Protocol Vulnerability: Using unsecure protocols like TELNET / HTTP

Vulnerability is when you are using unsecure methods in your organization that may open you up to attacks from hackers.This lab provides a simple inside look into why protocols like TELNET/HTTP are not used instead SSH/HTTPS is used.


Router 1 Configs:

Assign IP on port:


Configs for enabling TELNET



Enable HTTP

R2 Configs: Just configure IP on the port.


Now to show as to why using TELNET is a vulnerability we are going to access the R1 using telnet from R2.

We will capture packet using Wireshark, and look for Telnet traffic.


Go to Router 2 and TELNET into Router 1 and run some commands.

Filter for telnet traffic.


So I ran 2 commands "show ip interface br" & "show interface summary".

Lets see the Wireshark capture.


And here you can see if I am a malicious actor, I have gotten access to your account/password and I can also see the commands and configuration that you are making to the router.

This is the prime reason why TELNET is discouraged.

Now we go the kali linux and enter the router using HTTP.

Open firefox.

Type the address of the interafce ip and enter the username and password.


We can access the router from here and run some commands.

Later we will see the wireshark capture and see the HTTP traffic.


I ran the "show version" command and you can see the output below.

Here is the vulnerability among the unsecure protocols.

I can see the credentials and the command that was executed as well.   

Please share you thoughts on the topic, and the feedback on the linkedin post.

Tell me what topics you want me to explore. I'm thinking about automation with Ansible or Python. 

Comments

Popular posts from this blog

Denial of Service : Ping of Death [Kali Linux]

GRE over IPSEC Tunnel

OSPF Special Areas