Linux command: SSH command telnet

Source: Internet
Author: User
Tags ssh port ssh secure shell

1. View the SSH client version

Sometimes it is necessary to confirm the SSH client and its corresponding version number. Use the SSH-V command to get the version number. It is important to note that Linux generally comes with OpenSSH: The following example shows that the system is using OpenSSH:

$ ssh-v
OPENSSH_3.9P1, OpenSSL 0.9.7a Feb 19 2003

The following example shows that the system is using SSH2:

$ ssh-v
Ssh:ssh Secure Shell (non-commercial version) on I686-pc-linux-gnu

2. Connect to the remote host:

Command format:
SSH [email protected] or
SSH remoteserver-l Name
Note: Both of these methods can telnet to the remote host, the server represents the remote host, and the name is the user name of the remote host that is logged on.

3. Connect to the port specified by the remote host:

Command format:
SSH [email protected]-P 2222 or
SSH remoteserver-l name-p 2222
Note: The p parameter specifies the port number, usually in the route to do ports mapping, we do not map the 22 port directly out, but instead of the conversion to other port number, then we need to use the-P port number command format.

4. Jump to remote host 2 via remote Host 1:

Command format:
Ssh-t remoteserver1 ssh Remoteserver2
Description: When the remote host Remoteserver2 cannot be reached directly, you can use the-t parameter and then jump from Remoteserver1 to Remoteserver2. In this process, you need to enter the Remoteserver1 password, and then enter the Remoteserver2 password, then you can operate the remoteserver2.

5. Run the remote shell command via SSH:

Command format:
Ssh-l name remoteserver ' command '
Description: Connect to the remote host and execute command commands for the remote host. For example, view the memory usage of the remote host.
$ ssh-l Root svmon-g

6. Modify the SSH listening port:

By default, SSH listens to the connection port 22, the attacker uses the port scanning software to see if the host is running the SSH service, it is a wise choice to modify the SSH port to a port greater than 1024, because most of the port scanning software (including nmap) does not scan the high port by default. Open the/etc/ssh/sshd_config file and look for a line such as the following:
Port 22
Remove the # number in front of the line, then modify the port number and restart the SSH service:
$/etc/init.d/ssh Restart

7. Allow only SSH protocol version 2:

There are two SSH protocol versions, only using SSH protocol version 2 is more secure, SSH protocol version 1 has security issues, including man-in-the-middle attacks (man-in-the-middle) and injection (insertion) attacks. Edit the/etc/ssh/sshd_config file and look for a line such as the following:
# Protocol 2,1
Revision changed to
Protocol 2

8, prohibit the root user login:

Usually, do not use directly with the root user to log on to the remote host, because the root user has super privilege, this will bring security risks, so, generally we use ordinary user login, when the need to manage the remote host, and then switch to the root user. Open the/etc/ssh/sshd_config file and look for a line such as the following:
#PermitRootLogin Yes
Remove the # number and then modify yes to No to restart the SSH service so that the root user can be prevented from logging on.

Remove the # number and replace the full path of the Bannertest.txt file with/some/path, then save and restart the SSH service. When the client logs in, you will see a prompt in the Bannertest.txt file.

9. Port mapping:

If the company intranet has a Web server, but only inward and outward, so that the external network can not access the port map with SSH to achieve the external network access to the Web server intranet. If the Web server name is Webserver,webserver, you can use SSH to access the remote host RemoteServer, log in to Webserver, and then use the following command to map
Command format:
Ssh-r 3000:localhost:80 RemoteServer
After execution, on the RemoteServer machine, perform the Netstat-an | grep 3000 to see if there is a 3000 port open. and execute the following command to see if the Web page on webserver can be opened
$ w3m
If you can open the interface, the mapping succeeds. However, this is limited to native access to the Web server, which can only remoteserver machine access to webserver. Because Port 3000 is bound to the port of the remoteserver machine. You can edit the/etc/ssh/sshd_config file on the RemoteServer machine and add the following:
Add the Gatewayports yes content, bind the listening port 3000 to the address so that all external machines can access the listening port and then save the exit. and restart the SSH service. When finished, other machines can enter http://remoteserver:3000 in the browser to access the webserver.

10. Set the prompt information at login

First edit a file, such as Bannertest.txt, the file content is defined by itself. Then open the/etc/ssh/sshd_config file and look for a line such as the following:

Summary of common usage of reference Ssh

Linux command: SSH command telnet

Related Article

E-Commerce Solutions

Leverage the same tools powering the Alibaba Ecosystem

Learn more >

Apsara Conference 2019

The Rise of Data Intelligence, September 25th - 27th, Hangzhou, China

Learn more >

Alibaba Cloud Free Trial

Learn and experience the power of Alibaba Cloud with a free trial worth $300-1200 USD

Learn more >

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: and provide relevant evidence. A staff member will contact you within 5 working days.