Lab – analyzing Telnet packets
In this hands-on exercise, you will explore the security vulnerabilities of the Telnet protocol, as well as how a hacker can reassemble the data within each packet and view the entire conversation between a Telnet client and server over a network. To get started with this exercise, follow these steps:
- Go to https://wiki.wireshark.org/SampleCaptures and download the
telnet-cooked.pcap
file, as shown here:
Figure 6.59 – Telnet capture file
- Next, open the
telnet-cooked.pcap
file using Wireshark to view all the captured packets:
Figure 6.60 – Telnet packets
As shown in the preceding screenshot, there’s a client with an IP address of 192.168.0.2
that is establishing a Telnet session to a server with an IP address of 192.168.0.1
.
- Next, right-click on packet #1 and select Follow | TCP Stream to view the entire conversation between the client and the Telnet...