Telnet - Port 23
Last updated
Was this helpful?
Last updated
Was this helpful?
Become VeryLazyTech ! π
Follow us on:
β Twitter .
πΎ Github .
π Medium .
Visit our for e-books and courses. π
Support us and . β
Telnet is a network protocol that provides a text-based interface for communication with a remote device. It operates over TCP and allows users to access computers over a network in an unencrypted manner, making it susceptible to various attacks. Due to its inherent security flaws, it is often recommended to use more secure alternatives, such as SSH.
Default Port: 23
Basic Information Gathering:
Identify if Telnet is open on the target host:
A successful response indicates the service is running:
Enumeration:
Banner Grabbing: You can grab the Telnet banner to gain insights into the service version and possible vulnerabilities.
Nmap Enumeration: Utilize Nmap to gather additional information about the Telnet service:
The telnet-ntlm-info.nse
script can be used to obtain NTLM information, particularly on Windows machines.
Understanding Telnet Options:
The Telnet protocol allows the negotiation of various options, which can be enumerated using a Telnet client or custom scripts. To check the supported options, you can send specific commands through a Telnet session.
Example command to negotiate options: You can start a Telnet session and use the following commands:
Brute Forcing Credentials:
If the Telnet service requires authentication, you may perform a brute force attack using tools like Hydra or Medusa:
Checking Configuration Files:
Review common configuration files for Telnet:
/etc/inetd.conf
/etc/xinetd.d/telnet
/etc/xinetd.d/stelnet
These files may contain options or access controls that can be exploited.