Aller au contenu

Immunité

Copier toutes les commandes Générer PDF

Commandes d'immunité complètes et flux de travail pour l'administration du système sur toutes les plateformes.

Commandes de base

Command Description
immunity --version Show immunity version
immunity --help Display help information
immunity init Initialize immunity in current directory
immunity status Check current status
immunity list List available options
immunity info Display system information
immunity config Show configuration settings
immunity update Update to latest version
immunity start Start immunity service
immunity stop Stop immunity service
immunity restart Restart immunity service
immunity reload Reload configuration

Installation

Linux/Ubuntu

# Package manager installation
sudo apt update
sudo apt install immunity

# Alternative installation
wget https://github.com/example/immunity/releases/latest/download/immunity-linux
chmod +x immunity-linux
sudo mv immunity-linux /usr/local/bin/immunity

# Build from source
git clone https://github.com/example/immunity.git
cd immunity
make && sudo make install

MACOS

# Homebrew installation
brew install immunity

# MacPorts installation
sudo port install immunity

# Manual installation
curl -L -o immunity https://github.com/example/immunity/releases/latest/download/immunity-macos
chmod +x immunity
sudo mv immunity /usr/local/bin/
```_

### Fenêtres
```powershell
# Chocolatey installation
choco install immunity

# Scoop installation
scoop install immunity

# Winget installation
winget install immunity

# Manual installation
# Download from https://github.com/example/immunity/releases
# Extract and add to PATH
```_

## Configuration

|Command|Description|
|---------|-------------|
|`immunity config show`|Display current configuration|
|`immunity config list`|List all configuration options|
|`immunity config set <key> <value>`|Set configuration value|
|`immunity config get <key>`|Get configuration value|
|`immunity config unset <key>`|Remove configuration value|
|`immunity config reset`|Reset to default configuration|
|`immunity config validate`|Validate configuration file|
|`immunity config export`|Export configuration to file|

## Opérations avancées

### Opérations de fichiers
```bash
# Create new file/resource
immunity create <name>

# Read file/resource
immunity read <name>

# Update existing file/resource
immunity update <name>

# Delete file/resource
immunity delete <name>

# Copy file/resource
immunity copy <source> <destination>

# Move file/resource
immunity move <source> <destination>

# List all files/resources
immunity list --all

# Search for files/resources
immunity search <pattern>

Opérations réseau

# Connect to remote host
immunity connect <host>:<port>

# Listen on specific port
immunity listen --port <port>

# Send data to target
immunity send --target <host> --data "<data>"

# Receive data from source
immunity receive --source <host>

# Test connectivity
immunity ping <host>

# Scan network range
immunity scan <network>

# Monitor network traffic
immunity monitor --interface <interface>

# Proxy connections
immunity proxy --listen <port> --target <host>:<port>

Gestion des processus

# Start background process
immunity start --daemon

# Stop running process
immunity stop --force

# Restart with new configuration
immunity restart --config <file>

# Check process status
immunity status --verbose

# Monitor process performance
immunity monitor --metrics

# Kill all processes
immunity killall

# Show running processes
immunity ps

# Manage process priority
immunity priority --pid <pid> --level <level>

Caractéristiques de sécurité

Authentification

# Login with username/password
immunity login --user <username>

# Login with API key
immunity login --api-key <key>

# Login with certificate
immunity login --cert <cert_file>

# Logout current session
immunity logout

# Change password
immunity passwd

# Generate new API key
immunity generate-key --name <key_name>

# List active sessions
immunity sessions

# Revoke session
immunity revoke --session <session_id>

Chiffrement

# Encrypt file
immunity encrypt --input <file> --output <encrypted_file>

# Decrypt file
immunity decrypt --input <encrypted_file> --output <file>

# Generate encryption key
immunity keygen --type <type> --size <size>

# Sign file
immunity sign --input <file> --key <private_key>

# Verify signature
immunity verify --input <file> --signature <sig_file>

# Hash file
immunity hash --algorithm <algo> --input <file>

# Generate certificate
immunity cert generate --name <name> --days <days>

# Verify certificate
immunity cert verify --cert <cert_file>

Surveillance et exploitation forestière

Surveillance du système

# Monitor system resources
immunity monitor --system

# Monitor specific process
immunity monitor --pid <pid>

# Monitor network activity
immunity monitor --network

# Monitor file changes
immunity monitor --files <directory>

# Real-time monitoring
immunity monitor --real-time --interval 1

# Generate monitoring report
immunity report --type monitoring --output <file>

# Set monitoring alerts
immunity alert --threshold <value> --action <action>

# View monitoring history
immunity history --type monitoring

Exploitation forestière

# View logs
immunity logs

# View logs with filter
immunity logs --filter <pattern>

# Follow logs in real-time
immunity logs --follow

# Set log level
immunity logs --level <level>

# Rotate logs
immunity logs --rotate

# Export logs
immunity logs --export <file>

# Clear logs
immunity logs --clear

# Archive logs
immunity logs --archive <archive_file>

Dépannage

Questions communes

Numéro : Commande non trouvée

# Check if immunity is installed
which immunity
immunity --version

# Check PATH variable
echo $PATH

# Reinstall if necessary
sudo apt reinstall immunity
# or
brew reinstall immunity

Émission : autorisation refusée

# Run with elevated privileges
sudo immunity <command>

# Check file permissions
ls -la $(which immunity)

# Fix permissions
chmod +x /usr/local/bin/immunity

# Check ownership
sudo chown $USER:$USER /usr/local/bin/immunity

Question : Erreurs de configuration

# Validate configuration
immunity config validate

# Reset to default configuration
immunity config reset

# Check configuration file location
immunity config show --file

# Backup current configuration
immunity config export > backup.conf

# Restore from backup
immunity config import backup.conf

*Numéro: Le service ne démarre pas *

# Check service status
immunity status --detailed

# Check system logs
journalctl -u immunity

# Start in debug mode
immunity start --debug

# Check port availability
netstat -tulpn|grep <port>

# Kill conflicting processes
immunity killall --force

Déboguer les commandes

Command Description
immunity --debug Enable debug output
immunity --verbose Enable verbose logging
immunity --trace Enable trace logging
immunity test Run built-in tests
immunity doctor Run system health check
immunity diagnose Generate diagnostic report
immunity benchmark Run performance benchmarks
immunity validate Validate installation and configuration

Optimisation des performances

Gestion des ressources

# Set memory limit
immunity --max-memory 1G <command>

# Set CPU limit
immunity --max-cpu 2 <command>

# Enable caching
immunity --cache-enabled <command>

# Set cache size
immunity --cache-size 100M <command>

# Clear cache
immunity cache clear

# Show cache statistics
immunity cache stats

# Optimize performance
immunity optimize --profile <profile>

# Show performance metrics
immunity metrics

Traitement parallèle

# Enable parallel processing
immunity --parallel <command>

# Set number of workers
immunity --workers 4 <command>

# Process in batches
immunity --batch-size 100 <command>

# Queue management
immunity queue add <item>
immunity queue process
immunity queue status
immunity queue clear

Intégration

Scénario

#!/bin/bash
# Example script using immunity

set -euo pipefail

# Configuration
CONFIG_FILE="config.yaml"
LOG_FILE="immunity.log"

# Check if immunity is available
if ! command -v immunity &> /dev/null; then
    echo "Error: immunity is not installed" >&2
    exit 1
fi

# Function to log messages
log() \\\\{
    echo "$(date '+%Y-%m-%d %H:%M:%S') - $1"|tee -a "$LOG_FILE"
\\\\}

# Main operation
main() \\\\{
    log "Starting immunity operation"

    if immunity --config "$CONFIG_FILE" run; then
        log "Operation completed successfully"
        exit 0
    else
        log "Operation failed with exit code $?"
        exit 1
    fi
\\\\}

# Cleanup function
cleanup() \\\\{
    log "Cleaning up"
    immunity cleanup
\\\\}

# Set trap for cleanup
trap cleanup EXIT

# Run main function
main "$@"

Intégration de l'API

#!/usr/bin/env python3
"""
Python wrapper for the tool
"""

import subprocess
import json
import logging
from pathlib import Path
from typing import Dict, List, Optional

class ToolWrapper:
    def __init__(self, config_file: Optional[str] = None):
        self.config_file = config_file
        self.logger = logging.getLogger(__name__)

    def run_command(self, args: List[str]) -> Dict:
        """Run command and return parsed output"""
        cmd = ['tool_name']

        if self.config_file:
            cmd.extend(['--config', self.config_file])

        cmd.extend(args)

        try:
            result = subprocess.run(
                cmd,
                capture_output=True,
                text=True,
                check=True
            )
            return \\\\{'stdout': result.stdout, 'stderr': result.stderr\\\\}
        except subprocess.CalledProcessError as e:
            self.logger.error(f"Command failed: \\\\{e\\\\}")
            raise

    def status(self) -> Dict:
        """Get current status"""
        return self.run_command(['status'])

    def start(self) -> Dict:
        """Start service"""
        return self.run_command(['start'])

    def stop(self) -> Dict:
        """Stop service"""
        return self.run_command(['stop'])

# Example usage
if __name__ == "__main__":
    wrapper = ToolWrapper()
    status = wrapper.status()
    print(json.dumps(status, indent=2))

Variables d'environnement

Variable Description Default
IMMUNITY_CONFIG Configuration file path ~/.immunity/config.yaml
IMMUNITY_HOME Home directory ~/.immunity
IMMUNITY_LOG_LEVEL Logging level INFO
IMMUNITY_LOG_FILE Log file path ~/.immunity/logs/immunity.log
IMMUNITY_CACHE_DIR Cache directory ~/.immunity/cache
IMMUNITY_DATA_DIR Data directory ~/.immunity/data
IMMUNITY_TIMEOUT Default timeout 30s
IMMUNITY_MAX_WORKERS Maximum workers 4

Fichier de configuration

# ~/.immunity/config.yaml
version: "1.0"

# General settings
settings:
  debug: false
  verbose: false
  log_level: "INFO"
  log_file: "~/.immunity/logs/immunity.log"
  timeout: 30
  max_workers: 4

# Network configuration
network:
  host: "localhost"
  port: 8080
  ssl: true
  timeout: 30
  retries: 3

# Security settings
security:
  auth_required: true
  api_key: ""
  encryption: "AES256"
  verify_ssl: true

# Performance settings
performance:
  cache_enabled: true
  cache_size: "100M"
  cache_dir: "~/.immunity/cache"
  max_memory: "1G"

# Monitoring settings
monitoring:
  enabled: true
  interval: 60
  metrics_enabled: true
  alerts_enabled: true

Exemples

Flux de travail de base

# 1. Initialize immunity
immunity init

# 2. Configure basic settings
immunity config set host example.com
immunity config set port 8080

# 3. Start service
immunity start

# 4. Check status
immunity status

# 5. Perform operations
immunity run --target example.com

# 6. View results
immunity results

# 7. Stop service
immunity stop

Flux de travail avancé

# Comprehensive operation with monitoring
immunity run \
  --config production.yaml \
  --parallel \
  --workers 8 \
  --verbose \
  --timeout 300 \
  --output json \
  --log-file operation.log

# Monitor in real-time
immunity monitor --real-time --interval 5

# Generate report
immunity report --type comprehensive --output report.html

Exemple d'automatisation

#!/bin/bash
# Automated immunity workflow

# Configuration
TARGETS_FILE="targets.txt"
RESULTS_DIR="results/$(date +%Y-%m-%d)"
CONFIG_FILE="automation.yaml"

# Create results directory
mkdir -p "$RESULTS_DIR"

# Process each target
while IFS= read -r target; do
    echo "Processing $target..."

    immunity \
        --config "$CONFIG_FILE" \
        --output json \
        --output-file "$RESULTS_DIR/$\\\\{target\\\\}.json" \
        run "$target"

done < "$TARGETS_FILE"

# Generate summary report
immunity report summary \
    --input "$RESULTS_DIR/*.json" \
    --output "$RESULTS_DIR/summary.html"

Meilleures pratiques

Sécurité

  • Vérifiez toujours les comptes de chèques lors du téléchargement des binaires
  • Utiliser des méthodes d'authentification fortes (clés API, certificats)
  • Mise à jour régulière de la dernière version
  • Suivre le principe du moindre privilège
  • Activer l'enregistrement des audits pour assurer la conformité
  • Utiliser des connexions chiffrées lorsque c'est possible
  • Valider toutes les entrées et configurations
  • Mettre en place des contrôles d'accès appropriés

Rendement

  • Utiliser des limites de ressources appropriées pour votre environnement
  • Surveiller régulièrement les performances du système
  • Optimisez la configuration pour votre cas d'utilisation
  • Utiliser le traitement parallèle lorsque bénéfique
  • Mettre en œuvre des stratégies de mise en cache appropriées
  • Entretien et nettoyage réguliers
  • Goulets d'étranglement de performance du profil
  • Utiliser des algorithmes et des structures de données efficaces

Opérations

  • Tenir une documentation complète
  • Mettre en œuvre des stratégies de sauvegarde appropriées
  • Utiliser le contrôle de version pour les configurations
  • Surveiller et alerter les mesures critiques
  • Mettre en œuvre un traitement approprié des erreurs
  • Utiliser l'automatisation pour les tâches répétitives
  • Vérifications et mises à jour régulières de la sécurité
  • Plan de reprise après sinistre

Développement

  • Suivre les normes et conventions de codage
  • Écrire des tests complets
  • Utiliser l'intégration/déploiement continu
  • Mettre en œuvre une exploitation et un suivi appropriés
  • Documenter les API et les interfaces
  • Utiliser efficacement le contrôle de version
  • Révision régulière du code
  • Maintenir la compatibilité arrière

Ressources

Documentation officielle

  • [Site Web officiel] (LINK_18)
  • [Documentation] (LINK_18)
  • [Référence API] (LINK_18)
  • [Guide d'installation] (LINK_18)
  • [Référence de configuration] (LINK_18)

Ressources communautaires

  • [Répertoire GitHub] (LINK_18)
  • [Suivi d'émission] (LINK_18)
  • [Forum communautaire] (LINK_18)
  • [Serveur de discorde] (LINK_18)
  • [Communauté Reddit] (LINK_18)
  • [Débordement de la pile] (LINK_18)

Ressources pédagogiques

  • [Guide de démarrage] (LINK_18)
  • [Série turque] (LINK_18)
  • [Guide des meilleures pratiques] (LINK_18)
  • [Tutoriels vidéo] (LINK_18)
  • [Cours de formation] (LINK_18)
  • [Programme de certification] (LINK_18)

Outils connexes

  • Git - Fonctionnalité complémentaire
  • [Docker] (LINK_18) - Solution alternative
  • Kubernetes - Partenaire d'intégration

*Dernière mise à jour : 2025-07-06.