1、文件内容查看:
(1)查看/etc/passwd文件的第6行
[root@server tmp]# head -6 /etc/passwd | cat -n | grep 6
6 sync:x:5:0:sync:/sbin:/bin/sync
(2)查看/etc/selinux/config 以 SELINUX开头的行
[root@server tmp]# grep "^SELINUX" /etc/selinux/config
SELINUX=enforcing
SELINUXTYPE=targeted
(3)查找/etc/ssh/sshd_config 以no结尾的行
[root@server tmp]# grep "no$" /etc/ssh/sshd_config
#HostbasedAuthentication no
#IgnoreUserKnownHosts no
#PermitEmptyPasswords no
ChallengeResponseAuthentication no
#KerberosAuthentication no
#KerberosGetAFSToken no
GSSAPICleanupCredentials no
#GSSAPIKeyExchange no
#GSSAPIEnablek5users no
#GatewayPorts no
PrintMotd no
#PermitUserEnvironment no
#UseDNS no
#PermitTunnel no
# X11Forwarding no
# AllowTcpForwarding no
# PermitTTY no
(4)过滤/etc/ssh/sshd_config 包含数字的行
[root@server tmp]# grep [0-9] /etc/ssh/sshd_config
# $OpenBSD: sshd_config,v 1.103 2018/04/09 20:41:22 tj Exp $
# sshd_config(5) for more information.
#Port 22
#ListenAddress 0.0.0.0
HostKey /etc/ssh/ssh_host_ed25519_key
# Please, check manual pages for update-crypto-policies(8) and sshd_config(5).
#LoginGraceTime 2m
#MaxAuthTries 6
#MaxSessions 10
# The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2
#GSSAPIEnablek5users no
X11Forwarding yes
#X11DisplayOffset 10
#X11UseLocalhost yes
#ClientAliveInterval 0
#ClientAliveCountMax 3
#MaxStartups 10:30:100
# X11Forwarding no
2、文本处理命令:
(1)查看/etc/passwd文件以 : 为分隔符的第一列内容,并按字母逆序排序
[root@server tmp]# cat /etc/passwd | cut -d : -f1 | sort -r
(2)使用cut命令将当前主机的ip地址切割显示
[root@server tmp]# ip a | grep "192.168.0.105" | cut -d / -f1 | cut -d " " -f6