码迷,mamicode.com
首页 > Web开发 > 详细

xinetd的两个实验

时间:2015-12-19 20:28:55      阅读:288      评论:0      收藏:0      [点我收藏+]

标签:

参考文章:http://blog.sina.com.cn/s/blog_88cdde9f01019fg5.html

 

xinetd练习一:利用xinetd设置sensor陷阱,隔离恶意访问


1.检查是否有这几个包
[root@linuxclient ~]# rpm -qa|grep rsh-server
rsh-server-0.17-60.el6.i686
[root@linuxclient ~]# rpm -qa|grep rsh
rsh-server-0.17-60.el6.i686
rsh-0.17-60.el6.i686
[root@linuxclient ~]# rpm -qa|grep telnet-server
telnet-server-0.17-46.el6.i686
[root@linuxclient ~]# rpm -qa|grep telnet
telnet-0.17-46.el6.i686
telnet-server-0.17-46.el6.i686


2.让他们启动
[root@linuxclient ~]# chkconfig rlogin on
[root@linuxclient ~]# chkconfig rsh on
[root@linuxclient ~]# chkconfig telnet on


3.修改配置文件
service login
{
        disable = no
        socket_type             = stream
        wait                    = no
        user                    = root
        log_on_success          += USERID
        log_on_failure          += USERID
        server                  = /usr/sbin/in.rlogind
        flags                   = SENSOR
        deny_time               = forever
}
之前的telnet不通,可以去关闭防火墙(这个东西很虐人啊,好多次都是因为它弄的要死要活的,所以这次还是我机智,关了它)
[root@linuxserver Desktop]# telnet 192.168.70.150
Trying 192.168.70.150...
Connected to 192.168.70.150 (192.168.70.150).
Escape character is ‘^]‘.
Red Hat Enterprise Linux Server release 6.0 (Santiago)
Kernel 2.6.32-71.el6.i686 on an i686
login: qys
Password: 
Last login: Sat Dec 19 00:35:55 from 192.168.70.1


4.重新启动生效

[root@linuxclient ~]# /etc/init.d/xinetd restart
Stopping xinetd:                                           [  OK  ]
Starting xinetd:                                           [  OK  ]


5.客户端测试
[root@linuxserver Desktop]# rlogin 192.168.70.150
connect to address 192.168.70.150 port 543: Connection refused
trying normal rlogin (/usr/bin/rlogin)
rcmd: 192.168.70.150: Connection reset by peer


6.解释
原因是:xinetd服务实际上是监听了rlogin-server的端口,由于带有flags=SENSOR标记,sensor会记录客户ip并将其添加到针对全局的no-access列表中去,所以恶意的访问都不能访问xinetd托管的服务了

 

 

实验二:建立自定义xinetd托管服务


前提:关掉防火墙

1.自定义一个服务(别忘了要编译):
[root@linuxclient Desktop]# cat /tmp/hello.c 
#include<stdio.h>
int main(){
printf("hello,buddy!\n");
return 0;
}


2.在xinetd.d里面新添加一个文件,名叫hello_server
[root@linuxclient Desktop]# cat /etc/xinetd.d/hello_server 
#cp telnet hello
#vim hello


service hello_server
{
disable = no
flags = REUSE
socket_type = stream
wait = no
user = root
server = /tmp/hello
log_on_failure+=USERID
port = 9015
}


3.将新建的服务加到/etc/services里面去
[root@linuxclient Desktop]# cat /etc/services |grep 9015
hello_server 9015/tcp


4.重启xinetd服务
5.查看9015是否开启
[root@linuxclient Desktop]# netstat -tnlp|grep 9015
tcp        0      0 :::9015                     :::*                        LISTEN      2254/xinetd   
6.测试:
[root@linuxserver Desktop]# telnet 192.168.70.150 9015
Trying 192.168.70.150...
Connected to 192.168.70.150 (192.168.70.150).
Escape character is ‘^]‘.
hello,buddy!
Connection closed by foreign host.

 

xinetd的两个实验

标签:

原文地址:http://www.cnblogs.com/qysqys/p/5059657.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!