These are network protocols that allow connecting to another server remotely.
23/TCP Telnet
Telnet stands for Terminal Network and is one of the TCP/ IP Protocols. Telnet is the unsecure network protocol that allows us to establish a connection with the server. But why Telnet isn’t secure?
I am connecting to metasploitable using telnet. I run the command writing telnet Ip address
of target machine and enter username and password.
After that, I am starting to monitor the network traffic through Wireshark.
Whireshark shows me the username and password I used as logging into Metasploitable. This page shows me the information I sent is not encrypted.
If someone does a MitM attack, S/he can get this information. For this reason, Telnet is not a secure protocol.
22/TCP SSH
First of all I run the command writing ssh username@IP address of the target
. And so I am logging into Metasploit.
I am monitoring protocols using Wireshark. I am following these steps again to see details click right> Follow> TCP stream
As seen below, The information comes in an encrypted form, unlike telnet. Therefore, even If someone enters my connection, S/he can’t monitor the information I send using ssh.