Anyone on your network who is listening in will be able to intercept all the information you send with this protocol. This is because all the user names and passwords needed to enter the machines will travel through the network as plain text, as the telnet protocol is not encrypted. Obviously the answer I expect is a categorical no. Does this seem appropriate to you? Would you recommend using some other protocol? One of the simplest questions I usually ask in job interviews to candidates who want to join my current company is the following: Suppose a developer tells you that they have a server and plan to manage it using the telnet protocol. However, this protocol is hardly used today. In general telnet (RFC854) has been used to open a session with a UNIX machine, so that multiple users with an account on the machine, connect, log in and can work using that machine. This will be a short post as this protocol is not very complex, but I needed to include it in this section as the client is very useful during a pentesting. In this post I bring you one of the first protocols in the history of the Internet: the Telnet protocol.
0 Comments
Leave a Reply. |