Protocol Vulnerability: Using unsecure protocols like TELNET / HTTP
Vulnerability is when you are using unsecure methods in your organization that may open you up to attacks from hackers.This lab provides a simple inside look into why protocols like TELNET/HTTP are not used instead SSH/HTTPS is used. Router 1 Configs: Assign IP on port: Configs for enabling TELNET Enable HTTP R2 Configs: Just configure IP on the port. Now to show as to why using TELNET is a vulnerability we are going to access the R1 using telnet from R2. We will capture packet using Wireshark, and look for Telnet traffic. Go to Router 2 and TELNET into Router 1 and run some commands. Filter for telnet traffic. So I ran 2 commands "show ip interface br" & "show interface summary". Lets see the Wireshark capture. And here you can see if I am a malicious actor, I have gotten access to your account/password and I can also see the commands and configuration that you are making to the router. This is the prime reason why TELNET is discouraged. Now we go the kali linu...