Author | telnet uses and explanations |
Member

Posts: Location:
Joined: 01.01.70 Rank: Guest | |
I have been looking and reading about telnet, but still cannot grasp the uses for it. I know it has some uses in rooting and things of that topic. I was reading on wikipedia about it also, but on to the main question. Will telnet do whatever I may need it to do through a wireless connection on my laptop? I was trying to run through an article on HBH earlier and could not get any results that it was saying I could get. Maybe some tips or points would be appreciated. Bluntness is greatly accepted and not taken harshly.
|
 |
Author | RE: telnet uses and explanations |
Member

Posts: Location:
Joined: 01.01.70 Rank: Guest | |
Telnet is a tool, not an "exploit".
It doesn't do anything special, really.
Just another way to remotely access a computer with credentials.
It's been widely replaced by ssh, since telnet traffic can be sniffed.
Don't worry about it, it's not a critical part of modern security systems. |
 |
Author | RE: telnet uses and explanations |
Member

Posts: Location:
Joined: 01.01.70 Rank: Guest | |
Thank you Lesser, so SSH is the new thing to use, huh? Well I guess I will read up about it and learn some of it. Thanks. I thought you were leaving? Anyway glad to have you stay awhile.
|
 |
Author | RE: telnet uses and explanations |
Member

Posts: Location:
Joined: 01.01.70 Rank: Guest | |
NecroCell13 wrote:
Thank you Lesser, so SSH is the new thing to use, huh? Well I guess I will read up about it and learn some of it. Thanks. I thought you were leaving? Anyway glad to have you stay awhile.
I'm hibernating. |
 |
Author | RE: telnet uses and explanations |
fuser Member

Posts: 960 Location: in front of a computer (duh)
Joined: 05.04.07 Rank: Mad User | |
SSH is has the same concept like telnet, (where two computers exchange data among each other) but SSH uses a secure channel, where it needs public-key cryptography for authentication.
telnet, however, does not encrypt the data transmitted. In a simpler way, It means that all the data are sent in plain text and anyone with a packet sniffer can grab the details (user name, password, etc.)
it can also be intercepted for man- in -the middle attacks due to lack of authentication using IP spoofing.
Most systems such as Linux and Macs support SSH (i can't remember if they still support telnet) Windows has a telnet client by default but is no longer included with Vista. Who needs it, everyone uses PuTTY anyway.






[url=http://userbarz.com/][img]ht |
 |
Author | RE: telnet uses and explanations |
Member

Posts: Location:
Joined: 01.01.70 Rank: Guest | |
so ssh cannot be used as an exploit, but it can be used to monitor or spy on people sending emails to eachother? I have been reading about it and realized the use of it, but I was thinking of other uses for it, like monitoring emails or intruders on your emails. correct?
|
 |
Author | RE: telnet uses and explanations |
fuser Member

Posts: 960 Location: in front of a computer (duh)
Joined: 05.04.07 Rank: Mad User | |
No. SSH is a TCP/IP protocol and is used to connect to other computers.
It's like this :
my computer and laptop has VNC. Let's say I have some files I need on my laptop, and I'm in college, which is around 10km away.
So I connect to the internet with my laptop, and I use my SSH client to connect to my computer by entering my home pc's IP address / dedicated domain name, open VNC viewer to view and grab what I needed.
And then my dad asked me to check the network in case my brother / sister is using the internet for too long and to see if anything is wrong with the network and check what sites and emails they are sending / using.
So, I'll simply install a packet sniffer on the home network's server and check the system logs.From the captured data, I can simply check their e-mail details, website logins, types of files downloaded, etc.
If you want to know more, there are lots of website tutorials and books explaining this protocol.
some sites:
http://www.window. . .s/SSH.html
http://www.bitvis. . .rding.html
http://www.allthi. . .tunneling/
http://polishlinu. . .sh-tricks/
To anyone: If i'm wrong in any part, just tell me and sorry in advance.






[url=http://userbarz.com/][img]ht
Edited by fuser on 30-11-07 04:45 |
 |
Author | RE: telnet uses and explanations |
Member

Posts: Location:
Joined: 01.01.70 Rank: Guest | |
thank you
|
 |