R-Services (512,513,514)
Much like telnet
, r-services transmit information from client to server(and vice versa.) over the network in an unencrypted format, making it possible for attackers to intercept network traffic (passwords, login information, etc.) by performing man-in-the-middle (MITM
) attacks.
Command
Service Daemon
Port
Transport Protocol
Description
rcp
rshd
514
TCP
Copy a file or directory bidirectionally from the local system to the remote system (or vice versa) or from one remote system to another. It works like the cp
command on Linux but provides no warning to the user for overwriting existing files on a system
.
rsh
rshd
514
TCP
Opens a shell on a remote machine without a login procedure. Relies upon the trusted entries in the /etc/hosts.equiv
and .rhosts
files for validation.
rexec
rexecd
512
TCP
Enables a user to run shell commands on a remote machine. Requires authentication through the use of a username
and password
through an unencrypted network socket. Authentication is overridden by the trusted entries in the /etc/hosts.equiv
and .rhosts
files.
rlogin
rlogind
513
TCP
Enables a user to log in to a remote host over the network. It works similarly to telnet
but can only connect to Unix-like hosts. Authentication is overridden by the trusted entries in the /etc/hosts.equiv
and .rhosts
files.
Nmap
$ sudo nmap -sV -p 512,513,514 10.0.17.2
Login
$ rlogin 10.0.17.2 -l htb-student
Last login: Fri Dec 2 16:11:21 from localhost
[htb-student@localhost ~]$
Listing Authenticated Users Using Rwho
$ rwho
root web01:pts/0 Dec 2 21:34
htb-student workstn01:tty1 Dec 2 19:57 2:25
Listing Authenticated Users Using Rusers
rusers -al 10.0.17.5
htb-student 10.0.17.5:console Dec 2 19:57 2:25
Interesting Books
Interesting BooksThe Art of Network Penetration Testing A guide to simulating an internal security breach. You’ll take on the role of the attacker and work through every stage of a professional pentest, from information gathering to seizing control of a system and owning the network.
Network Basics for Hackers The book offers one of the most complete and in-depth analyses of Wi-Fi and Bluetooth networks, then progresses through the various protocols such as DNS, ARP, SMTP, and others.
Support this Gitbook
I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.
Last updated