Kali Commands
Attacks
Critical Infrastructure
Protocols
100

To create a new directory

mkdir

100

An attack that floods systems, servers, or networks with traffic to exhaust resources and bandwidth

Denial of Service (D.O.S)

100

 This infrasturcture delivers critical water retention and control services.

Dams 

100

Ensures reliable and ordered delivery of data packets over a network.

TCP

200

To move a file

mv

200

A type of malware that encrypts a victim's data or device and threatens to keep it encrypted—or worse—unless the victim pays a ransom

Ransomware

200

Protects your financial assets as well as your ability to access and utilize those assets.

Financial Services

200

Facilitates the routing of data packets between devices on a network.

IP

300

To check the internet connection or to check whether the host is active or not.

Ping
300

An attacker eavesdrop on the data sent back and forth between two people, networks, or computers.

Man-in-the-middle (MITM) attacks

300

Concentrates on population health and spearheads response efforts post-terrorism, infectious disease outbreaks, and natural calamities

Healthcare and Public Health Sector

300

Provides secure remote access to networked devices over an encrypted connection.

SSH ( Secure Shell)

400

Search files for lines that match a given pattern

Grep

400

targets CEO and higher officials of organizations. 

Whaling

400

Moving millions of people and goods across the country every day

Transportation Sector

400

 Assigns IP addresses dynamically to devices on a network.

DHCP (Dynamic Host Configuration Protocol)

500

Change access permissions

Chmod

500

A hacker alters records to send traffic to a fake or “spoofed” website. 

 DNS spoofing

500

Helps save lives, protect property and the environment, and assist in recovery efforts after emergencies and disasters

Emergency Services Sector

500

Enables the sending of email messages between servers.

SMTP ( Simple Mail Transfer Protocol))