The RSH protocol allows a user to establish a secure connection to a remote host and to obtain a shell allowing commands to be sent to the remote machine to be executed.
| Family: | Terminal |
| Over: | tcp |
| Revision: | 17 |
| Risk level: | 4 |
| Tag: | Allows Remote Control |
| Tag: | Information Leaking |