科技行者

行者学院 转型私董会 科技行者专题报道 网红大战科技行者

知识库

知识库 安全导航

至顶网网络频道Telnet Protocol-a proposed document(3)

Telnet Protocol-a proposed document(3)

  • 扫一扫
    分享文章到微信

  • 扫一扫
    关注官方公众号
    至顶头条

TELNET is a third-level protocol, the function of which is to make a terminal (or process) at a using site appear to the system or a process at a serving site as logically equivalent to a terminal "directly" connected to the serving site.

作者:论坛整理 来源:ZDNet网络安全 2007年12月27日

关键字: telnet命令 opentelnet linux telnet telnet入侵 telnet telnet端口

  • 评论
  • 分享微博
  • 分享邮件

  -----------------------+ +----------------------

  | |

  \ | | /

  \ -----------------| +-+ +-+ |-----------------/

  \ NCP | |I| |I| | NCP /

  \ ^ <--->|M|---NETWORK--|M|<---> ^ /

  \ -----|-----+ | |P| |P| | +-----|-----/

  \ v | | +-+ +-+ | | v /

  USER \ | | | | TELNET / USER

  PROCESSES, ) TELNET |--| |--|Protocol( PROCESS

  Sub <===> | | | |Routing<--->Sub

  Systems, / ^ | | | | ^^ \Systems

  ETC /-----|-----+ | | +----||-----\ETC

  / TTY v <---> Local Local <===> TTY vv \

  / Handles | Terminals Terminals| Handles <===>

  /-----------------| |-----------------\

  / | | \

  | |

  -----------------------+ +----------------------

  <--->Current TELNET paths

  <===>Candidate future TELNET paths

  Figure 2. Current and Candidate Future TELNET Paths

  +---------------------------+----+----+----+----+----+----+----+----+

  |\ b8 -> | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |

  | \ b7 -> | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 1 |

  | \ b6 -> | 0 | 0 | 1 | 1 | 0 | 0 | 1 | 1 |

  |B \ b5 -> | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 1 |

  | I +---+---+---+---+------+----+----+----+----+----+----+----+----+

  + T | b | b | b | b |\COL->| | | | | | | | |

  \ S| 4 | 3 | 2 | 1 | \ | | | | | | | | |

  \ | | | | | |\ | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 |

  \ | | | | | | | | | v \ | | | | | | | | |

  \ | v | v | v | v |ROW \ | | | | | | | | |

  +---+---+---+---+------+----+----+----+----+----+----+----+----+

  | 0 | 0 | 0 | 0 | 0 |NUL |DLE | SP | 0 | @ | P | \ | p |

  +---+---+---+---+------+----+----+----+----+----+----+----+----+

  | 0 | 0 | 0 | 1 | 1 |SOH |DC1 | ! | 1 | A | Q | a | q |

  +---+---+---+---+------+----+----+----+----+----+----+----+----+

  | 0 | 0 | 1 | 0 | 2 |STX |DC2 | " | 2 | B | R | b | r |

  +---+---+---+---+------+----+----+----+----+----+----+----+----+

  | 0 | 0 | 1 | 1 | 3 |ETX |DC3 | # | 3 | C | S | c | s |

  +---+---+---+---+------+----+----+----+----+----+----+----+----+

  | 0 | 1 | 0 | 0 | 4 |EOT |DC4 | $ | 4 | D | T | d | t |

  +---+---+---+---+------+----+----+----+----+----+----+----+----+

  | 0 | 1 | 0 | 1 | 5 |ENQ |NAC | % | 5 | E | U | e | u |

  +---+---+---+---+------+----+----+----+----+----+----+----+----+

  | 0 | 1 | 1 | 0 | 6 |ACK |SYN | &| 6 | F | V | f | v |

  +---+---+---+---+------+----+----+----+----+----+----+----+----+

  | 0 | 1 | 1 | 1 | 7 |BEL |ETB | ' | 7 | G | W | g | w |

  +---+---+---+---+------+----+----+----+----+----+----+----+----+

  | 1 | 0 | 0 | 0 | 8 | BS |CAN | ( | 8 | H | X | h | x |

  +---+---+---+---+------+----+----+----+----+----+----+----+----+

  | 1 | 0 | 0 | 1 | 9 | HT | EM | ) | 9 | I | Y | i | y |

  +---+---+---+---+------+----+----+----+----+----+----+----+----+

  | 1 | 0 | 1 | 0 | 10 | LF |SUB | * | : | J | Z | j | z |

  +---+---+---+---+------+----+----+----+----+----+----+----+----+

  | 1 | 0 | 1 | 1 | 11 | VT |ESC | + | ;| K | [ | k | { |

  +---+---+---+---+------+----+----+----+----+----+----+----+----+

  | 1 | 1 | 0 | 0 | 12 | FF | FS | , | <| L | \ | l | | |

  +---+---+---+---+------+----+----+----+----+----+----+----+----+

    • 评论
    • 分享微博
    • 分享邮件
    邮件订阅

    如果您非常迫切的想了解IT领域最新产品与技术信息,那么订阅至顶网技术邮件将是您的最佳途径之一。

    重磅专题
    往期文章
    最新文章