当前位置:网站首页>Introduction to web security telent testing and defense
Introduction to web security telent testing and defense
2022-07-25 02:19:00 【51CTO】
telnet brief introduction :
Telnet Agreement is Internet The standard protocol and main way of remote login service . Use on the end user's computer telnet Program , Use it to connect to the server . To start a telnet conversation , You must enter a user name and password to log in to the server .Telnet It's a common remote control Web Server method .
telnet It is often used to test network and port occupancy .

Safe hidden trouble
Telnet Is a clear text transfer protocol , It will all the content of the user , Including user name and password are transmitted in clear text on the Internet , It has certain potential safety hazards .
majority Telnet The default method of the program is : One character at a time , The client sends each character entered by the user to the server separately , Server echo character to client .
Defensive skills
The administrator sets the user name and password that are easy to guess ( Weak password ), Then the server is easy for hackers to use the corresponding password tools to violently explode weak passwords .
1、 Discontinue use telnet Services and ports
2、 Use the honeypot to open telnet service
3、 Replace with ssh Protocol login
Message analysis
Use kali In the system hydra Blasting

Make a user name dictionary

Make account information

Have in hand

Successful login system information .
边栏推荐
- I was forced to graduate by a big factory and recited the eight part essay in a two-month window. Fortunately, I went ashore, otherwise I wouldn't be able to repay the mortgage
- Experienced the troubleshooting and solution process of an online CPU100% and the application of oom
- Upgrade the leapfrog products again, and the 2023 Geely Xingrui will be sold from 113700 yuan
- Create thread: pthread_ create
- High performance memory recovery technology for decrypting ark -- HPP GC
- C traps and defects Chapter 2 lexical "traps" 2.4 switch statements
- Interpretation of video generation paper of fed shot video to video (neurips 2019)
- After upgrading v2.1.0, the synchronization failed
- Talk about resume optimization and interview skills of algorithm post!
- SetTimeout parameters [easy to understand]
猜你喜欢

Consul cluster deployment

Simulate the implementation of StrCmp function

Talk about resume optimization and interview skills of algorithm post!

Hbuilderx developed by uni app connects to night God simulator

Mobile Robotics (3) Kalman filter
![[leetcode] 3. Longest substring without repeated characters - go language problem solution](/img/63/57d3557d77d44b51b7d0f71669568f.png)
[leetcode] 3. Longest substring without repeated characters - go language problem solution
![[system design] distributed key value database](/img/57/4d835d83f0e6ffb87e8ba39ec3b482.png)
[system design] distributed key value database

6-11 vulnerability exploitation - use the built environment to send emails

BMW I3 based on clar architecture is not a simple "oil to electricity" product

Using ODBC to consume SAP ABAP CDs view in Excel
随机推荐
"I gave up programming and wrote a 1.3 million word hard science fiction."
Easy to master SSO single sign on, see this article
Gerrit statistics script
Peripherals: interrupt system of keys and CPU
Research 280+ documents! The team of Tsinghua Huang Gao, the winner of CVPR best paper, proposed the first dynamic network overview to comprehensively review the development of dynamic networks!
Download files and web pages with WGet
[leetcode] 3. Longest substring without repeated characters - go language problem solution
See you in Suzhou! "Cloud Intelligence Technology Forum - industry special" will be held soon
Solution to the occupation of project startup port
Ogg data extraction delay is large
Project management tool Zen
Point to point copy and paste of web pages
Mobile Robotics (3) Kalman filter
Google launched another "man grabbing war" for core making, and Intel's 17 year veteran joined!
When executing SQL query statements in MySQL database, the underlying implementation principle (ultra detailed)
Actf questions (dropper+master_of_dns)
Focus on improving women's and children's sense of gain, happiness and security! In the next ten years, Guangzhou Women's and children's undertakings will make such efforts
Windows Server 2022 received a non security update in July: fix the sticking problem caused by defender
Academicians said: researchers should also support their families. They can only do short-term and fast research if they are not promoted
Can PostgreSQL CDC only connect to the main database? Connection from the library reports an error logical decoden