Posted: . At: 11:01 AM. This was 5 years ago. Post ID: 13682
Page permalink. WordPress uses cookies, or tiny pieces of information stored on your computer, to verify who you are. There are cookies for logged in users and for commenters.
These cookies expire two weeks after they are set.



Sponsored



Another way to access a remote Linux machine, but it is insecure.


There is an alternative to SSH for accessing a remote Linux machine, this is RSH. This works on machines that have SSH enabled, but the connection is not encrypted as it is with SSH.

Connect to a remote server like this. The -p parameter defines the port used to connect to the remote machine.

4.4 Wed Oct 23 jason@Yog-Sothoth 0: $ rsh [email protected] -p 443
Ubuntu 16.04.6 LTS
[email protected]'s password: 
Welcome to Ubuntu 16.04.6 LTS (GNU/Linux 4.8.4 x86_64)
 
 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/advantage
 
To find a package which name or description contains a keyword use:
'apt-cache search <keyword>'. 'apt-cache showpkg <packagename>' to get
details.
 
18 packages can be updated.
0 updates are security updates.
 
Last login: Mon Oct 21 10:09:16 2019 from 192.168.1.2
Instead of typing the user and group, if they are the same (like for
www-data)  you can just type the user followed by a colon: 'sudo chown -R
www-data: *'

This can be used to copy a remote file to a local machine, in this example, I am copying the .bashrc file from the remote server to my local machine.

4.4 Wed Oct 23 jason@Yog-Sothoth 0: $ rsh [email protected] -p 443 cat .bashrc >> bashrc_copy2
Ubuntu 16.04.6 LTS
[email protected]'s password:

This can also be used to execute commands on a remote machine and display the output locally.

4.4 Wed Oct 23 jason@Yog-Sothoth 0: $ rsh [email protected] -p 443 ls
Ubuntu 16.04.6 LTS
[email protected]'s password: 
1475438041027.png
1475438041027s.jpg
1475438079807.png
1475438079807s.jpg
1475438731017.jpg
1475438731017s.jpg
56889963
arma3
Arma3
brave.deb
cgi.py
cgi.pyc
cn.zone
deny_hosts.rules
depbo-tools-0.5.65
Desktop
Documents
Downloads
dpkg.png
dvdrip-data

The -x parameter to RSH can provide some encryption, but this is still not secure enough unless it is used over a secure VPN, and I recommend using SSH for connections over a network of the Internet. But this is still quite useful to know anyway.


Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.