Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.

telnet uses and explanations


ghost's Avatar
0 0

I have been looking and reading about telnet, but still cannot grasp the uses for it. I know it has some uses in rooting and things of that topic. I was reading on wikipedia about it also, but on to the main question. Will telnet do whatever I may need it to do through a wireless connection on my laptop? I was trying to run through an article on HBH earlier and could not get any results that it was saying I could get. Maybe some tips or points would be appreciated. Bluntness is greatly accepted and not taken harshly.


ghost's Avatar
0 0

Telnet is a tool, not an "exploit". It doesn't do anything special, really. Just another way to remotely access a computer with credentials.

It's been widely replaced by ssh, since telnet traffic can be sniffed.

Don't worry about it, it's not a critical part of modern security systems.


ghost's Avatar
0 0

Thank you Lesser, so SSH is the new thing to use, huh? Well I guess I will read up about it and learn some of it. Thanks. I thought you were leaving? Anyway glad to have you stay awhile.


ghost's Avatar
0 0

NecroCell13 wrote: Thank you Lesser, so SSH is the new thing to use, huh? Well I guess I will read up about it and learn some of it. Thanks. I thought you were leaving? Anyway glad to have you stay awhile.

I'm hibernating.


fuser's Avatar
Member
0 -1

SSH is has the same concept like telnet, (where two computers exchange data among each other) but SSH uses a secure channel, where it needs public-key cryptography for authentication.

telnet, however, does not encrypt the data transmitted. In a simpler way, It means that all the data are sent in plain text and anyone with a packet sniffer can grab the details (user name, password, etc.)

it can also be intercepted for man- in -the middle attacks due to lack of authentication using IP spoofing.

Most systems such as Linux and Macs support SSH (i can't remember if they still support telnet) Windows has a telnet client by default but is no longer included with Vista. Who needs it, everyone uses PuTTY anyway.


ghost's Avatar
0 0

so ssh cannot be used as an exploit, but it can be used to monitor or spy on people sending emails to eachother? I have been reading about it and realized the use of it, but I was thinking of other uses for it, like monitoring emails or intruders on your emails. correct?


fuser's Avatar
Member
0 -1

No. SSH is a TCP/IP protocol and is used to connect to other computers.

It's like this :

my computer and laptop has VNC. Let's say I have some files I need on my laptop, and I'm in college, which is around 10km away.

So I connect to the internet with my laptop, and I use my SSH client to connect to my computer by entering my home pc's IP address / dedicated domain name, open VNC viewer to view and grab what I needed.

And then my dad asked me to check the network in case my brother / sister is using the internet for too long and to see if anything is wrong with the network and check what sites and emails they are sending / using.

So, I'll simply install a packet sniffer on the home network's server and check the system logs.From the captured data, I can simply check their e-mail details, website logins, types of files downloaded, etc.

If you want to know more, there are lots of website tutorials and books explaining this protocol.

some sites: http://www.windowsecurity.com/articles/SSH.html http://www.bitvise.com/port-forwarding.html http://www.allthingsmarked.com/2006/08/17/how-to-set-up-a-windows-ssh-server-for-vnc-tunneling/ http://polishlinux.org/apps/ssh-tricks/

To anyone: If i'm wrong in any part, just tell me and sorry in advance.


ghost's Avatar
0 0

thank you