hello..

nmap options :

nmap operating system match scan for googles dns
nmap -O 8.8.8.8
Scan all 65535 ports:
nmap -p- 192.168.1.1
TCP SYN and UDP scan for all ports
nmap -sS -sU -PN -p 1-65535 192.168.0.164
Scan for UDP DDOS reflectors ? try
nmap -sU -A -PN -n -pU:19,53,123,161 -script=ntp-monlist,dns-recursion,snmp-sysdescr 192.168.1.0/24

wireshark trough ssh :
ssh 10.0.1.1 "tcpdump -i pppoe-wan -w - 'not port 2'" | wireshark -k -i - <-> wireshark trough ssh with pipe , w big packets
ssh 10.0.1.1 "tcpdump -i pppoe-wan -s0 -w - 'not port 2'" | wireshark -k -i - <-> wireshark trough ssh with pipe , with small packets


manual ip traffic inspection
ip_conntrack for & ipv4 nf_conntrack for ipv6
cat /proc/net/ip_conntrack
cat /proc/net/nf_conntrack


Sed replacement of special characters (and normal)
sed 's/\-/:/g' oui.txt >> ouioui.txt
sed -i 's/geteuid/getppid/' /usr/bin/vlc

Set download bandwitdth limit of eth2 to 0,5 mb with 32kbit burst and drop all later packets than 400 ms
tc qdisc add dev eth2 root tbf rate 512kbit burst 32kbit latency 400ms