visit
Table of Contents:
Telnet, which stands for Telecommunications and Networks, is a TCP/IP protocol that allows a user to establish a remote connection to a system in a way that makes it appear as a local system via the command line. This protocol is typically used by network administrators to access and manage devices remotely. Telnet only supports known port numbers and not dynamic ports.
telnet hostname (Note: you may also use an IP address instead of the hostname)
Once connected to the server, you can execute commands on the server using specific Telnet commands.Operation
Telnet uses TCP port 23 and operates best with LANs (local area networks)Authentication
Telnet sends data including usernames and passwords over the network in plain text making it highly vulnerable. It is possible to add security to Telnet such as using Kerberos which would aid with authentication and encryption.Suitability of Network
Telnet works with a private network.Vulnerabilities
Since Telnet transmits data in clear text, it is vulnerable to man-in-the-middle attacks allowing hackers to retrieve the username and passwords of admin accounts and read the data that is being transmitted over the network. Obtaining these credentials allows hackers to gain access to admin accounts which would give them more access to do whatever they want. Due to the many vulnerabilities that Telnet faces, with packet sniffing being one of them, SSH was developed to resolve these issues and more.ssh [email protected] (Note: Replace SSHserver.example.com with the appropriate hostname or IP address)
This command will attempt to connect to the server named server.example.com using the user, username. Note that if it is the first time you are connecting with the server, the remote host’s public key fingerprint will be shown and will ask if you want to establish a connection. The is an example of the prompt that will appear on your screen if it's the first time establishing a connection with the server.
You can either type out the word yes or hit the enter key on your keyboard to initiate the session. After you answer the prompt, you now have access to the server.
Operation
SSH uses TCP port 22 by default but you can change the port number.Authentication
There are two ways to authenticate with SSH:Suitability of Network
SSH works with a public network.Vulnerabilities
SSH are vulnerable to brute force/dictionary attacks as hackers and here is what can be done to prevent such attacks:The key difference between Telnet and SSH is that SSH uses encryption meaning all data transmitted over the network is protected from eavesdropping. This makes it extremely difficult for hackers to decrypt and read the data being exchanged between the client and server.