SlideShare uma empresa Scribd logo
1 de 36
TELNET
SSH
MUSTAFA SAKHAI
m7ks77@gmail.com
Poznan University of Technology
1. TELNET (Terminal Network)
• TELNET is an abbreviation for TErminaL NETwork.
• Is an application layer protocol used on the internet or local
area networks, enables the establishment of a
connection to a remote system in such a way that the
local terminal appears to be a terminal at the remote
system.
• It is the standard TCP/IP protocol for virtual terminal
service
Topics to be Discussed
• Understand how TELNET works
• Understand the role of NVT in a TELNET communication
• Understand TELNET option and sub-option negotiation
• Know how control characters are used
• Know the TELNET modes of operation
• Why TELNET unsecure!
TELNET is a general-purpose
client-server application program
Network Diagram
Figure 1.1 Local Login
Figure 1.2 Remote Login
Network Virtual Terminal (NVT)
• Is a universal interface, The TELNET client translates characters (data
or commands) that come from the local terminal into NVT form and
delivers them to the network. The TELNET server translates data and
commands from NVT form into the form acceptable by the remote
computer. Figure 1.3 concept of NVT
NVT uses two sets of characters, one for data and
one for control. Both are 8-bits.
Figure 1.5 format of data and control characters
Table 1.1 some of NVT control characters
Mode of Operations
I. Default Mode
II. Character Mode
III.Line Mode
Default Mode
• In this example, we use the default mode to show the concept
and its deficiencies even though it is almost obsolete today.
• The client and the server negotiate the terminal type and
terminal speed and then the server checks the login and
password of the user (see figure 1.6).
Figure 1.6
Character Mode
•We show how the client switches to the character
mode. This requires that the client request the
server to enable the SUPPRESS GO AHEAD
and ECHO options (see
Figure 1.7).
Figure 1.7
Line Mode
• It’s proposed to compensate for the deficiencies of
default mode and character mode
• In this line (echoing) in done by the client, then the
client sends the whole line to the server
Why TELNET Unsecure?!
TELNET suffers from security problems. TELNET requires a login
name and password (when exchanging text). A microcomputer
connected to a broadcast LAN can easily spy using snooper software
to capture a login name and the corresponding password (even if it is
encrypted).!!
It’s Big problem
Let’s see how to hacking ;)
Use ping to check the connection
Figure 1.8
Using Wireshark to capture data from LAN port
Figure 1.9
Figure 1.10
Surprise!!!
2. SSH
• Is a protocol for secure remote login and other secure
network services over an unsecure network.
• Secure channel between two computers
• Provides data confidentiality and integrity
• Many uses other than remote shell
Topics to be Discussed
• History
• SSH components
• Why using SSH?
• SSH security features
• SSH Authentication Methods
• Port forwarding
History
• SSH-1 designed in 1995 by Tatu Ylönen
• In response to a password-sniffing attack
• Replacement for rlogin, telnet, and rsh
• Released as freeware in July 1995
• SSH-2 designed in 1996
• Incompatible with SSH-1
• Security and feature improvements
• Open source implementations (OSSH and OpenSSH) created in 1999
• OSSH is now obsolete
• OpenSSH is the most popular SSH implementation as of 2005
SSH Components
•Transport Layer Protocol
•Provides server authentication, confidentiality, and
integrity
•User Authentication Protocol
•Authenticates the client-side user to the server
•Connection Protocol
•Multiplexes the tunnel into logical channels
SSH Components
Figure 2.1
SSH TLP-Overview
SSH UAP-Overview
Why using SSH?
•SSH can handle secure remote logins (SSH)
•SSH can handle secure file copy (SCP)
•SSH can even drive secure FTP (sFTP)
SSH security features
• strong algorithms
• uses well established strong algorithms for encryption, integrity, key
exchange, and public key management
• large key size
• requires encryption to be used with at least 128 bit keys
• supports larger keys too
• algorithm negotiation
• encryption, integrity, key exchange, and public key algorithms are negotiated
• it is easy to switch to some other algorithm without modifying the base
protocol
SSH Authentication Methods
I. Password
II. Public/Private Key pair
III. Host-Based Authentication
Prompts for password
Public/Private key pair
Host-Based Authentication
•Doesn’t require (Password or key)
•Provide trust based on hostname and user ID
•User ID on both system has to be the same
Port Forwarding
Sharing your tunnel

Mais conteúdo relacionado

Mais procurados

HTTP Definition and Basics.
HTTP Definition and Basics.HTTP Definition and Basics.
HTTP Definition and Basics.
Halah Salih
 
Telnet & Secure Shell
Telnet & Secure ShellTelnet & Secure Shell
Telnet & Secure Shell
WILLA REYES
 

Mais procurados (20)

Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
secure socket layer
secure socket layersecure socket layer
secure socket layer
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Http protocol
Http protocolHttp protocol
Http protocol
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
HTTP Definition and Basics.
HTTP Definition and Basics.HTTP Definition and Basics.
HTTP Definition and Basics.
 
Network address translation
Network address translationNetwork address translation
Network address translation
 
Telnet & Secure Shell
Telnet & Secure ShellTelnet & Secure Shell
Telnet & Secure Shell
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
SSL/TLS 101
SSL/TLS 101SSL/TLS 101
SSL/TLS 101
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Tcp
TcpTcp
Tcp
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
 
Http VS. Https
Http VS. HttpsHttp VS. Https
Http VS. Https
 
Computer Networking 101
Computer Networking 101Computer Networking 101
Computer Networking 101
 
What is XMPP Protocol
What is XMPP ProtocolWhat is XMPP Protocol
What is XMPP Protocol
 
Amqp Basic
Amqp BasicAmqp Basic
Amqp Basic
 
Imap(internet massege access protocaols)
Imap(internet massege access protocaols)Imap(internet massege access protocaols)
Imap(internet massege access protocaols)
 

Destaque

Internet to web: The 40-year old Internet and the 20-year-old Web
Internet to web:  The 40-year old Internet and the 20-year-old WebInternet to web:  The 40-year old Internet and the 20-year-old Web
Internet to web: The 40-year old Internet and the 20-year-old Web
Johan Koren
 
Presentation on telnet
Presentation on telnetPresentation on telnet
Presentation on telnet
Amandeep Kaur
 

Destaque (14)

Internet to web: The 40-year old Internet and the 20-year-old Web
Internet to web:  The 40-year old Internet and the 20-year-old WebInternet to web:  The 40-year old Internet and the 20-year-old Web
Internet to web: The 40-year old Internet and the 20-year-old Web
 
Network telnet ssh
Network telnet sshNetwork telnet ssh
Network telnet ssh
 
Nami ppt eng v3.3.1
Nami ppt eng v3.3.1Nami ppt eng v3.3.1
Nami ppt eng v3.3.1
 
Remote login.89 to 90
Remote login.89 to 90Remote login.89 to 90
Remote login.89 to 90
 
Telnet
TelnetTelnet
Telnet
 
Telnet
TelnetTelnet
Telnet
 
Computer Network - Telnet and Gopher
Computer Network -  Telnet and GopherComputer Network -  Telnet and Gopher
Computer Network - Telnet and Gopher
 
Presentation on samba server
Presentation on samba serverPresentation on samba server
Presentation on samba server
 
Telnet
TelnetTelnet
Telnet
 
Presentation on telnet
Presentation on telnetPresentation on telnet
Presentation on telnet
 
FTP - File Transfer Protocol
FTP - File Transfer ProtocolFTP - File Transfer Protocol
FTP - File Transfer Protocol
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Webpre2
Webpre2Webpre2
Webpre2
 
Presentation on Talent Development
Presentation on Talent DevelopmentPresentation on Talent Development
Presentation on Talent Development
 

Semelhante a TELNET and SSH by MUSTAFA SAKHAI

Computer Networks
Computer NetworksComputer Networks
Computer Networks
Shylesh BC
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
mashiur
 
Bit_Bucket_x31_Final
Bit_Bucket_x31_FinalBit_Bucket_x31_Final
Bit_Bucket_x31_Final
Sam Knutson
 

Semelhante a TELNET and SSH by MUSTAFA SAKHAI (20)

Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Computer networks
Computer networksComputer networks
Computer networks
 
Remote login
Remote loginRemote login
Remote login
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference models
 
Telnet and FTP.ppt
Telnet and FTP.pptTelnet and FTP.ppt
Telnet and FTP.ppt
 
Application Protocol
Application Protocol Application Protocol
Application Protocol
 
Report on telnet
Report on telnetReport on telnet
Report on telnet
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Protolcols in communication system
Protolcols in communication systemProtolcols in communication system
Protolcols in communication system
 
The Internet Protocol Suite (commonly known as TCP/IP)
The Internet Protocol Suite (commonly known as TCP/IP) The Internet Protocol Suite (commonly known as TCP/IP)
The Internet Protocol Suite (commonly known as TCP/IP)
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
 
tcp.pptx
tcp.pptxtcp.pptx
tcp.pptx
 
98 366 mva slides lesson 5
98 366 mva slides lesson 598 366 mva slides lesson 5
98 366 mva slides lesson 5
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5
MVA slides lesson 5
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Bit_Bucket_x31_Final
Bit_Bucket_x31_FinalBit_Bucket_x31_Final
Bit_Bucket_x31_Final
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
 
1627478708347_Chapter 1.pptx
1627478708347_Chapter 1.pptx1627478708347_Chapter 1.pptx
1627478708347_Chapter 1.pptx
 

Último

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 

TELNET and SSH by MUSTAFA SAKHAI

  • 2. 1. TELNET (Terminal Network) • TELNET is an abbreviation for TErminaL NETwork. • Is an application layer protocol used on the internet or local area networks, enables the establishment of a connection to a remote system in such a way that the local terminal appears to be a terminal at the remote system. • It is the standard TCP/IP protocol for virtual terminal service
  • 3. Topics to be Discussed • Understand how TELNET works • Understand the role of NVT in a TELNET communication • Understand TELNET option and sub-option negotiation • Know how control characters are used • Know the TELNET modes of operation • Why TELNET unsecure!
  • 4. TELNET is a general-purpose client-server application program
  • 8. Network Virtual Terminal (NVT) • Is a universal interface, The TELNET client translates characters (data or commands) that come from the local terminal into NVT form and delivers them to the network. The TELNET server translates data and commands from NVT form into the form acceptable by the remote computer. Figure 1.3 concept of NVT
  • 9. NVT uses two sets of characters, one for data and one for control. Both are 8-bits. Figure 1.5 format of data and control characters
  • 10. Table 1.1 some of NVT control characters
  • 11. Mode of Operations I. Default Mode II. Character Mode III.Line Mode
  • 12. Default Mode • In this example, we use the default mode to show the concept and its deficiencies even though it is almost obsolete today. • The client and the server negotiate the terminal type and terminal speed and then the server checks the login and password of the user (see figure 1.6).
  • 14. Character Mode •We show how the client switches to the character mode. This requires that the client request the server to enable the SUPPRESS GO AHEAD and ECHO options (see Figure 1.7).
  • 16. Line Mode • It’s proposed to compensate for the deficiencies of default mode and character mode • In this line (echoing) in done by the client, then the client sends the whole line to the server
  • 17. Why TELNET Unsecure?! TELNET suffers from security problems. TELNET requires a login name and password (when exchanging text). A microcomputer connected to a broadcast LAN can easily spy using snooper software to capture a login name and the corresponding password (even if it is encrypted).!! It’s Big problem Let’s see how to hacking ;)
  • 18. Use ping to check the connection Figure 1.8
  • 19. Using Wireshark to capture data from LAN port Figure 1.9
  • 22. 2. SSH • Is a protocol for secure remote login and other secure network services over an unsecure network. • Secure channel between two computers • Provides data confidentiality and integrity • Many uses other than remote shell
  • 23. Topics to be Discussed • History • SSH components • Why using SSH? • SSH security features • SSH Authentication Methods • Port forwarding
  • 24. History • SSH-1 designed in 1995 by Tatu Ylönen • In response to a password-sniffing attack • Replacement for rlogin, telnet, and rsh • Released as freeware in July 1995 • SSH-2 designed in 1996 • Incompatible with SSH-1 • Security and feature improvements • Open source implementations (OSSH and OpenSSH) created in 1999 • OSSH is now obsolete • OpenSSH is the most popular SSH implementation as of 2005
  • 25. SSH Components •Transport Layer Protocol •Provides server authentication, confidentiality, and integrity •User Authentication Protocol •Authenticates the client-side user to the server •Connection Protocol •Multiplexes the tunnel into logical channels
  • 29. Why using SSH? •SSH can handle secure remote logins (SSH) •SSH can handle secure file copy (SCP) •SSH can even drive secure FTP (sFTP)
  • 30. SSH security features • strong algorithms • uses well established strong algorithms for encryption, integrity, key exchange, and public key management • large key size • requires encryption to be used with at least 128 bit keys • supports larger keys too • algorithm negotiation • encryption, integrity, key exchange, and public key algorithms are negotiated • it is easy to switch to some other algorithm without modifying the base protocol
  • 31. SSH Authentication Methods I. Password II. Public/Private Key pair III. Host-Based Authentication
  • 34. Host-Based Authentication •Doesn’t require (Password or key) •Provide trust based on hostname and user ID •User ID on both system has to be the same