Host-AIP: 192.168.56.129OS: RHEL5.932bitService: telnet-serverHost-BIP: 192.168.56.128OS: RHEL5.932bitService: telnet-cl
Host-
IP: 192.168.56.129 OS: RHEL5.9 32bit Service: telnet-server
Host-B
IP: 192.168.56.128 OS: RHEL5.9 32bit Service: telnet-client
View Nic information on HostA
| 12345678910 |
# ifconfig eht0 eth0 Link encap:Ethernet HWaddr 00:0C:29:CC:30:9A inet addr:192.168.56.129Bcast:192.168.56.255Mask:255.255.255.0inet6 addr: fe80::20c:29ff:fecc:309a/64Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500Metric:1RX packets:4914errors:0dropped:0overruns:0frame:0TX packets:3705errors:0dropped:0overruns:0carrier:0collisions:0txqueuelen:1000RX bytes:2419811(2.3MiB) TX bytes:276508(270.0KiB) Interrupt:67Base address:0x2024 |
Start the telnet service
We can clearly see that the username is "root" and the password is "redhat". Therefore, telnet is a plaintext transmission protocol that is extremely insecure. we recommend that you use ssh v2.
The above operation proves the plaintext transmission password of telnet, and the protocol does not undergo any encryption measures, so we hope to have a deep understanding. In addition, there are also plain text transmission passwords like ftp, rlogin, smtp, and pop3, but the most dangerous thing is telnet, because the user name and password of the operating system are the ones that are hijacked.