The telnet program has been replaced by SSH for reasons of security. In particular, telnet does not use any encryption, making the network traffic it generates susceptible to sniffing attacks. To see how bad this can be, try the following steps: In the Wireshark window, above the packet list pane (above the top pane), you will see text entry field with ‘Apply a display filter…’ shown. Enter the value telnet in this field and press ENTER. In the packet list pane (top pane), scroll to the very top of the list and then right click the entry for the first packet and then select the Follow submenu and the TCP Stream menu option. A window is now displayed on the screen. Reflect on the information presented and consider the following questions: 1) Why do you think these results are there? 2) What does it say about the process you have gone through? 3) What differences would be observed if SSH was used instead? 4) Were any other protocols present in your network capture? What is the purpose of those protocols and why did they appear?
The telnet program has been replaced by SSH for reasons of security. In particular, telnet does not use any encryption, making the network traffic it generates susceptible to sniffing attacks.
To see how bad this can be, try the following steps: In the Wireshark window, above the packet list pane (above the top pane), you will see text entry field with ‘Apply a display filter…’ shown. Enter the value telnet in this field and press ENTER.
In the packet list pane (top pane), scroll to the very top of the list and then right click the entry for the first packet and then select the Follow submenu and the TCP Stream menu option.
A window is now displayed on the screen. Reflect on the information presented and consider the following questions:
1) Why do you think these results are there?
2) What does it say about the process you have gone through?
3) What differences would be observed if SSH was used instead?
4) Were any other protocols present in your network capture? What is the purpose of those protocols and why did they appear?
Step by step
Solved in 3 steps