SlideShare a Scribd company logo
TELNET
SSH
MUSTAFA SAKHAI
m7ks77@gmail.com
Poznan University of Technology
1. TELNET (Terminal Network)
• TELNET is an abbreviation for TErminaL NETwork.
• Is an application layer protocol used on the internet or local
area networks, enables the establishment of a
connection to a remote system in such a way that the
local terminal appears to be a terminal at the remote
system.
• It is the standard TCP/IP protocol for virtual terminal
service
Topics to be Discussed
• Understand how TELNET works
• Understand the role of NVT in a TELNET communication
• Understand TELNET option and sub-option negotiation
• Know how control characters are used
• Know the TELNET modes of operation
• Why TELNET unsecure!
TELNET is a general-purpose
client-server application program
Network Diagram
Figure 1.1 Local Login
Figure 1.2 Remote Login
Network Virtual Terminal (NVT)
• Is a universal interface, The TELNET client translates characters (data
or commands) that come from the local terminal into NVT form and
delivers them to the network. The TELNET server translates data and
commands from NVT form into the form acceptable by the remote
computer. Figure 1.3 concept of NVT
NVT uses two sets of characters, one for data and
one for control. Both are 8-bits.
Figure 1.5 format of data and control characters
Table 1.1 some of NVT control characters
Mode of Operations
I. Default Mode
II. Character Mode
III.Line Mode
Default Mode
• In this example, we use the default mode to show the concept
and its deficiencies even though it is almost obsolete today.
• The client and the server negotiate the terminal type and
terminal speed and then the server checks the login and
password of the user (see figure 1.6).
Figure 1.6
Character Mode
•We show how the client switches to the character
mode. This requires that the client request the
server to enable the SUPPRESS GO AHEAD
and ECHO options (see
Figure 1.7).
Figure 1.7
Line Mode
• It’s proposed to compensate for the deficiencies of
default mode and character mode
• In this line (echoing) in done by the client, then the
client sends the whole line to the server
Why TELNET Unsecure?!
TELNET suffers from security problems. TELNET requires a login
name and password (when exchanging text). A microcomputer
connected to a broadcast LAN can easily spy using snooper software
to capture a login name and the corresponding password (even if it is
encrypted).!!
It’s Big problem
Let’s see how to hacking ;)
Use ping to check the connection
Figure 1.8
Using Wireshark to capture data from LAN port
Figure 1.9
Figure 1.10
Surprise!!!
2. SSH
• Is a protocol for secure remote login and other secure
network services over an unsecure network.
• Secure channel between two computers
• Provides data confidentiality and integrity
• Many uses other than remote shell
Topics to be Discussed
• History
• SSH components
• Why using SSH?
• SSH security features
• SSH Authentication Methods
• Port forwarding
History
• SSH-1 designed in 1995 by Tatu Ylönen
• In response to a password-sniffing attack
• Replacement for rlogin, telnet, and rsh
• Released as freeware in July 1995
• SSH-2 designed in 1996
• Incompatible with SSH-1
• Security and feature improvements
• Open source implementations (OSSH and OpenSSH) created in 1999
• OSSH is now obsolete
• OpenSSH is the most popular SSH implementation as of 2005
SSH Components
•Transport Layer Protocol
•Provides server authentication, confidentiality, and
integrity
•User Authentication Protocol
•Authenticates the client-side user to the server
•Connection Protocol
•Multiplexes the tunnel into logical channels
SSH Components
Figure 2.1
SSH TLP-Overview
SSH UAP-Overview
Why using SSH?
•SSH can handle secure remote logins (SSH)
•SSH can handle secure file copy (SCP)
•SSH can even drive secure FTP (sFTP)
SSH security features
• strong algorithms
• uses well established strong algorithms for encryption, integrity, key
exchange, and public key management
• large key size
• requires encryption to be used with at least 128 bit keys
• supports larger keys too
• algorithm negotiation
• encryption, integrity, key exchange, and public key algorithms are negotiated
• it is easy to switch to some other algorithm without modifying the base
protocol
SSH Authentication Methods
I. Password
II. Public/Private Key pair
III. Host-Based Authentication
Prompts for password
Public/Private key pair
Host-Based Authentication
•Doesn’t require (Password or key)
•Provide trust based on hostname and user ID
•User ID on both system has to be the same
Port Forwarding
Sharing your tunnel

More Related Content

What's hot

HTTP Presentation
HTTP Presentation HTTP Presentation
HTTP Presentation
Lana Dujanovic
 
Introduction to Application layer
Introduction to Application layerIntroduction to Application layer
Introduction to Application layer
Dr. C.V. Suresh Babu
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
Ujjayanta Bhaumik
 
HTTP Protocol Basic
HTTP Protocol BasicHTTP Protocol Basic
HTTP Protocol Basic
Chuong Mai
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)
Fatbardh Hysa
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
NetProtocol Xpert
 
Https presentation
Https presentationHttps presentation
Https presentation
patel jatin
 
Chap 10 igmp
Chap 10 igmpChap 10 igmp
Chap 10 igmp
Noctorous Jamal
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
Anagha Ghotkar
 
Ipsec
IpsecIpsec
TCP - Transmission Control Protocol
TCP - Transmission Control ProtocolTCP - Transmission Control Protocol
TCP - Transmission Control Protocol
Peter R. Egli
 
Telnet & SSH
Telnet & SSHTelnet & SSH
Telnet & SSH
NetProtocol Xpert
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
Harish Chand
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
Kak Yong
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.ppt
ImXaib
 
transfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imaptransfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imap
AKSHIT KOHLI
 
Data link layer
Data link layerData link layer
Data link layer
sbkbca
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
Rubal Sagwal
 
Telnet
TelnetTelnet

What's hot (20)

HTTP Presentation
HTTP Presentation HTTP Presentation
HTTP Presentation
 
Introduction to Application layer
Introduction to Application layerIntroduction to Application layer
Introduction to Application layer
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
HTTP Protocol Basic
HTTP Protocol BasicHTTP Protocol Basic
HTTP Protocol Basic
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
Https presentation
Https presentationHttps presentation
Https presentation
 
Chap 10 igmp
Chap 10 igmpChap 10 igmp
Chap 10 igmp
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
 
Ipsec
IpsecIpsec
Ipsec
 
TCP - Transmission Control Protocol
TCP - Transmission Control ProtocolTCP - Transmission Control Protocol
TCP - Transmission Control Protocol
 
Telnet & SSH
Telnet & SSHTelnet & SSH
Telnet & SSH
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.ppt
 
transfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imaptransfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imap
 
Data link layer
Data link layerData link layer
Data link layer
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Telnet
TelnetTelnet
Telnet
 

Viewers also liked

Internet to web: The 40-year old Internet and the 20-year-old Web
Internet to web:  The 40-year old Internet and the 20-year-old WebInternet to web:  The 40-year old Internet and the 20-year-old Web
Internet to web: The 40-year old Internet and the 20-year-old WebJohan Koren
 
Network telnet ssh
Network telnet sshNetwork telnet ssh
Network telnet ssh
Stefan Fodor
 
Nami ppt eng v3.3.1
Nami ppt eng v3.3.1Nami ppt eng v3.3.1
Nami ppt eng v3.3.1
Anthony Stock
 
Remote login.89 to 90
Remote login.89 to 90Remote login.89 to 90
Remote login.89 to 90
myrajendra
 
Telnet
TelnetTelnet
Computer Network - Telnet and Gopher
Computer Network -  Telnet and GopherComputer Network -  Telnet and Gopher
Computer Network - Telnet and Gopher
Manoj Kumar
 
Presentation on samba server
Presentation on samba serverPresentation on samba server
Presentation on samba server
Veeral Bhateja
 
Telnet
TelnetTelnet
Presentation on telnet
Presentation on telnetPresentation on telnet
Presentation on telnetAmandeep Kaur
 
FTP - File Transfer Protocol
FTP - File Transfer ProtocolFTP - File Transfer Protocol
FTP - File Transfer Protocol
Peter R. Egli
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
guest029bcd
 
Presentation on Talent Development
Presentation on Talent DevelopmentPresentation on Talent Development
Presentation on Talent Development
Tim Weyland
 

Viewers also liked (14)

Internet to web: The 40-year old Internet and the 20-year-old Web
Internet to web:  The 40-year old Internet and the 20-year-old WebInternet to web:  The 40-year old Internet and the 20-year-old Web
Internet to web: The 40-year old Internet and the 20-year-old Web
 
Network telnet ssh
Network telnet sshNetwork telnet ssh
Network telnet ssh
 
Nami ppt eng v3.3.1
Nami ppt eng v3.3.1Nami ppt eng v3.3.1
Nami ppt eng v3.3.1
 
Remote login.89 to 90
Remote login.89 to 90Remote login.89 to 90
Remote login.89 to 90
 
Telnet
TelnetTelnet
Telnet
 
Telnet
TelnetTelnet
Telnet
 
Computer Network - Telnet and Gopher
Computer Network -  Telnet and GopherComputer Network -  Telnet and Gopher
Computer Network - Telnet and Gopher
 
Presentation on samba server
Presentation on samba serverPresentation on samba server
Presentation on samba server
 
Telnet
TelnetTelnet
Telnet
 
Presentation on telnet
Presentation on telnetPresentation on telnet
Presentation on telnet
 
FTP - File Transfer Protocol
FTP - File Transfer ProtocolFTP - File Transfer Protocol
FTP - File Transfer Protocol
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Webpre2
Webpre2Webpre2
Webpre2
 
Presentation on Talent Development
Presentation on Talent DevelopmentPresentation on Talent Development
Presentation on Talent Development
 

Similar to TELNET and SSH by MUSTAFA SAKHAI

Telnet presentation
Telnet presentationTelnet presentation
Telnet presentation
travel_affair
 
Computer Networks
Computer NetworksComputer Networks
Computer NetworksShylesh BC
 
Computer networks
Computer networksComputer networks
Computer networks
sonukumar142
 
Remote login
Remote loginRemote login
Remote login
sarjoo prasad yadav
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference models
bhavanatmithun
 
Telnet and FTP.ppt
Telnet and FTP.pptTelnet and FTP.ppt
Telnet and FTP.ppt
ssuser1774d3
 
Application Protocol
Application Protocol Application Protocol
Application Protocol
Chandnigupta80
 
XMPP and SIP Presence Protocols for Messaging and Session Control.pptx
XMPP and SIP Presence Protocols for Messaging and Session Control.pptxXMPP and SIP Presence Protocols for Messaging and Session Control.pptx
XMPP and SIP Presence Protocols for Messaging and Session Control.pptx
GSCWU
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
AnaniaKapala
 
Protolcols in communication system
Protolcols in communication systemProtolcols in communication system
Protolcols in communication system
Archana Dwivedi
 
The Internet Protocol Suite (commonly known as TCP/IP)
The Internet Protocol Suite (commonly known as TCP/IP) The Internet Protocol Suite (commonly known as TCP/IP)
The Internet Protocol Suite (commonly known as TCP/IP)
M Shamim Iqbal
 
Telnet & Secure Shell
Telnet & Secure ShellTelnet & Secure Shell
Telnet & Secure ShellWILLA REYES
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdfmashiur
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
Himanshu Pathak
 
tcp.pptx
tcp.pptxtcp.pptx
tcp.pptx
HarishPrasanth1
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5
98 366 mva slides lesson 5
98 366 mva slides lesson 598 366 mva slides lesson 5
98 366 mva slides lesson 5
suddenven
 
Application Layer
Application LayerApplication Layer
Application Layer
Sweta Kumari Barnwal
 

Similar to TELNET and SSH by MUSTAFA SAKHAI (20)

Telnet presentation
Telnet presentationTelnet presentation
Telnet presentation
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Computer networks
Computer networksComputer networks
Computer networks
 
Remote login
Remote loginRemote login
Remote login
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference models
 
Telnet and FTP.ppt
Telnet and FTP.pptTelnet and FTP.ppt
Telnet and FTP.ppt
 
Application Protocol
Application Protocol Application Protocol
Application Protocol
 
Report on telnet
Report on telnetReport on telnet
Report on telnet
 
XMPP and SIP Presence Protocols for Messaging and Session Control.pptx
XMPP and SIP Presence Protocols for Messaging and Session Control.pptxXMPP and SIP Presence Protocols for Messaging and Session Control.pptx
XMPP and SIP Presence Protocols for Messaging and Session Control.pptx
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Protolcols in communication system
Protolcols in communication systemProtolcols in communication system
Protolcols in communication system
 
The Internet Protocol Suite (commonly known as TCP/IP)
The Internet Protocol Suite (commonly known as TCP/IP) The Internet Protocol Suite (commonly known as TCP/IP)
The Internet Protocol Suite (commonly known as TCP/IP)
 
Telnet & Secure Shell
Telnet & Secure ShellTelnet & Secure Shell
Telnet & Secure Shell
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
 
tcp.pptx
tcp.pptxtcp.pptx
tcp.pptx
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5
MVA slides lesson 5
 
98 366 mva slides lesson 5
98 366 mva slides lesson 598 366 mva slides lesson 5
98 366 mva slides lesson 5
 
Application Layer
Application LayerApplication Layer
Application Layer
 

Recently uploaded

Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 

Recently uploaded (20)

Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 

TELNET and SSH by MUSTAFA SAKHAI

  • 2. 1. TELNET (Terminal Network) • TELNET is an abbreviation for TErminaL NETwork. • Is an application layer protocol used on the internet or local area networks, enables the establishment of a connection to a remote system in such a way that the local terminal appears to be a terminal at the remote system. • It is the standard TCP/IP protocol for virtual terminal service
  • 3. Topics to be Discussed • Understand how TELNET works • Understand the role of NVT in a TELNET communication • Understand TELNET option and sub-option negotiation • Know how control characters are used • Know the TELNET modes of operation • Why TELNET unsecure!
  • 4. TELNET is a general-purpose client-server application program
  • 8. Network Virtual Terminal (NVT) • Is a universal interface, The TELNET client translates characters (data or commands) that come from the local terminal into NVT form and delivers them to the network. The TELNET server translates data and commands from NVT form into the form acceptable by the remote computer. Figure 1.3 concept of NVT
  • 9. NVT uses two sets of characters, one for data and one for control. Both are 8-bits. Figure 1.5 format of data and control characters
  • 10. Table 1.1 some of NVT control characters
  • 11. Mode of Operations I. Default Mode II. Character Mode III.Line Mode
  • 12. Default Mode • In this example, we use the default mode to show the concept and its deficiencies even though it is almost obsolete today. • The client and the server negotiate the terminal type and terminal speed and then the server checks the login and password of the user (see figure 1.6).
  • 14. Character Mode •We show how the client switches to the character mode. This requires that the client request the server to enable the SUPPRESS GO AHEAD and ECHO options (see Figure 1.7).
  • 16. Line Mode • It’s proposed to compensate for the deficiencies of default mode and character mode • In this line (echoing) in done by the client, then the client sends the whole line to the server
  • 17. Why TELNET Unsecure?! TELNET suffers from security problems. TELNET requires a login name and password (when exchanging text). A microcomputer connected to a broadcast LAN can easily spy using snooper software to capture a login name and the corresponding password (even if it is encrypted).!! It’s Big problem Let’s see how to hacking ;)
  • 18. Use ping to check the connection Figure 1.8
  • 19. Using Wireshark to capture data from LAN port Figure 1.9
  • 22. 2. SSH • Is a protocol for secure remote login and other secure network services over an unsecure network. • Secure channel between two computers • Provides data confidentiality and integrity • Many uses other than remote shell
  • 23. Topics to be Discussed • History • SSH components • Why using SSH? • SSH security features • SSH Authentication Methods • Port forwarding
  • 24. History • SSH-1 designed in 1995 by Tatu Ylönen • In response to a password-sniffing attack • Replacement for rlogin, telnet, and rsh • Released as freeware in July 1995 • SSH-2 designed in 1996 • Incompatible with SSH-1 • Security and feature improvements • Open source implementations (OSSH and OpenSSH) created in 1999 • OSSH is now obsolete • OpenSSH is the most popular SSH implementation as of 2005
  • 25. SSH Components •Transport Layer Protocol •Provides server authentication, confidentiality, and integrity •User Authentication Protocol •Authenticates the client-side user to the server •Connection Protocol •Multiplexes the tunnel into logical channels
  • 29. Why using SSH? •SSH can handle secure remote logins (SSH) •SSH can handle secure file copy (SCP) •SSH can even drive secure FTP (sFTP)
  • 30. SSH security features • strong algorithms • uses well established strong algorithms for encryption, integrity, key exchange, and public key management • large key size • requires encryption to be used with at least 128 bit keys • supports larger keys too • algorithm negotiation • encryption, integrity, key exchange, and public key algorithms are negotiated • it is easy to switch to some other algorithm without modifying the base protocol
  • 31. SSH Authentication Methods I. Password II. Public/Private Key pair III. Host-Based Authentication
  • 34. Host-Based Authentication •Doesn’t require (Password or key) •Provide trust based on hostname and user ID •User ID on both system has to be the same