SlideShare a Scribd company logo
TELNET
Telnet is a combined words of Telecommunications Network, and is one
of the major network protocols used on the Internet, telnet is a textbased protocol, works on the application layer of the OSI model, is a
general-purpose client-server application program, it is one of the
earliest network protocols, which was developed in 1969 and has
evolved over the years to be a robust protocol.
The original purpose of telnet was to have an easy interface for terminals
to interact with one another, using relatively simple command structures
and accessible interfaces.
It provides a bidirectional interactive text-oriented communication
facility via virtual connection.

Once the telnet connection is established users can perform authorize
function on a the server as telnet lets the client and server negotiate
options before or during the use of the service.
TELNET








Can be used to send and receive information
Administration of network elements
Supports user authentication
Collaboration of multiple users
Can be used to send and receive information
Most OS include an Application layer Telnet client
All Telnet clients and servers implement a network virtual
terminal.
TELNET






Display only text and numbers
No graphics
No color
No mouse (no menus, check boxes, etc)
Do not support the transport of encrypted data
TELNET

UserName

authentication

Password

User

granted access
TelNet Server
TELNET
Network Virtual Terminal is responsible for translating
operating system-specific instructions (keyboard codes or
display codes) into a consistent set of codes that all Telnet
clients and servers can transmit and receive.
The NVT is what makes Telnet clients and servers capable of
communicating with each other regardless of which operating system
they are using and provides a standard communication base, comprised
of:
7 bit ASCII characters to which the extended ASCII code is added
Three control characters
Five optional control characters
A set of basic control signals
TELNET

An online game, a text-based nature of telnet in ASCII char; plain, classic but still fun
TELNET
This is a sample telnet session of a network host
running virtually on a terminal in Win7 wherein the
communication is bidirectional (2-way) the host
displays text only, and then awaits an Enter key
press to continue
TELNET
Code

Option

Description

0

Binary

Interprets an 8-bit binary transmission

1

Echo

Echo the data receive on 1 side to the other

3

Suppress go ahead

Suppress go-ahead to signal data

5

Status

Request the status of Telnet

6

Timing Mark

Defines the timing marks

24

Terminal Type

Set the terminal type

32

Terminal Speed

Set the terminal speed

34

Line Mode

Change the line mode
TELNET
Sender

WILL
WILL

Direction

Receiver

Description

Meaning

DO

Sender wants to enable option.
Receiver says OK.

Option is in effect

DON’T

Sender wants to enable option.
Receiver says no.

Option is not in effect

DO

WILL

Sender wants receiver to enable option.
Receiver says OK.

Option is in effect

DO

WON’T

Sender wants receiver to enable option.
Receiver says no.

Option is not in effect

WON’T

DON’T

Sender wants to disable option.
Receiver must say OK.

DONT is only valid response

DONT

WON’T

Sender wants receiver to disable option.
Receiver must say OK.

WONT is only valid response
TELNET
TELNET suffers from security problems.
TELNET requires a login name and password (when exchanging text).
Ex.threat :

A microcomputer connected to a LAN can easily eavesdrop using
snooper software to capture a login name and the corresponding
password even if it is encrypted. For this reason, Telnet has been
largely replaced by the more secure SSH protocol.

Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people.
Decryption is the process of converting encrypted data back into its original form, so it can be understood
SECURE SHELL
SSH is a cryptographic network protocol for secure data
communication, via a secure channel over an unsecure
network of a server and a client.
Secure Shell is an alternative protocol to TelNet and
Rlogin which connects to Unix servers originally created
in 1995.

Cryptography – anything written in a secret code or cyphers
SECURE SHELL
Client

Server

SSH
Normally a data is transmitted between client and server but not in a
secure line, like internet

To transmit data in a secure line, we use Secure SHell
SECURE SHELL
SSH is important in cloud computing to solve connectivity problems,
avoiding the security issues of exposing a cloud-based virtual machine
directly on the Internet.
An SSH tunnel can provide a secure path over the Internet, through a
firewall to a virtual machine
Key Benefits
1. Confidentiality - nobody can read the message content
2. Authentication (of both the client and server) - protection against IP
spoofing, IP source routing, DNS spoofing, password interception and
eavesdropping
3. Integrity - guarantee that data is unaltered on transit

Cryptography – anything written in a secret code or cyphers
SECURE SHELL
 can handle secure remote logins (ssh)
 can handle secure file copy(scp) and drive secure FTP
 Strong integrity checking via message authentication codes
 transfer a file from a computer to another
 Better security through key exchange
 Browsing the web through an encrypted proxy connection,
using the SSH server as a proxy
 Both ends authenticate themselves to the other end or all
traffic encrypted
SECURE SHELL
 can be considered a security risk by companies or
governments who do not trust their users
 SSH2 has inherent design flaws which make it vulnerable to manin-the-middle-attacks

Most modern servers and clients this days support SSH-2
SECURE SHELL
SSH authenticates through:
 Public Key Encryption(RSA or DSA)/Private Key
Each computer in the communication has two keys, a public key and a
private key. The message is encrypted using the public key, which is
available to anyone, but can only be decoded using the private key,
which is known by only the destination computer. Though the keys are
mathematically related, there is no way to figure out the private key using
the public key.

SSH uses the following ciphers for authentication:
Cipher

SSH1

SSH2

RSA

yes

yes

DSA

no

yes

Cipher are usually secret codes / hidden writing
SECURE SHELL
Difference between:
SSH1 - uses server and host keys to authenticate systems
SSH2 – more secure because it uses only host keys

Difference between:
DSA is generally faster in decryption but slower for encryption
RSA is less secure than DSA but authenticates faster

Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people.
Decryption is the process of converting encrypted data back into its original form, so it can be understood
RSA was named after its 3 inventors.
DSA stands for Digital Signature Algorithm
SECURE SHELL
 Kerberos
• Only a single login is required per session

• The concept depends on a trusted third party – using systems in
the network and is trusted by all of them
• It performs mutual authentication, where a client proves its
identity to a server and a server proves its identity to the client.
 Host-Based Auth.
Host-based authentication in SSH is used
Simple trust: the host is certified trusted, the user is trusted even no
password is provided, then the communication starts.
Conclusion
Telnet is one of the protocols that helps in network
communications and used to communicate with other
computers and machines in a text-based manner with
support of other programs.

Ssh will not help you with anything that compromises
your host's security in some other way.
Once an attacker has gained root access to a machine,
he can then subvert or destroy ssh, too.
If somebody malevolent has access to your home directory,
then security is nonexistent. Other forms of security or firewall
can be added in the network system
Summary
Using telnet to establish a connection to a host is simple, you can
interact with the remote computer directly by typing simple
commands. Normally the data transmission between client and server
is not in a secure line and to make it secure an administrator can
implement secure shell which can terminate a secure session utilizing
an encryption.
To sum it up in simple terms, Telnet protocol supports user
authentication, it does not support the transport of encrypted data
unlike the Secure Shell protocol which offers an alternate and secure
method for server access. As a best practice, network professionals
should always use SSH in place of Telnet, whenever possible.
?
Thank You!

More Related Content

What's hot

Ip security
Ip security Ip security
Ip security
Naveen Dubey
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream Ciphers
Sam Bowne
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Pina Parmar
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
Kalpesh Kalekar
 
Secure shell protocol
Secure shell protocolSecure shell protocol
Secure shell protocol
Baspally Sai Anirudh
 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 
Email security
Email securityEmail security
Email security
Indrajit Sreemany
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
drewz lin
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
SubhradeepMaji
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
ahmad abdelhafeez
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Naveen Kumar
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
Mijanur Rahman Milon
 
SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )
Monodip Singha Roy
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
sravya raju
 
Telnet & SSH Configuration
Telnet & SSH ConfigurationTelnet & SSH Configuration
Telnet & SSH Configuration
Vinod Gour
 
Telnet presentation
Telnet presentationTelnet presentation
Telnet presentation
travel_affair
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
vimal kumar
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
Tirthika Bandi
 
Dss digital signature standard and dsa algorithm
Dss  digital signature standard and dsa algorithmDss  digital signature standard and dsa algorithm
Dss digital signature standard and dsa algorithm
Abhishek Kesharwani
 

What's hot (20)

Ip security
Ip security Ip security
Ip security
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream Ciphers
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
Secure shell protocol
Secure shell protocolSecure shell protocol
Secure shell protocol
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Email security
Email securityEmail security
Email security
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
 
SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
Telnet & SSH Configuration
Telnet & SSH ConfigurationTelnet & SSH Configuration
Telnet & SSH Configuration
 
Telnet presentation
Telnet presentationTelnet presentation
Telnet presentation
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
 
Dss digital signature standard and dsa algorithm
Dss  digital signature standard and dsa algorithmDss  digital signature standard and dsa algorithm
Dss digital signature standard and dsa algorithm
 

Viewers also liked

09 telnet, remote dan ftp
09 telnet, remote dan ftp09 telnet, remote dan ftp
09 telnet, remote dan ftpNurul Hudin
 
Report on telnet
Report on telnetReport on telnet
Report on telnet
Amandeep Kaur
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
Harish Chand
 
Instalación ftp, telnet y ssh sobre linux
Instalación ftp, telnet y ssh sobre linuxInstalación ftp, telnet y ssh sobre linux
Instalación ftp, telnet y ssh sobre linux
Ger Hernandez
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
priya sehgal
 
Ftp
FtpFtp
Ftp (file transfer protocol)
Ftp (file transfer protocol)Ftp (file transfer protocol)
Ftp (file transfer protocol)
Raghu nath
 
Computer Network - Telnet and Gopher
Computer Network -  Telnet and GopherComputer Network -  Telnet and Gopher
Computer Network - Telnet and Gopher
Manoj Kumar
 
File transfer protocol (ftp)
File transfer protocol (ftp)File transfer protocol (ftp)
File transfer protocol (ftp)
Cort1026
 
Telnet
TelnetTelnet
Telnet
昱彰 陳
 
TELNET Protocol
TELNET ProtocolTELNET Protocol
TELNET Protocol
Peter R. Egli
 
Presentation on telnet
Presentation on telnetPresentation on telnet
Presentation on telnet
Amandeep Kaur
 
FTP - File Transfer Protocol
FTP - File Transfer ProtocolFTP - File Transfer Protocol
FTP - File Transfer Protocol
Peter R. Egli
 
TCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet ProtocolTCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet Protocol
We Learn - A Continuous Learning Forum from Welingkar's Distance Learning Program.
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
sanjoysanyal
 

Viewers also liked (15)

09 telnet, remote dan ftp
09 telnet, remote dan ftp09 telnet, remote dan ftp
09 telnet, remote dan ftp
 
Report on telnet
Report on telnetReport on telnet
Report on telnet
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
 
Instalación ftp, telnet y ssh sobre linux
Instalación ftp, telnet y ssh sobre linuxInstalación ftp, telnet y ssh sobre linux
Instalación ftp, telnet y ssh sobre linux
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Ftp
FtpFtp
Ftp
 
Ftp (file transfer protocol)
Ftp (file transfer protocol)Ftp (file transfer protocol)
Ftp (file transfer protocol)
 
Computer Network - Telnet and Gopher
Computer Network -  Telnet and GopherComputer Network -  Telnet and Gopher
Computer Network - Telnet and Gopher
 
File transfer protocol (ftp)
File transfer protocol (ftp)File transfer protocol (ftp)
File transfer protocol (ftp)
 
Telnet
TelnetTelnet
Telnet
 
TELNET Protocol
TELNET ProtocolTELNET Protocol
TELNET Protocol
 
Presentation on telnet
Presentation on telnetPresentation on telnet
Presentation on telnet
 
FTP - File Transfer Protocol
FTP - File Transfer ProtocolFTP - File Transfer Protocol
FTP - File Transfer Protocol
 
TCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet ProtocolTCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet Protocol
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 

Similar to Telnet & Secure Shell

Secure shell
Secure shellSecure shell
Secure shell
Arjun Aj
 
Remote1
Remote1Remote1
Remote1
Harsh Singh
 
What is TLS/SSL?
What is TLS/SSL? What is TLS/SSL?
What is TLS/SSL?
Shehzad Imran
 
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer Security
ByronKimani
 
Telnet & SSH
Telnet & SSHTelnet & SSH
Telnet & SSH
NetProtocol Xpert
 
Application Layer
Application LayerApplication Layer
Application Layer
Sweta Kumari Barnwal
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.ppt
ImXaib
 
SSh_part_1.pptx
SSh_part_1.pptxSSh_part_1.pptx
SSh_part_1.pptx
Shelly119532
 
ssl
sslssl
Remote Login
Remote LoginRemote Login
Remote Login
guest095022
 
Ssh (The Secure Shell)
Ssh (The Secure Shell)Ssh (The Secure Shell)
Ssh (The Secure Shell)
Mehedi Farazi
 
Computer Seminar.pptx
Computer Seminar.pptxComputer Seminar.pptx
Computer Seminar.pptx
MelvinShaji12
 
Team 5 presentation
Team 5 presentationTeam 5 presentation
Team 5 presentation
rob420
 
Web Security
Web SecurityWeb Security
Web Security
Dr.Florence Dayana
 
Meeting 5.2 : ssh
Meeting 5.2 : sshMeeting 5.2 : ssh
Meeting 5.2 : ssh
Syaiful Ahdan
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
csandit
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
cscpconf
 
application layer
application layerapplication layer
application layer
BishalWosti1
 
TELNET and SSH by MUSTAFA SAKHAI
TELNET and SSH by MUSTAFA SAKHAITELNET and SSH by MUSTAFA SAKHAI
TELNET and SSH by MUSTAFA SAKHAI
MUSTAFA SAKHAI
 
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.pptWEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
SonukumarRawat
 

Similar to Telnet & Secure Shell (20)

Secure shell
Secure shellSecure shell
Secure shell
 
Remote1
Remote1Remote1
Remote1
 
What is TLS/SSL?
What is TLS/SSL? What is TLS/SSL?
What is TLS/SSL?
 
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer Security
 
Telnet & SSH
Telnet & SSHTelnet & SSH
Telnet & SSH
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.ppt
 
SSh_part_1.pptx
SSh_part_1.pptxSSh_part_1.pptx
SSh_part_1.pptx
 
ssl
sslssl
ssl
 
Remote Login
Remote LoginRemote Login
Remote Login
 
Ssh (The Secure Shell)
Ssh (The Secure Shell)Ssh (The Secure Shell)
Ssh (The Secure Shell)
 
Computer Seminar.pptx
Computer Seminar.pptxComputer Seminar.pptx
Computer Seminar.pptx
 
Team 5 presentation
Team 5 presentationTeam 5 presentation
Team 5 presentation
 
Web Security
Web SecurityWeb Security
Web Security
 
Meeting 5.2 : ssh
Meeting 5.2 : sshMeeting 5.2 : ssh
Meeting 5.2 : ssh
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
 
application layer
application layerapplication layer
application layer
 
TELNET and SSH by MUSTAFA SAKHAI
TELNET and SSH by MUSTAFA SAKHAITELNET and SSH by MUSTAFA SAKHAI
TELNET and SSH by MUSTAFA SAKHAI
 
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.pptWEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
 

Recently uploaded

Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 

Recently uploaded (20)

Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 

Telnet & Secure Shell

  • 1.
  • 2. TELNET Telnet is a combined words of Telecommunications Network, and is one of the major network protocols used on the Internet, telnet is a textbased protocol, works on the application layer of the OSI model, is a general-purpose client-server application program, it is one of the earliest network protocols, which was developed in 1969 and has evolved over the years to be a robust protocol. The original purpose of telnet was to have an easy interface for terminals to interact with one another, using relatively simple command structures and accessible interfaces. It provides a bidirectional interactive text-oriented communication facility via virtual connection. Once the telnet connection is established users can perform authorize function on a the server as telnet lets the client and server negotiate options before or during the use of the service.
  • 3. TELNET        Can be used to send and receive information Administration of network elements Supports user authentication Collaboration of multiple users Can be used to send and receive information Most OS include an Application layer Telnet client All Telnet clients and servers implement a network virtual terminal.
  • 4. TELNET      Display only text and numbers No graphics No color No mouse (no menus, check boxes, etc) Do not support the transport of encrypted data
  • 6. TELNET Network Virtual Terminal is responsible for translating operating system-specific instructions (keyboard codes or display codes) into a consistent set of codes that all Telnet clients and servers can transmit and receive. The NVT is what makes Telnet clients and servers capable of communicating with each other regardless of which operating system they are using and provides a standard communication base, comprised of: 7 bit ASCII characters to which the extended ASCII code is added Three control characters Five optional control characters A set of basic control signals
  • 7. TELNET An online game, a text-based nature of telnet in ASCII char; plain, classic but still fun
  • 8. TELNET This is a sample telnet session of a network host running virtually on a terminal in Win7 wherein the communication is bidirectional (2-way) the host displays text only, and then awaits an Enter key press to continue
  • 9. TELNET Code Option Description 0 Binary Interprets an 8-bit binary transmission 1 Echo Echo the data receive on 1 side to the other 3 Suppress go ahead Suppress go-ahead to signal data 5 Status Request the status of Telnet 6 Timing Mark Defines the timing marks 24 Terminal Type Set the terminal type 32 Terminal Speed Set the terminal speed 34 Line Mode Change the line mode
  • 10. TELNET Sender WILL WILL Direction Receiver Description Meaning DO Sender wants to enable option. Receiver says OK. Option is in effect DON’T Sender wants to enable option. Receiver says no. Option is not in effect DO WILL Sender wants receiver to enable option. Receiver says OK. Option is in effect DO WON’T Sender wants receiver to enable option. Receiver says no. Option is not in effect WON’T DON’T Sender wants to disable option. Receiver must say OK. DONT is only valid response DONT WON’T Sender wants receiver to disable option. Receiver must say OK. WONT is only valid response
  • 11. TELNET TELNET suffers from security problems. TELNET requires a login name and password (when exchanging text). Ex.threat : A microcomputer connected to a LAN can easily eavesdrop using snooper software to capture a login name and the corresponding password even if it is encrypted. For this reason, Telnet has been largely replaced by the more secure SSH protocol. Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood
  • 12. SECURE SHELL SSH is a cryptographic network protocol for secure data communication, via a secure channel over an unsecure network of a server and a client. Secure Shell is an alternative protocol to TelNet and Rlogin which connects to Unix servers originally created in 1995. Cryptography – anything written in a secret code or cyphers
  • 13. SECURE SHELL Client Server SSH Normally a data is transmitted between client and server but not in a secure line, like internet To transmit data in a secure line, we use Secure SHell
  • 14. SECURE SHELL SSH is important in cloud computing to solve connectivity problems, avoiding the security issues of exposing a cloud-based virtual machine directly on the Internet. An SSH tunnel can provide a secure path over the Internet, through a firewall to a virtual machine Key Benefits 1. Confidentiality - nobody can read the message content 2. Authentication (of both the client and server) - protection against IP spoofing, IP source routing, DNS spoofing, password interception and eavesdropping 3. Integrity - guarantee that data is unaltered on transit Cryptography – anything written in a secret code or cyphers
  • 15. SECURE SHELL  can handle secure remote logins (ssh)  can handle secure file copy(scp) and drive secure FTP  Strong integrity checking via message authentication codes  transfer a file from a computer to another  Better security through key exchange  Browsing the web through an encrypted proxy connection, using the SSH server as a proxy  Both ends authenticate themselves to the other end or all traffic encrypted
  • 16. SECURE SHELL  can be considered a security risk by companies or governments who do not trust their users  SSH2 has inherent design flaws which make it vulnerable to manin-the-middle-attacks Most modern servers and clients this days support SSH-2
  • 17. SECURE SHELL SSH authenticates through:  Public Key Encryption(RSA or DSA)/Private Key Each computer in the communication has two keys, a public key and a private key. The message is encrypted using the public key, which is available to anyone, but can only be decoded using the private key, which is known by only the destination computer. Though the keys are mathematically related, there is no way to figure out the private key using the public key. SSH uses the following ciphers for authentication: Cipher SSH1 SSH2 RSA yes yes DSA no yes Cipher are usually secret codes / hidden writing
  • 18. SECURE SHELL Difference between: SSH1 - uses server and host keys to authenticate systems SSH2 – more secure because it uses only host keys Difference between: DSA is generally faster in decryption but slower for encryption RSA is less secure than DSA but authenticates faster Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood RSA was named after its 3 inventors. DSA stands for Digital Signature Algorithm
  • 19. SECURE SHELL  Kerberos • Only a single login is required per session • The concept depends on a trusted third party – using systems in the network and is trusted by all of them • It performs mutual authentication, where a client proves its identity to a server and a server proves its identity to the client.  Host-Based Auth. Host-based authentication in SSH is used Simple trust: the host is certified trusted, the user is trusted even no password is provided, then the communication starts.
  • 20. Conclusion Telnet is one of the protocols that helps in network communications and used to communicate with other computers and machines in a text-based manner with support of other programs. Ssh will not help you with anything that compromises your host's security in some other way. Once an attacker has gained root access to a machine, he can then subvert or destroy ssh, too. If somebody malevolent has access to your home directory, then security is nonexistent. Other forms of security or firewall can be added in the network system
  • 21. Summary Using telnet to establish a connection to a host is simple, you can interact with the remote computer directly by typing simple commands. Normally the data transmission between client and server is not in a secure line and to make it secure an administrator can implement secure shell which can terminate a secure session utilizing an encryption. To sum it up in simple terms, Telnet protocol supports user authentication, it does not support the transport of encrypted data unlike the Secure Shell protocol which offers an alternate and secure method for server access. As a best practice, network professionals should always use SSH in place of Telnet, whenever possible.
  • 22. ?