Skip to main content

Network Services

  • Chapter
  • First Online:
Cyber Operations
  • 1902 Accesses

Abstract

An administrator running a network needs to securely provide services to users. This chapter provides an introduction to a number of common network services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See the Notes and References for more information about system runlevels.

  2. 2.

    To change this behavior, modify the preferred SSH protocol version setting available in PuTTY by navigating Connection ➤ SSH.

  3. 3.

    I have had much better luck with this program if it is not set to run as a service.

  4. 4.

    If you connect to the FreeSSHd using a Linux SSH client, it may assume that you are at the top of the screen but does not clear the screen. You may be staring at the bottom of the screen waiting for a response, when it has already authenticated you and moved your cursor to the top of the screen.

  5. 5.

    Some of the shells provided by Metasploit may make interacting with the SSH client difficult. Some of the techniques of Chapter 7, such as using Perl to create a second, more stable shell, may prove helpful.

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Mike O'Leary

About this chapter

Cite this chapter

O’Leary, M. (2015). Network Services. In: Cyber Operations. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-0457-3_9

Download citation

Publish with us

Policies and ethics