The telnet program has been replaced by SSH for reasons of security. In particular, telnet does not use any encryption, making the network traffic it generates susceptible to sniffing attacks. To see how bad this can be, try the following steps: In the Wireshark window, above the packet list pane (above the top pane), you will see text entry field with ‘Apply a display filter…’ shown. Enter the value telnet in this field and press ENTER. In the packet list pane (top pane), scroll to the very top of the list and then right click the entry for the first packet and then select the Follow submenu and the TCP Stream menu option. A window is now displayed on the screen. Reflect on the information presented and consider the following questions: 1) Why do you think these results are there? 2) What does it say about the process you have gone through? 3) What differences would be observed if SSH was used instead? 4) Were any other protocols present in your network capture? What is the purpose of those protocols and why did they appear?

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

The telnet program has been replaced by SSH for reasons of security. In particular, telnet does not use any encryption, making the network traffic it generates susceptible to sniffing attacks.

To see how bad this can be, try the following steps: In the Wireshark window, above the packet list pane (above the top pane), you will see text entry field with ‘Apply a display filter…’ shown. Enter the value telnet in this field and press ENTER.

In the packet list pane (top pane), scroll to the very top of the list and then right click the entry for the first packet and then select the Follow submenu and the TCP Stream menu option.

A window is now displayed on the screen. Reflect on the information presented and consider the following questions:

1) Why do you think these results are there?

2) What does it say about the process you have gone through?

3) What differences would be observed if SSH was used instead?

4) Were any other protocols present in your network capture? What is the purpose of those protocols and why did they appear?

 

Expert Solution
steps

Step by step

Solved in 3 steps

Blurred answer
Knowledge Booster
Device network connection
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education