" | Recursively text খোঁজোRecursively search for text | grep -r "password" /var/www/ |
| grep -i | Case-insensitive searchCase-insensitive search | grep -i "admin" users.txt |
| grep -v | Pattern ছাড়া সব লাইন দেখাও (invert)Show lines NOT matching pattern | grep -v "^#" config.conf |
| grep -n | Line number সহ match দেখাওShow matches with line numbers | grep -n "error" log.txt |
| grep -E | Extended regex দিয়ে searchSearch with extended regex | grep -E "pass|secret|key" file |
| locate | Database থেকে দ্রুত file খোঁজোFast file search from database | locate nmap.conf |
| which | Command কোথায় installed দেখোShow where a command is installed | which nmap |
| whereis | Binary, source, manual সব খোঁজোFind binary, source and manual | whereis python3 |
| কমান্ডCommand | কাজFunction | উদাহরণExample |
|---|---|---|
| ip a | সব network interface ও IP দেখাওShow all interfaces and IPs | ip a |
| ip r | Routing table দেখাওShow routing table | ip r |
| ifconfig | Network interface configure করোConfigure network interfaces | ifconfig eth0 |
| ping | Host alive কিনা check করোCheck if host is alive | ping -c 4 google.com |
| traceroute | Packet-এর path trace করোTrace the path of packets | traceroute target.com |
| netstat -tulnp | Open port ও listening service দেখাওShow open ports and listening services | netstat -tulnp |
| ss -tulnp | netstat-এর আধুনিক versionModern version of netstat | ss -tulnp |
| curl | URL থেকে data transfer করোTransfer data from/to URL | curl -I https://target.com |
| curl -X POST | POST request পাঠাওSend POST request | curl -X POST -d "user=a" url |
| wget | File download করোDownload files | wget https://site.com/file |
| nc (netcat) | Port connect, listen, file transferConnect, listen, transfer files via port | nc -lvnp 4444 |
| nc -zv host port | Port open কিনা check করোCheck if a port is open | nc -zv 192.168.1.1 80 |
| arp -a | ARP table দেখাও (LAN hosts)Show ARP table (LAN hosts) | arp -a |
| ssh user@host | SSH দিয়ে remote connect করোConnect to remote host via SSH | ssh root@192.168.1.5 |
| scp | SSH দিয়ে file copy করোCopy file over SSH | scp file.txt user@host:/tmp/ |
| কমান্ডCommand | কাজFunction | উদাহরণExample |
|---|---|---|
| uname -a | Kernel version ও system info দেখাওShow kernel version and system info | uname -a |
| uname -r | শুধু Kernel version দেখাওShow kernel version only | uname -r |
| hostname | System-এর hostname দেখাওShow system hostname | hostname -I |
| whoami | বর্তমান user কে তা জানোShow current user | whoami |
| id | User ID, Group ID দেখাওShow user and group IDs | id |
| ps aux | সব চলমান process দেখাওShow all running processes | ps aux | grep apache |
| top / htop | Real-time resource monitorReal-time resource monitor | htop |
| df -h | Disk space দেখাওShow disk space usage | df -h |
| free -h | RAM usage দেখাওShow RAM usage | free -h |
| env | Environment variables দেখাওShow environment variables | env | grep PATH |
| history | Command history দেখাওShow command history | history | tail -50 |
| cat /etc/os-release | OS version বিস্তারিত দেখাওShow detailed OS version info | cat /etc/os-release |
| lsb_release -a | Distro info দেখাওShow distribution info | lsb_release -a |
| lscpu | CPU info দেখাওShow CPU info | lscpu |
| কমান্ডCommand | কাজFunction | উদাহরণExample |
|---|---|---|
| grep "pattern" file | Pattern match করা লাইন খোঁজোFind lines matching pattern | grep "root" /etc/passwd |
| grep -oP "regex" | Perl regex দিয়ে match-only outputPerl regex, print match only | grep -oP '\d+\.\d+\.\d+\.\d+' log |
| awk '{print $1}' | প্রথম column print করোPrint first column | awk '{print $1}' file.txt |
| awk -F: '{print $1}' | : দিয়ে split করে column বের করোSplit by : and extract column | awk -F: '{print $1}' /etc/passwd |
| awk '/pattern/' | Pattern যুক্ত লাইন filter করোFilter lines with pattern | awk '/POST/' access.log |
| sed 's/old/new/g' | Text replace করোReplace text | sed 's/http/https/g' urls.txt |
| sed -n '5,10p' | ৫ থেকে ১০ নম্বর লাইন print করোPrint lines 5 to 10 | sed -n '5,10p' bigfile.txt |
| sed '/pattern/d' | Pattern যুক্ত লাইন delete করোDelete lines with pattern | sed '/^#/d' config.conf |
| cut -d: -f1 | : দিয়ে split করে 1st field নাওSplit by : and take 1st field | cut -d: -f1 /etc/passwd |
| sort | Alphabetically sort করোSort alphabetically | sort -u ips.txt |
| uniq | Duplicate লাইন সরাওRemove duplicate lines | sort file | uniq |
| tr | Character translate করোTranslate characters | tr 'a-z' 'A-Z' < file |
| tee | Screen-এ দেখাও ও file-এও লেখোShow on screen and write to file | nmap target | tee scan.txt |
| কমান্ডCommand | কাজFunction |
|---|---|
| apt update | Package list update করোUpdate package list |
| apt upgrade | সব installed package upgrade করোUpgrade all installed packages |
| apt install [pkg] | নতুন tool install করোInstall a new tool |
| apt remove [pkg] | Tool uninstall করোUninstall a tool |
| apt search [name] | Tool খোঁজোSearch for a tool |
| dpkg -l | Installed package list দেখাওList installed packages |
| pip3 install | Python package install করোInstall Python package |
| gem install | Ruby gem install করোInstall Ruby gem |
find / -perm -4000 2>/dev/null — এই command টা PrivEsc-এর জন্য সবসময় মনে রাখোfind / -perm -4000 2>/dev/null — Always remember for PrivEscnc -lvnp 4444 — Reverse shell-এর জন্য listener চালু রাখোnc -lvnp 4444 — Keep listener running for reverse shellgrep -r "password" /var/www/ — Web server-এ hardcoded password খোঁজোgrep -r "password" /var/www/ — Find hardcoded passwords in web server|) দিয়ে commands chain করো — output এক command থেকে পরেরটায় পাঠাওChain commands with pipe (|) — send output from one command to nexttee বা > file দিয়ে save করোAlways save scan output using tee or > file| কমান্ডCommand | কাজFunction |
|---|---|
| nmap 192.168.1.1 | একটি IP scan করোScan a single IP |
| nmap 192.168.1.1-254 | IP range scan করোScan an IP range |
| nmap 192.168.1.0/24 | পুরো subnet scan করো (CIDR)Scan entire subnet (CIDR) |
| nmap target.com | Domain name দিয়ে scan করোScan by domain name |
| nmap -iL hosts.txt | File থেকে target list নাওRead targets from a file |
| nmap --exclude 192.168.1.5 | নির্দিষ্ট IP বাদ দিয়ে scan করোExclude specific IPs from scan |
| nmap -6 ::1 | IPv6 address scan করোScan IPv6 address |
| Flag | কাজFunction | উদাহরণExample |
|---|---|---|
| -sn | Ping scan — port scan ছাড়া শুধু alive host খোঁজোPing scan — find alive hosts without port scan | nmap -sn 192.168.1.0/24 |
| -Pn | Ping disable করো — সব host alive ধরো (Firewall bypass)Skip ping — treat all hosts as alive (firewall bypass) | nmap -Pn target.com |
| -PS | TCP SYN ping দিয়ে host discover করোTCP SYN ping host discovery | nmap -PS22,80,443 target |
| -PA | TCP ACK ping দিয়ে host discover করোTCP ACK ping host discovery | nmap -PA80 target |
| -PE | ICMP Echo pingICMP Echo ping | nmap -PE target |
| -PR | ARP ping (LAN-এ সবচেয়ে কার্যকর)ARP ping (most effective on LAN) | nmap -PR 192.168.1.0/24 |
| -n | DNS resolution বন্ধ রাখো (দ্রুত scan)Disable DNS resolution (faster scan) | nmap -n -sn 192.168.1.0/24 |
| Flag | Scan Type | কাজ ও বিবরণDescription |
|---|---|---|
| -sS | SYN Scan | TCP SYN scan — সবচেয়ে দ্রুত ও stealth। Connection সম্পন্ন করে না। Root দরকার।TCP SYN scan — fastest and stealthy. Never completes connection. Requires root. |
| -sT | TCP Connect | পূর্ণ TCP connection করে। Log-এ ধরা পড়ে। Root ছাড়াও চলে।Full TCP connection. Logged. Works without root. |
| -sU | UDP Scan | UDP port scan — ধীর কিন্তু DNS, SNMP-এর জন্য দরকার।UDP port scan — slow but needed for DNS, SNMP. |
| -sA | ACK Scan | Firewall rules map করতে ব্যবহার হয়।Used to map firewall rules. |
| -sF | FIN Scan | FIN packet পাঠায় — IDS bypass করতে পারে।Sends FIN packets — may bypass IDS. |
| -sX | Xmas Scan | FIN, PSH, URG flag set করে — stealth।Sets FIN, PSH, URG flags — stealthy. |
| -sN | Null Scan | কোনো flag set করে না — firewall bypass।No flags set — firewall bypass. |
| -sW | Window Scan | TCP window size বিশ্লেষণ করে।Analyzes TCP window size. |
| -sM | Maimon Scan | BSD-based system-এ কাজ করে।Works on BSD-based systems. |
| Flag | কাজFunction | উদাহরণExample |
|---|---|---|
| -p 80 | নির্দিষ্ট port scan করোScan specific port | nmap -p 80 target |
| -p 80,443,8080 | Multiple specific port scan করোScan multiple specific ports | nmap -p 80,443,8080 target |
| -p 1-1000 | Port range scan করোScan a port range | nmap -p 1-1000 target |
| -p- | সব ৬৫৫৩৫ port scan করোScan all 65535 ports | nmap -p- target |
| -F | Top ১০০ port দ্রুত scan করোFast scan top 100 ports | nmap -F target |
| --top-ports 1000 | Top N most common ports scan করোScan top N most common ports | nmap --top-ports 1000 target |
| -p U:53,T:80 | UDP ও TCP port আলাদা করে specify করোSpecify UDP and TCP ports separately | nmap -p U:53,T:80,443 target |
| Flag | কাজFunction | উদাহরণExample |
|---|---|---|
| -sV | Service version detect করো (কোন service, কোন version)Detect service versions | nmap -sV target |
| -sV --version-intensity | Version detection intensity (0-9) — বেশি মানে ধীর কিন্তু accurateVersion detection intensity (0-9) — higher = slower but more accurate | nmap -sV --version-intensity 9 target |
| -O | Operating System detect করোDetect operating system | nmap -O target |
| --osscan-guess | Aggressively OS guess করোAggressively guess OS | nmap -O --osscan-guess target |
| -A | Aggressive: OS+Version+Script+Traceroute (সব একসাথে)Aggressive: OS+Version+Script+Traceroute (all in one) | nmap -A target |
| --traceroute | Target-এ পৌঁছানোর path trace করোTrace path to target | nmap --traceroute target |
/usr/share/nmap/scripts/ ফোল্ডারে।
Nmap's Script Engine (NSE) can do 600+ tasks including vulnerability detection, brute force, exploit checks. Scripts are in /usr/share/nmap/scripts/.
| Flag / Script | কাজFunction | উদাহরণExample |
|---|---|---|
| -sC | Default scripts চালাওRun default scripts | nmap -sC target |
| --script=vuln | Vulnerability check scripts চালাওRun vulnerability check scripts | nmap --script=vuln target |
| --script=safe | Safe scripts চালাও (non-intrusive)Run safe scripts (non-intrusive) | nmap --script=safe target |
| --script=auth | Authentication bypass script চালাওRun auth bypass scripts | nmap --script=auth target |
| --script=brute | Brute force scripts চালাওRun brute force scripts | nmap --script=brute target |
| --script=http-* | HTTP-related সব scripts চালাওRun all HTTP-related scripts | nmap --script=http-* -p 80 target |
| --script=smb-vuln-* | SMB vulnerability check (EternalBlue ইত্যাদি)SMB vulnerability check (EternalBlue etc.) | nmap --script=smb-vuln-* -p 445 target |
| --script=ftp-anon | FTP anonymous login check করোCheck for FTP anonymous login | nmap --script=ftp-anon -p 21 target |
| --script=ssh-brute | SSH brute force করোSSH brute force | nmap --script=ssh-brute -p 22 target |
| --script=dns-zone-transfer | DNS zone transfer চেষ্টা করোAttempt DNS zone transfer | nmap --script=dns-zone-transfer target |
| --script=http-sql-injection | HTTP SQL Injection test করোTest for HTTP SQL Injection | nmap --script=http-sql-injection -p 80 target |
| --script-help=vuln | Script সম্পর্কে help দেখোShow help about a script | nmap --script-help=vuln |
| --script-updatedb | Script database update করোUpdate script database | nmap --script-updatedb |
| Flag | গতিSpeed | বিবরণDescription |
|---|---|---|
| -T0 | Paranoid | অত্যন্ত ধীর — IDS evasion-এর জন্যExtremely slow — for IDS evasion |
| -T1 | Sneaky | ধীর — IDS evasionSlow — IDS evasion |
| -T2 | Polite | ধীরে ধীরে — network bandwidth কম ব্যবহারSlow — reduces bandwidth usage |
| -T3 | Normal | Default timingDefault timing |
| -T4 | Aggressive | দ্রুত — Reliable network-এ ব্যবহার করোFast — use on reliable networks |
| -T5 | Insane | অত্যন্ত দ্রুত — accuracy কম হতে পারেExtremely fast — may miss results |
| --min-rate 5000 | Custom | প্রতি সেকেন্ডে minimum packet rate set করোSet minimum packets per second |
| --max-retries 1 | Custom | Maximum retry count কমাও (দ্রুত হবে)Reduce max retries (speeds up scan) |
| Flag | কাজFunction | উদাহরণExample |
|---|---|---|
| -D RND:10 | ১০টি decoy IP দিয়ে scan করো (IP spoof)Scan with 10 random decoy IPs | nmap -D RND:10 target |
| -D decoy1,decoy2 | নির্দিষ্ট decoy IP ব্যবহার করোUse specific decoy IPs | nmap -D 1.1.1.1,2.2.2.2 target |
| -S spoofed_ip | Source IP spoof করোSpoof source IP address | nmap -S 192.168.1.100 target |
| --spoof-mac 0 | Random MAC address ব্যবহার করোUse random MAC address | nmap --spoof-mac 0 target |
| -f | Packet fragment করো (IDS bypass)Fragment packets (IDS bypass) | nmap -f target |
| --mtu 16 | Custom MTU size set করোSet custom MTU size | nmap --mtu 16 target |
| --data-length 25 | Packet-এ random data যোগ করোAppend random data to packets | nmap --data-length 25 target |
| --source-port 53 | DNS port থেকে scan পাঠাও (firewall bypass)Send scan from DNS port (firewall bypass) | nmap --source-port 53 target |
| --proxies socks4://proxy:port | Proxy দিয়ে scan করোScan through a proxy | nmap --proxies socks4://127.0.0.1:9050 target |
| Flag | কাজFunction | উদাহরণExample |
|---|---|---|
| -oN file.txt | Normal text format-এ save করোSave in normal text format | nmap target -oN result.txt |
| -oX file.xml | XML format-এ save করো (Metasploit import হয়)Save in XML format (importable to Metasploit) | nmap target -oX result.xml |
| -oG file.gnmap | Greppable format-এ save করোSave in greppable format | nmap target -oG result.gnmap |
| -oA basename | তিনটি format-এই একসাথে save করোSave in all three formats at once | nmap target -oA scan_results |
| -v | Verbose output (বিস্তারিত দেখাও)Verbose output (show more details) | nmap -v target |
| -vv | আরও বিস্তারিত verbose outputEven more verbose output | nmap -vv target |
| --reason | Port কেন open/closed সেটা দেখাওShow reason why port is open/closed | nmap --reason target |
| --open | শুধু open port দেখাওShow only open ports | nmap --open target |
| কমান্ডCommand | কাজFunction |
|---|---|
| whois target.com | Domain-এর registration তথ্য দেখাও (registrar, dates, nameservers)Show domain registration info (registrar, dates, nameservers) |
| whois 192.168.1.1 | IP address-এর owner তথ্য দেখাওShow IP address owner information |
| whois target.com | grep -i "name server" | শুধু Name Server বের করোExtract only Name Servers |
| whois target.com | grep -i "registrant" | Domain owner তথ্য বের করোExtract domain owner info |
| whois target.com | grep -i "expir" | Domain expiry date দেখাওShow domain expiry date |
| কমান্ডCommand | কাজFunction |
|---|---|
| dig target.com | Default A record (IP address) দেখাওShow default A record (IP address) |
| dig target.com A | IPv4 A record দেখাওShow IPv4 A record |
| dig target.com AAAA | IPv6 AAAA record দেখাওShow IPv6 AAAA record |
| dig target.com MX | Mail Exchange record — email server কোনটাMail Exchange record — which server handles email |
| dig target.com NS | Name Server record দেখাওShow Name Server records |
| dig target.com TXT | TXT record (SPF, DKIM, verification tokens)TXT records (SPF, DKIM, verification tokens) |
| dig target.com SOA | Start of Authority record দেখাওShow Start of Authority record |
| dig target.com CNAME | CNAME (alias) record দেখাওShow CNAME (alias) records |
| dig target.com ANY | সব ধরনের DNS record দেখাওShow all DNS record types |
| dig -x 93.184.216.34 | Reverse DNS lookup — IP থেকে hostname বের করোReverse DNS lookup — find hostname from IP |
| dig @8.8.8.8 target.com | নির্দিষ্ট DNS server (Google) ব্যবহার করোUse specific DNS server (Google) for query |
| dig target.com AXFR @ns1.target.com | Zone Transfer চেষ্টা করো (সব subdomain expose হবে!)Attempt Zone Transfer (all subdomains exposed!) |
| dig +short target.com | Short output — শুধু answer দেখাওShort output — show answer only |
| dig +noall +answer target.com | শুধু answer section দেখাওShow only the answer section |
| কমান্ডCommand | কাজFunction |
|---|---|
| host target.com | Domain-এর IP দেখাওShow IP for domain |
| host -t MX target.com | Mail server দেখাওShow mail servers |
| host -t NS target.com | Name server দেখাওShow name servers |
| host 93.184.216.34 | Reverse lookup — IP থেকে domainReverse lookup — IP to domain |
| host -l target.com ns1.target.com | Zone transfer চেষ্টা করোAttempt zone transfer |
| nslookup target.com | DNS lookup করো (interactive বা non-interactive)DNS lookup (interactive or non-interactive) |
| nslookup -type=mx target.com | MX record দেখাও nslookup দিয়েShow MX records with nslookup |
| nslookup -type=any target.com 8.8.8.8 | Google DNS দিয়ে সব record দেখাওShow all records using Google DNS |
| কমান্ডCommand | কাজFunction |
|---|---|
| netdiscover | Auto mode — সব common subnet scan করোAuto mode — scan all common subnets |
| netdiscover -r 192.168.1.0/24 | নির্দিষ্ট subnet scan করোScan a specific subnet |
| netdiscover -i eth0 | নির্দিষ্ট interface দিয়ে scan করোScan using a specific network interface |
| netdiscover -p | Passive mode — শুধু listen করো, কোনো packet পাঠাবে না (stealth)Passive mode — only listen, don't send packets (stealth) |
| netdiscover -r 192.168.1.0/24 -i eth0 -P | Print mode — interactive screen-এর বদলে একবার print করে বেরিয়ে যাওPrint mode — print once and exit instead of interactive screen |
| netdiscover -r 10.0.0.0/8 | বড় Class A network scan করোScan large Class A network |
| netdiscover -f | Fast mode — কম accurate কিন্তু দ্রুতFast mode — less accurate but quicker |
| netdiscover -c 3 | প্রতি host-এ ৩টি ARP request পাঠাওSend 3 ARP requests per host |
| netdiscover -s 10 | প্রতি request-এর মধ্যে ১০ms বিরতি10ms sleep between each ARP request |
| netdiscover -r 192.168.1.0/24 -oN result.txt | Result file-এ save করোSave results to file |
netdiscover দ্রুত কাজ করে কারণ এটা ARP ব্যবহার করে। Nmap-এর -sn flag-ও একই কাজ করে কিন্তু Nmap বেশি versatile। দুটোই একসাথে ব্যবহার করো confirmation-এর জন্য।
On LAN, netdiscover is faster because it uses ARP. Nmap's -sn flag does the same but Nmap is more versatile. Use both together for confirmation.
| Flag | কাজFunction | উদাহরণExample |
|---|---|---|
| -d domain | Target domain specify করোSpecify target domain | -d target.com |
| -b source | Data source specify করোSpecify data source | -b google |
| -b all | সব available source ব্যবহার করোUse all available sources | -b all |
| -l 500 | Maximum result limit set করোSet maximum result limit | -l 500 |
| -f output | Output file name দাও (HTML ও XML)Set output filename (HTML and XML) | -f result |
| -n | DNS reverse lookup করো discovered IP-তেDNS reverse lookup on discovered IPs | -n |
| -c | DNS brute force করো common names দিয়েDNS brute force with common names | -c |
| -t | DNS TLD expansion করোDNS TLD expansion | -t |
| -s 0 | Google-এ কোন result থেকে শুরু করবStart from which Google result | -s 0 |
| -v | Verbose mode — বিস্তারিত দেখাওVerbose mode — show more details | -v |
| কমান্ডCommand | কাজFunction |
|---|---|
| recon-ng | Recon-ng চালু করো (default workspace)Launch recon-ng (default workspace) |
| recon-ng -w myworkspace | নির্দিষ্ট workspace নিয়ে চালু করোLaunch with specific workspace |
| workspaces create target_co | নতুন workspace তৈরি করোCreate new workspace |
| workspaces list | সব workspace দেখাওList all workspaces |
| workspaces load target_co | Workspace switch করোSwitch to a workspace |
| workspaces remove target_co | Workspace delete করোDelete a workspace |
| কমান্ডCommand | কাজFunction |
|---|---|
| marketplace search | সব available module দেখাওShow all available modules |
| marketplace search subdomain | Subdomain-related module খোঁজোSearch for subdomain-related modules |
| marketplace install recon/domains-hosts/hackertarget | নির্দিষ্ট module install করোInstall a specific module |
| marketplace install all | সব module install করোInstall all modules |
| modules load recon/domains-hosts/hackertarget | Module load করোLoad a module |
| modules list | Installed modules দেখাওList installed modules |
| info | Loaded module-এর তথ্য দেখাওShow info about loaded module |
| কমান্ডCommand | কাজFunction |
|---|---|
| db insert domains | Target domain database-এ add করোAdd target domain to database |
| show domains | Database-এ stored domains দেখাওShow stored domains in database |
| show hosts | Discovered hosts দেখাওShow discovered hosts |
| show contacts | Discovered contacts ও emails দেখাওShow discovered contacts and emails |
| options set SOURCE target.com | Module-এর SOURCE set করোSet SOURCE for module |
| run | Module চালাওRun the loaded module |
| keys list | API keys দেখাওList API keys |
| keys add shodan_api KEY | Shodan API key যোগ করোAdd Shodan API key |
| back | Module থেকে বেরিয়ে আসোExit current module |
| exit | Recon-ng বন্ধ করোExit recon-ng |
| Module | কাজPurpose |
|---|---|
recon/domains-hosts/hackertarget | Subdomain খোঁজোFind subdomains |
recon/domains-contacts/whois_pocs | Whois contact বের করোExtract Whois contacts |
recon/hosts-hosts/resolve | Hostname resolve করোResolve hostnames |
recon/domains-hosts/shodan_hostname | Shodan দিয়ে host খোঁজোFind hosts via Shodan |
recon/contacts-credentials/hibp_breach | HaveIBeenPwned breach checkCheck HaveIBeenPwned breaches |
reporting/html | HTML report তৈরি করোGenerate HTML report |
| Flag | কাজFunction | উদাহরণExample |
|---|---|---|
| -d domain | Target domain specify করোSpecify target domain | -d target.com |
| -t std | Standard DNS enumeration — A, NS, SOA, MX, SRV recordStandard enumeration — A, NS, SOA, MX, SRV records | dnsrecon -d target.com -t std |
| -t axfr | Zone Transfer চেষ্টা করো (সব name server-এ)Attempt Zone Transfer on all name servers | dnsrecon -d target.com -t axfr |
| -t brt | Brute force subdomain খোঁজো wordlist দিয়েBrute force subdomains with wordlist | dnsrecon -d target.com -t brt -D wordlist.txt |
| -t rvl | Reverse DNS lookup করো IP range-এReverse DNS lookup on IP range | dnsrecon -r 192.168.1.0/24 -t rvl |
| -t goo | Google dork দিয়ে subdomain খোঁজোFind subdomains using Google dorking | dnsrecon -d target.com -t goo |
| -t snoop | DNS cache snooping করোPerform DNS cache snooping | dnsrecon -d target.com -t snoop -n ns1.target.com |
| -t srv | SRV record enumerate করোEnumerate SRV records | dnsrecon -d target.com -t srv |
| -t tld | TLD enumeration করোTLD enumeration | dnsrecon -d target -t tld |
| -D wordlist.txt | Brute force-এর জন্য wordlist file দাওProvide wordlist file for brute force | -D /usr/share/wordlists/subdomains.txt |
| -n ns1.target.com | নির্দিষ্ট name server ব্যবহার করোUse specific name server | -n ns1.target.com |
| -r range | IP range-এ reverse lookup করোReverse lookup on IP range | -r 192.168.1.1-192.168.1.254 |
| -x output.xml | XML format-এ result save করোSave results in XML format | -x dns_result.xml |
| -j output.json | JSON format-এ result save করোSave results in JSON format | -j dns_result.json |
| -c output.csv | CSV format-এ result save করোSave results in CSV format | -c dns_result.csv |
| -v | Verbose outputVerbose output | -v |
| কাজAction | কীভাবেHow |
|---|---|
| Launch করোLaunch | maltego টার্মিনালে টাইপ করোtype in terminal |
| New Graph তৈরি করোCreate new graph | File → New Graph |
| Domain Entity যোগ করোAdd Domain entity | Entity palette থেকে Domain drag করোDrag Domain from entity palette |
| Transform চালাওrun | Right click → Run Transform |
| Report export করোExport report | File → Export → PDF/CSV |
| কমান্ডCommand | কাজFunction |
|---|---|
| shodan init API_KEY | API key দিয়ে initialize করোInitialize with API key |
| shodan host 8.8.8.8 | নির্দিষ্ট IP-র সব info দেখাওShow all info for a specific IP |
| shodan search "apache 2.4" | Apache 2.4 চালানো সব device খোঁজোFind all devices running Apache 2.4 |
| shodan search "port:22 country:BD" | Bangladesh-এ SSH open এমন host খোঁজোFind hosts with open SSH in Bangladesh |
| shodan count "nginx" | Nginx চালানো কতটি device আছে count করোCount devices running nginx |
| shodan download results "apache" | Result download করোDownload results |
| shodan stats --facets country "apache" | Country-wise statistics দেখাওShow country-wise statistics |
| shodan myip | তোমার নিজের public IP দেখাওShow your own public IP |
| shodan domain target.com | Domain সম্পর্কে Shodan info দেখাওShow Shodan info about domain |
| Flag | কাজFunction | উদাহরণExample |
|---|---|---|
| -w | Whois lookup করোPerform Whois lookup | dmitry -w target.com |
| -e | Email address খোঁজোSearch for email addresses | dmitry -e target.com |
| -s | Subdomain খোঁজোSearch for subdomains | dmitry -s target.com |
| -n | Netcraft info দেখাওGet Netcraft info | dmitry -n target.com |
| -p | TCP port scan করোPerform TCP port scan | dmitry -p target.com |
| -i | Whois IP lookup করোWhois IP lookup | dmitry -i target.com |
| -o file | Output file-এ save করোSave output to file | dmitry -wesnpo out target.com |
| কমান্ডCommand | কাজFunction |
|---|---|
| fierce --domain target.com | Basic subdomain scan করোBasic subdomain scan |
| fierce --domain target.com --wordlist list.txt | Custom wordlist দিয়ে scan করোScan with custom wordlist |
| fierce --domain target.com --dns-servers 8.8.8.8 | নির্দিষ্ট DNS server ব্যবহার করোUse specific DNS server |
| fierce --domain target.com --subdomains www mail ftp | নির্দিষ্ট subdomain check করোCheck specific subdomains |
| কমান্ডCommand | কাজFunction |
|---|---|
| amass enum -d target.com | Passive subdomain enumerationPassive subdomain enumeration |
| amass enum -active -d target.com | Active enumeration (DNS resolution সহ)Active enumeration with DNS resolution |
| amass enum -brute -d target.com | Brute force subdomainBrute force subdomain |
| amass enum -d target.com -o subs.txt | Result file-এ save করোSave results to file |
| amass intel -whois -d target.com | Whois intelligence gatheringWhois intelligence gathering |
🗡️ "Reconnaissance is the first step — the more you know, the better you attack or defend."
সব কিছু authorized environment-এ practice করো। অন্যের system-এ permission ছাড়া কোনো কিছু করা illegal। Practice everything in authorized environments only. Doing anything on others' systems without permission is illegal.
Kali Linux Series — Part 1 | v1.0 | Basic Commands & Recon Tools
Part 2: Web Hacking Tools (Burp Suite, Nikto, SQLmap, Gobuster) →