0% found this document useful (0 votes)
21 views3 pages

Telnet

Uploaded by

ARUN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views3 pages

Telnet

Uploaded by

ARUN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Telnet, tcpdump and nmap.

Telnet is both a command and a network protocol.


The telnet command is going to be used to communicate using an
application protocol over the internet or a local area network to provide a
bidirectional interactive text oriented communication facility using virtual
terminal connections.
Now, telnet is used to be built into windows, Linux, Unix and OSX systems
by default.
Telnet is capable of allowing a user to test the network connectivity
between a client and a server, as well as issue commands using text-
based interfaces.
Normally, you're not going to want to use telnet because it's an older and
insecure protocol.
Instead, you should be using SSH.
But as a network technician, there's still one use case where relying on
telnet could be considered acceptable. And that's when you're connected
directly to a router or switch over a console cable connection because
you're then have a trusted and direct connection to that device.
Because of the insecure nature of telnet in general, it's actually been
disabled by default in Windows 10. If you want to re-enable it, you can
enter the command
Deism/Online/Enable-feature/FeatureName:TelnetClient
and then it's going to re-install this feature.
OSX has also removed telnet in recent versions too, but most Linux and
Unix systems
still have telnet installed by default.
If you want to quickly test a network connection using telnet, you can
enter Telnet, domain name and port and hit enter to connect to that
device.
For example, I might enter telnetdeontraining.com80 and hit enter.
Then, you're going to see the word connecting flash across your screen
and then you'll be receiving a black terminal window with a blinking
cursor. At this terminal, you can hit enter a few times or conduct a banner
grab technique, which is using cybersecurity to get information directly to
that web server and get it to responses back and then you can identify
what type of software they're using.
In this case, you can see that my web server is running open rusty,
and it's a web server software here.
And then the connection was terminated by my web server,
because it didn't get the commands it was expecting.

If I was using telnet to connect to a router, I can assign


 network ports,
 set up LAN IP addresses,
 reset the web graphical user interface password,
 reset the system to its factory defaults,
 reboot the system,
 ping a host,
all from within a text-based interactive telnet session.

Tcpdump
tcpdump is a command line tool that allows a network technician to
display TCP/IP and other packets that are being transmitted or received
over a network to the client screen.
Now, tcpdump is not included on windows clients by default, but it is
installed by default on Linux, Unix and OSX systems.
If you want to use it on windows, you'll have to actually download and
install it.
Now, tcpdump is used to simply dump the traffic from a network onto the
screen,
but this can also be redirected to a file, so you can store it and analyze it
later on
using the tcpdump-w option. This will create a file known as a PCAP file or
Packet Capture file.
When you use tcpdump, you can see the same standard format used for
every single packet, this includes
 a timestamp,
 whether the packet is IPV4 notated by IP in the tcpdump, or IPV6
notated by IP6 in the tcpdump,
 the source IP import,
 the destination IP import,
 what flags were used in that TCP packet,
 the sequence number,
 the acknowledgement number,
 the windowing number
 and the length of the packet.
If any of these options are set in the packet, it's going to be shown
between the windowing number and the packet length.
If you create a PCAP file using tcpdump, it can later be loaded into a more
graphical tool
like Wireshark, where you can do more analysis on it. Or you can reload it
back into tcpdumpand analyze it in this text-based tool.

nmap the Network Mapper


Nmap is used to discover hosts and services on a computer network by
sending packets and analyzing the responses it receives.
Now, nmap provides a number of features for probing computer networks,
including host discovery and service and operating system detection.
Nmap is a great tool to use when you're conducting both port scanning or
IP scanning.

Now in addition to this, nmap can be configured to conduct fingerprinting


of the services running on those ports, which allows it to identify the
versions
of the software being used.
This is really helpful in detecting vulnerabilities and specific versions of
services
that are operating on your network. Also, nmap is very useful when trying
to create network maps, documenting your network, or identification of
road network devices.

You might also like