当前位置:网站首页>Introduction to web security telent testing and defense
Introduction to web security telent testing and defense
2022-07-25 02:19:00 【51CTO】
telnet brief introduction :
Telnet Agreement is Internet The standard protocol and main way of remote login service . Use on the end user's computer telnet Program , Use it to connect to the server . To start a telnet conversation , You must enter a user name and password to log in to the server .Telnet It's a common remote control Web Server method .
telnet It is often used to test network and port occupancy .

Safe hidden trouble
Telnet Is a clear text transfer protocol , It will all the content of the user , Including user name and password are transmitted in clear text on the Internet , It has certain potential safety hazards .
majority Telnet The default method of the program is : One character at a time , The client sends each character entered by the user to the server separately , Server echo character to client .
Defensive skills
The administrator sets the user name and password that are easy to guess ( Weak password ), Then the server is easy for hackers to use the corresponding password tools to violently explode weak passwords .
1、 Discontinue use telnet Services and ports
2、 Use the honeypot to open telnet service
3、 Replace with ssh Protocol login
Message analysis
Use kali In the system hydra Blasting

Make a user name dictionary

Make account information

Have in hand

Successful login system information .
边栏推荐
- Mobile Robotics (3) Kalman filter
- Hcip - BGP - border gateway protocol
- Remote sensing image classification tool and visualization application of WebGIS
- KVM virtualization jobs
- Antdb database products were selected into the global database industry map (2022) of the China Academy of communications and communications
- Jedispoolconfig parameter configuration from the perspective of source code
- Application status of typical marine environmental observation data products and Its Enlightenment to China
- Jsonp solves cross domain plug-ins (JS, TS)
- [programmer interview classic] 01.09 string rotation
- Multithreading and high concurrency (II) -- synchronized locking and unlocking process
猜你喜欢

Focus on improving women's and children's sense of gain, happiness and security! In the next ten years, Guangzhou Women's and children's undertakings will make such efforts

Speed comparison between 64 bit width and 32 bit width of arm64 memory

Componentization and modularization

Antdb database products were selected into the global database industry map (2022) of the China Academy of communications and communications

Beijing Zhun electric clock, Beidou clock server, GPS network time server, NTP satellite timing system

Today in history: the kotlin language was published for the first time; The father of the IMAP agreement was born; CT imaging achieves a new breakthrough

Use SAP ui5 application to consume create and delete operations of OData in business application studio
![Simulation Implementation of [STL] string class](/img/be/2e4f8dd7da59753e109b38fdf51fba.png)
Simulation Implementation of [STL] string class

An article explains unsupervised learning in images in detail

Let's customize the loader
随机推荐
Grpc sets connection lifetime and server health check
Babbitt | metauniverse daily must read: Dubai launched the national metauniverse strategy, which plans to increase the number of related companies of metauniverse by five times in the next five years
R language uses logistic regression, ANOVA, outlier analysis and visual classification iris iris data set
How MySQL 8.0 based on TRX_ Id find the statement of the whole transaction
Inventory of well-known source code mall systems at home and abroad
Alibaba cloud released the white paper "upgrade - standardization of data warehouse upgrade delivery"
Automatically create partition tables by time and month in PostgreSQL
Eolink - quickly develop interfaces through document driven
Application status of typical marine environmental observation data products and Its Enlightenment to China
Simulate the implementation of StrCmp function
Simulate the implementation of strstr
Origin and development of philosophy Hegel external historical form
Arthas case: dynamic update application logger level
Industrial control safety PLC firmware reverse II
Use SAP ui5 application to consume create and delete operations of OData in business application studio
It's still a synchronization problem
[system design] distributed key value database
Remove & lt; li> Front blank distance
The cloud ecology conference comes with the "peak"!
Codeforces:d1. choosing carrots (easy version) [max min problem + control one side to make the other side as close as possible + thinking]