This document describes how to compromise Solaris systems prior to version 9 by using a telnet client only.