Host-AIP: 192.168.56.129OS: RHEL5.932bitService: telnet-serverHost-BIP: 192.168.56.128OS: RHEL5.932bitService: telnet-cl
Host-
IP: 192.168.56.129 OS: RHEL5.9 32bit Service: telnet-server
Host-B
IP: 192.168.56.128 OS: RHEL5.9 32bit Service: telnet-client
View Nic information on HostA
12345678910 |
# ifconfig eht0 eth0 Link encap:Ethernet HWaddr 00 :0C: 29 :CC: 30 :9A inet addr: 192.168 . 56.129 Bcast: 192.168 . 56.255 Mask: 255.255 . 255.0 inet6 addr: fe80::20c:29ff:fecc:309a/ 64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU: 1500 Metric: 1 RX packets: 4914 errors: 0 dropped: 0 overruns: 0 frame: 0 TX packets: 3705 errors: 0 dropped: 0 overruns: 0 carrier: 0 collisions: 0 txqueuelen: 1000 RX bytes: 2419811 ( 2.3 MiB) TX bytes: 276508 ( 270.0 KiB) Interrupt: 67 Base address: 0x2024 |
Start the telnet service
We can clearly see that the username is "root" and the password is "redhat". Therefore, telnet is a plaintext transmission protocol that is extremely insecure. we recommend that you use ssh v2.
The above operation proves the plaintext transmission password of telnet, and the protocol does not undergo any encryption measures, so we hope to have a deep understanding. In addition, there are also plain text transmission passwords like ftp, rlogin, smtp, and pop3, but the most dangerous thing is telnet, because the user name and password of the operating system are the ones that are hijacked.