Carlos Polop ad3f52d725 t2
2025-01-03 01:07:38 +01:00

32 lines
880 B
Markdown

# 514 - Pentesting Rsh
{{#include ../banners/hacktricks-training.md}}
## Basic Information
For authentication, **.rhosts** files along with **/etc/hosts.equiv** were utilized by **Rsh**. Authentication was dependent on IP addresses and the Domain Name System (DNS). The ease of spoofing IP addresses, notably on the local network, was a significant vulnerability.
Moreover, it was common for the **.rhosts** files to be placed within the home directories of users, which were often located on Network File System (NFS) volumes.
**Default port**: 514
## Login
```
rsh <IP> <Command>
rsh <IP> -l domain\user <Command>
rsh domain/user@<IP> <Command>
rsh domain\\user@<IP> <Command>
```
### [**Brute Force**](../generic-hacking/brute-force.md#rsh)
## References
- [https://www.ssh.com/ssh/rsh](https://www.ssh.com/ssh/rsh)
{{#include ../banners/hacktricks-training.md}}