01-16-2020
If you have access to switches in LAN network or access to both hosts to examine configuration and traffic, yes.
Otherwise, you will not get advice here about 'hacking' tools or their usage, if question is related to remote stuff
Hope that helps
Regards
Peasant.
8 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
is there a command in unix/linux that allows you to sample what the historic byte rate is from a local IP to a client IP. (1 Reply)
Discussion started by: cubs0729
1 Replies
2. Shell Programming and Scripting
Hi, need help how to count unique destination for the source ip. The file is contains 4 number of fields. Example of the file is here
src ip dest ip #of flows total bytes
192.168.6.0 88.0.33.2 12 128
192.168.6.0 88.0.33.2 1 168
192.168.6.0 ... (5 Replies)
Discussion started by: new_buddy
5 Replies
3. IP Networking
Hi all,
I have some doubts in selecting the interface to transfer packets and receive the packets.
--> Multiple interfaces :
--------------------
1) 0.0.0.0 --------> wild card address.
2) x.x.x.x --------> valid address.(192.168.1.156)
3) ff.ff.ff.ff -------->... (0 Replies)
Discussion started by: vijaypdp2006
0 Replies
4. Shell Programming and Scripting
Move all files starting with a specific name to different directory.
This shell script program should have three parameters
File Name
Source Directory
Destination Directory
User should be able to enter ‘AB_CD*' in file name parameter. In this case all the files starting with AB_CD will... (1 Reply)
Discussion started by: chetancrsp18
1 Replies
5. Linux
I'd like to specify a different build and deployment path for files, by default the same path is used for both build and install, I wasn't able to find a way to make these different. With Solaris pkgadd, one can specify different paths in prototype, so I would assume something like that is possible... (0 Replies)
Discussion started by: tiburblium
0 Replies
6. Solaris
Hi Everyone,
I am using solaris 10.I am facing a different problem here with tlsftp.I have intalled all steps for tlsftp and able to connect to the destination server from the source server.It worked for some days.But recently when i am connectin it is giving below error.I am... (0 Replies)
Discussion started by: muraliinfy04
0 Replies
7. UNIX for Advanced & Expert Users
hi All,
i have 2 server setup now for Rsync, i configured Rsync on both of the server and it worked well when i did run from source to destination. and while running back from destination to source it produced this error:
bash-3.2$ ksh rsync_bravo_db.ksh usa0300uz1247.apps.mc.xerox.com... (0 Replies)
Discussion started by: lovelysethii
0 Replies
8. Shell Programming and Scripting
Hi Guys,
how to count number of files successfully copied while coping files from source to destination path
ex:10 files from source to target location copying
if 8 files copied successfully then
echo successfully copied=8
failure=2 files
if two files get error to coping files from... (23 Replies)
Discussion started by: sravanreddy
23 Replies
LEARN ABOUT DEBIAN
pam_rhosts
PAM_RHOSTS(8) Linux-PAM Manual PAM_RHOSTS(8)
NAME
pam_rhosts - The rhosts PAM module
SYNOPSIS
pam_rhosts.so
DESCRIPTION
This module performs the standard network authentication for services, as used by traditional implementations of rlogin and rsh etc.
The authentication mechanism of this module is based on the contents of two files; /etc/hosts.equiv (or and ~/.rhosts. Firstly, hosts
listed in the former file are treated as equivalent to the localhost. Secondly, entries in the user's own copy of the latter file is used
to map "remote-host remote-user" pairs to that user's account on the current host. Access is granted to the user if their host is present
in /etc/hosts.equiv and their remote account is identical to their local one, or if their remote account has an entry in their personal
configuration file.
The module authenticates a remote user (internally specified by the item PAM_RUSER connecting from the remote host (internally specified by
the item PAM_RHOST). Accordingly, for applications to be compatible this authentication module they must set these items prior to calling
pam_authenticate(). The module is not capable of independently probing the network connection for such information.
OPTIONS
debug
Print debug information.
silent
Don't print informative messages.
superuser=account
Handle account as root.
MODULE TYPES PROVIDED
Only the auth module type is provided.
RETURN VALUES
PAM_AUTH_ERR
The remote host, remote user name or the local user name couldn't be determined or access was denied by .rhosts file.
PAM_USER_UNKNOWN
User is not known to system.
EXAMPLES
To grant a remote user access by /etc/hosts.equiv or .rhosts for rsh add the following lines to /etc/pam.d/rsh:
#%PAM-1.0
#
auth required pam_rhosts.so
auth required pam_nologin.so
auth required pam_env.so
auth required pam_unix.so
SEE ALSO
rootok(3), hosts.equiv(5), rhosts(5), pam.conf(5), pam.d(5), pam(7)
AUTHOR
pam_rhosts was written by Thorsten Kukuk <kukuk@thkukuk.de>
Linux-PAM Manual 06/04/2011 PAM_RHOSTS(8)