My Games
Account 🔐
Sign Up
Login
Global Leaderboard
Case Vault
Badge Backpack
Blue Team Glossary
Login and start playing
Leaving so soon?
×
You really want to log out? We were having so much fun!
Home
›
Glossary
›
plink
Plink
Definition
Plink (PuTTY Link) is a command-line tool that lets you connect from your computer to a remote server over a secure channel (typically SSH), without using a full graphical interface. It is part of the family of tools associated with PuTTY. ([Ubuntu Manpages][1]) When you use Plink, you open a “remote terminal” session or run commands on a remote machine directly from your own command line. Because it works without a GUI, it is often used for automation, scripting, and remote administration tasks — for example, running maintenance scripts on a server or copying files to/from a machine. ([the.earth.li][2]) **Key Features** * It supports common network-connection protocols, especially SSH (secure shell). ([Linux Die][3]) * You can use it in non-interactive mode (for scripts or automated tasks) or start an interactive session when needed. ([the.earth.li][2]) * It lets administrators open secure connections, forward ports, tunnel traffic, or execute remote commands directly from a local Windows or Unix shell. ([Documentation Help][4]) **Why it matters (especially in security / operations)** * Because Plink enables remote, scriptable, and secure access, attackers or defenders alike can use it to manage servers, copy tools or malware, or establish tunnels for data exfiltration or command-and-control. ([Splunk Security Content][5]) * In a secure operations context, monitoring or logging use of Plink (and especially its port-forwarding or tunneling flags) can help detect suspicious or unauthorized access or lateral movement within a network. ([Splunk Security Content][5]) **Simple Example** From a Windows command prompt you might run: ``` plink user@remote-server.example.com -pw MySecurePassword ``` This would open a secure shell on the remote server, letting you run commands as if you were logged in directly — but without a graphical interface.
Explore More Terms
Password-Spray
Processevents
Data-Exfiltration
Comment
Count