科技行者

行者学院 转型私董会 科技行者专题报道 网红大战科技行者

知识库

知识库 安全导航

至顶网网络频道Debian Linux下启动Telnet服务(2)

Debian Linux下启动Telnet服务(2)

  • 扫一扫
    分享文章到微信

  • 扫一扫
    关注官方公众号
    至顶头条

从上面我们可以看到我们已经连接成功了,但是使用root连接的时候会失败,因为默认的安全设置是限制root用户使用telnet连接主机的.

作者:论坛整理 来源:ZDNet网络安全 2007年12月18日

关键字: telnet命令 opentelnet linux telnet telnet入侵 telnet telnet端口

  • 评论
  • 分享微博
  • 分享邮件

  Unpacking telnet (from ……/telnet_0.17-25_i386.deb) ……

  Setting up telnet (0.17-25) ……

  我们查看一下地址

  root@2[/]# ifconfig

  eth0 Link encap:Ethernet HWaddr 00:10:A4:9F:2B:FF

  inet addr:192.168.1.254 Bcast:192.168.1.255 Mask:255.255.255.0

  inet6 addr: fe80::210:a4ff:fe9f:2bff/64 Scope:Link

  UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1

  RX packets:106942 errors:0 dropped:0 overruns:0 frame:0

  TX packets:103319 errors:0 dropped:0 overruns:0 carrier:0

  collisions:9 txqueuelen:1000

  RX bytes:110201058 (105.0 MiB) TX bytes:11096727 (10.5 MiB)

  Interrupt:11 Base address:0x4800

  lo Link encap:Local Loopback

  inet addr:127.0.0.1 Mask:255.0.0.0

  inet6 addr: ::1/128 Scope:Host

  UP LOOPBACK RUNNING MTU:16436 Metric:1

  RX packets:4410 errors:0 dropped:0 overruns:0 frame:0

  TX packets:4410 errors:0 dropped:0 overruns:0 carrier:0

  collisions:0 txqueuelen:0

  RX bytes:1030232 (1006.0 KiB) TX bytes:1030232 (1006.0 KiB)

  root@2[/]# telnet192.168.1.254

  Trying 192.168.1.254……

  Connected to 192.168.1.254.

  Escape character is '^]'.

  lcnja.8800.org login: root

  Login incorrect

  lcnja.8800.org login: lcnja

  Password:

  Last login: Mon Sep 27 20:51:33 2004 from localhost.localdomain on pts/3

  Linuxdebian 2.6.8-1-686 #1 Tue Sep 14 00:22:58 EDT 2004 i686 GNU/Linux

  The programs included with the Debian GNU/Linux system are free software;

  the exact distribution terms for each program are described in the

  individual files in /usr/share/doc/*/copyright.

  Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent

  permitted by applicable law.

  lcnja@lcnja:~$

  从上面我们可以看到我们已经连接成功了,但是使用root连接的时候会失败,因为默认的安全设置是限制root用户使用telnet连接主机的.

  本来因为telnet是明文传输的,所以处于安全考虑才限制了root从telnet登陆,如果你需要使用,那么如下修改

  root@2[/]# nano /etc/pam.d/login

  #

  # The PAM configuration file for the Shadow `login' service

  #

  # NOTE: If you use a session module (such as kerberos or NIS+)

  # that retains persistent credentials (like key caches, etc), you

  # need to enable the `CLOSE_SESSIONS' option in /etc/login.defs

  # in order for login to stay around until after logout to call

  # pam_close_session() and cleanup.

  #

  # Outputs an issue file prior to each login prompt (Replaces the

  # ISSUE_FILE option from login.defs). Uncomment for use

  # auth required pam_issue.so issue=/etc/issue

  # Disallows root logins except on tty's listed in /etc/securetty

  # (Replaces the `CONSOLE' setting from login.defs)

  #把下面在行注释掉

  # auth requisite pam_securetty.so

  # Disallows other than root logins when /etc/nologin exists

  # (Replaces the `NOLOGINS_FILE' option from login.defs)

  auth requisite pam_nologin.so

  # This module parses /etc/environment (the standard for setting

  # environ vars) and also allows you to use an extended config

  # file /etc/security/pam_env.conf.

  # (Replaces the `ENVIRON_FILE' setting from login.defs)

  auth required pam_env.so

  # Standard Un*x authentication. The "nullok" line allows passwordless

  # accounts.

  @include common-auth

  # This allows certain extra groups to be granted to a user

  # based on things like time of day, tty, service, and user.

  # Please uncomment and edit /etc/security/group.conf if you

  # wish to use this.

  # (Replaces the `CONSOLE_GROUPS' option in login.defs)

  # auth optional pam_group.so

  # Uncomment and edit /etc/security/time.conf if you n

  好,现在一个telnet我们就在debian下面架设好了,当然最后一步本人不建议你做

  因为telnet是内镶在xinetd这个服务里面的,所以如果你要启动或者是要停止该服务就要

  root@2[/]# /etc/init.d/xinetd

  force-reload reload restart start stop

  看上面的自己选择

    • 评论
    • 分享微博
    • 分享邮件
    邮件订阅

    如果您非常迫切的想了解IT领域最新产品与技术信息,那么订阅至顶网技术邮件将是您的最佳途径之一。

    重磅专题
    往期文章
    最新文章