Hide

What's this?

commandlinefu.com is the place to record those command-line gems that you return to again and again.

Delete that bloated snippets file you've been using and share your personal repository with the world. That way others can gain from your CLI wisdom and you from theirs too. All commands can be commented on, discussed and voted up or down.


If you have a new feature suggestion or find a bug, please get in touch via http://commandlinefu.uservoice.com/

Get involved!

You can sign-in using OpenID credentials, or register a traditional username and password.

First-time OpenID users will be automatically assigned a username which can be changed after signing in.

Hide

Stay in the loop…

Follow the Tweets.

Every new command is wrapped in a tweet and posted to Twitter. Following the stream is a great way of staying abreast of the latest commands. For the more discerning, there are Twitter accounts for commands that get a minimum of 3 and 10 votes - that way only the great commands get tweeted.

» http://twitter.com/commandlinefu
» http://twitter.com/commandlinefu3
» http://twitter.com/commandlinefu10

Subscribe to the feeds.

Use your favourite RSS aggregator to stay in touch with the latest commands. There are feeds mirroring the 3 Twitter streams as well as for virtually every other subset (users, tags, functions,…):

Subscribe to the feed for:

Hide

News

2011-03-12 - Confoo 2011 presentation
Slides are available from the commandlinefu presentation at Confoo 2011: http://presentations.codeinthehole.com/confoo2011/
2011-01-04 - Moderation now required for new commands
To try and put and end to the spamming, new commands require moderation before they will appear on the site.
2010-12-27 - Apologies for not banning the trolls sooner
Have been away from the interwebs over Christmas. Will be more vigilant henceforth.
2010-09-24 - OAuth and pagination problems fixed
Apologies for the delay in getting Twitter's OAuth supported. Annoying pagination gremlin also fixed.
Hide

Tags

Hide

Functions

Find all files with root SUID or SGID executables

Terminal - Find all files with root SUID or SGID executables
sudo find / -type f \( -perm /4000 -a -user root \) -ls -o \( -perm /2000 -a -group root \) -ls
2009-03-02 18:48:17
User: atoponce
Functions: find sudo
2
Find all files with root SUID or SGID executables

Discovering all executables on your system that can be run as another user, especially root, is critical for system security. The above command will find those files with have SUID or SGID bits set and are owned by the root user or group.

Alternatives

There is 1 alternative - vote for the best!

Terminal - Alternatives

Know a better way?

If you can do better, submit your command here.

What others think

It doesn't run on a Red Hat Linux release 7.3 (Valhalla) with the error:

find: invalid mode `/4000'

Comment by yapt 289 weeks and 3 days ago

RHL 7.3... released May of 2002... 7 years ago. I think it's time to update your system, don't you? However, if you read the man page on find, you'll see that /mode is the preferred way over +mode, but both are identical, even if +mode is deprecated.

Comment by atoponce 289 weeks and 3 days ago

Some companies can't or don't want to upgrade the distro that their software is based on.

Comment by leper421 289 weeks and 3 days ago

Of course. That's why the cracker community flourishes as well as it does. They expect people to not keep updated on patching or upgrading their systems. The more systems that sit unpatched, the more reason for your suffering.

Comment by atoponce 289 weeks and 3 days ago

I'm not defending the practice ;) I just happen to work for a company whose product is based on a 7-8 old linux distro release. Although, we've updated and repackaged so many of the packages and rewritten many config scripts that, at this point, it is pretty much our own distro.

Comment by leper421 288 weeks ago

@atoponce: not every machine is connected to the evil internet, so often there is no need to upgrade the boxens every week...

Comment by lme 286 weeks ago

Your point of view

You must be signed in to comment.

Related sites and podcasts