Never use Telnet

Sdílet
Vložit
  • čas přidán 5. 09. 2024

Komentáře • 95

  • @davidbombal
    @davidbombal  Před 3 lety

    Get the full Wireshark course for $9: bit.ly/wireshark9
    Need help? Join my Discord: discord.com/invite/usKSyzb
    Download pcapng file here: bit.ly/2GSsNGg
    ======================
    Special Offers:
    ======================
    Cisco Press: Up to 50% discount
    Save every day on Cisco Press learning products! Use discount code BOMBAL during checkout to save 35% on print books (plus free shipping in the U.S.), 45% on eBooks, and 50% on video courses and simulator software. Offer expires December 31, 2020. Shop now.
    Link: bit.ly/ciscopress50
    ITPro.TV:
    itpro.tv/davidbombal
    30% discount off all plans Code: DAVIDBOMBAL
    Boson software: 15% discount
    Link: bit.ly/boson15
    Code: DBAF15P
    GNS3 Academy:
    CCNA ($10): bit.ly/gns3ccna10
    Wireshark ($10): bit.ly/gns3wireshark
    DavidBombal.com
    DavidBombal.com: CCNA ($10): bit.ly/yt999ccna
    Wireshark ($9): bit.ly/wireshark9

  • @nickpmoody
    @nickpmoody Před 3 lety +3

    I really appreciate the effort you put into your content. The audio and video quality is also absolutely superb.

  • @lstyle3210
    @lstyle3210 Před 3 lety +6

    Yep, I definitely have your Wireshark course from Udemy. Will you be creating Cisco firewall course in the future ?

    • @davidbombal
      @davidbombal  Před 3 lety +8

      Depends on time and demand. I am way behind with things :(

    • @solemba595
      @solemba595 Před 3 lety +3

      @Bombal you are among of the Best instructor in the world, 99% of students can understand your explanations.
      Thank you so much for share...

    • @rajatraturi1996
      @rajatraturi1996 Před 3 lety +1

      @@davidbombal please create cisco firewall course as well.

  • @educastellini
    @educastellini Před 3 lety

    -Great content ... !!!
    -For security reasons the network engineer always has to mitigate the chances of invasion of the devices on the network and to protect it in the best way and with the best practices.
    -Telnet is unprotected and a very bad option that unfortunately sometimes due to the lack of knowledge that the teacher taught in the video, people leave the protocol active.
    -Always important to pay attention if in the "line vty" configuration leave only "transport input ssh", never the line "transport input all" or "transport input telnet" configured.
    -In cases it would be good to create an access list to block the telnet.
    -In Juniper firewalls these protocols must be enabled and are blocked by default.

  • @ethioappreview1207
    @ethioappreview1207 Před 3 lety

    Yes bro u are my role modeland best person while u are teaching what u are talking is clear and best of the best

  • @rayancrasta7460
    @rayancrasta7460 Před 3 lety

    Thanks a lot for this vid, will buy your Wireshark soon after the Linux gsn3 course

  • @Learner555
    @Learner555 Před 3 lety

    Thanks David for uploading the video in Wireshark series!!

  • @jamesdietsch7868
    @jamesdietsch7868 Před 3 lety +1

    Thanks for the upload David! Well explained! Great content as always :)

  • @ronnyrafoo
    @ronnyrafoo Před 2 lety

    Telnet, a modest icon of the unresolvable. Lets see what the future of chain-linking has to offer.

  • @anuradhalakruwan1918
    @anuradhalakruwan1918 Před 3 lety +1

    Good lesson David sar..... 👍👍👍👍👍🌹🌹🌹🌹🌹🌹

  • @user-jk6ie6cd3h
    @user-jk6ie6cd3h Před 3 lety

    Great video David.please can you tell where you get ubuntu client cli based gns3 applianse from?.thanks

  • @sarthakmathur7696
    @sarthakmathur7696 Před 3 lety +2

    This is so cool!! Thanks for the video

  • @ThePharaon8
    @ThePharaon8 Před 3 lety

    Hello
    I'm a subscriber to your CZcams channel and I find your tutorials great. I have knowledge in pentest, and I learn every day. I would like to ask you what are the different procedures for entering a local business network for example and accessing your local oracle server from the internet?
    I read one of your tutorials from 2016 on port forwarding, but over time other more effective techniques have surely emerged. In summary, how to hack a LAN network from the Internet, that is to say WAN?
    i use kali. How to bypass DMZ protections?
    What are the best tools or scripts to use?
    Thanks again and see you very soon.

  • @MSPHOTOGRAPHY-ep8by
    @MSPHOTOGRAPHY-ep8by Před 3 lety

    Hello sir
    I how to agian access to pcs which using telnet port 23 on the same network

  • @mirzadzafic8999
    @mirzadzafic8999 Před 3 lety

    Hi David, great video. I have question. In the GNS3 it is simple to catch telnet packets on link. You also say in real world we need to span port, or inject some device in te network to catch packets. Is there any more way that hacker can catch traffic in the real network or what was the common way that hacker can catch packets in this topology in real world i would like to know. Thank you

  • @TheEasternCoder
    @TheEasternCoder Před 3 lety

    Thanks for uploading this video. I also saw this video in your ( wireshark packet analysis) Udemy course.

  • @sembutininverse
    @sembutininverse Před 3 lety +1

    thanks for the video, great content with awesome explanation ❤️

  • @mohsinattiq8810
    @mohsinattiq8810 Před 3 lety

    If you find security holes in a certain product , how do you contact that company to fix the issue ? what’s the ethical way to raise a concern?

  • @ikennaakupuome9595
    @ikennaakupuome9595 Před 3 lety

    Apologies! This is outside the scope of this video.
    I want to know the easiest way to relay dhcp on PC1 and PC2 on this ladder network using R1 as the server.
    R1, R2 and R3 are connected as illustrated below.
    R1
    !
    R2
    !
    R3
    !
    Switch
    / \
    PC1 PC2
    The PCs are in separate vlans.
    A written explanation will suffix. Thanks

  • @aditiagarwal8770
    @aditiagarwal8770 Před 3 lety

    Wow, You explained it really well. Thanks!

    • @davidbombal
      @davidbombal  Před 3 lety +1

      Thank you. Glad you enjoyed it Aditi!

    • @aditiagarwal8770
      @aditiagarwal8770 Před 3 lety

      @@davidbombal Yeah, I actually wait for your videos and questions, they are knowledge booster.

  • @TheEasternCoder
    @TheEasternCoder Před 3 lety

    It is same as http unencrypted traffic , clear shown in plain text.

  • @TheInternetdirect
    @TheInternetdirect Před 3 lety

    thank you very much for your work, I finally understood many many things. I learned a lot about important things that I didn't know even exist. :)

  • @ahmedareem9599
    @ahmedareem9599 Před 3 lety

    Many thanks sir !

  • @johnbosire5675
    @johnbosire5675 Před 3 měsíci

    hello how can i change gpon serial number

  • @realhomy
    @realhomy Před 3 lety +1

    Nice video

  • @hamdansajid
    @hamdansajid Před 3 lety

    i remember only the starWars movie, as telnet was in win XP, nowadays its not in latest Windows version

  • @KiranKumar-dw4vq
    @KiranKumar-dw4vq Před 3 lety

    Awesome👏we have to be very careful in every step. Hmm

  • @aknayak644
    @aknayak644 Před 3 lety +1

    Sir plzzzz clear my doubt....🙏🙏🙏
    Sir what is the difference between a web server running a website which we can acess on internet and a apache server runned through kali linux ....plzzzzz explain me sir...i can't underatqnd yhe difference...

    • @davidbombal
      @davidbombal  Před 3 lety +1

      At the most basic level, they are the same. The website on the Internet is just reachable from Internet devices (but also a bunch of other stuff like scaling ability).

    • @aknayak644
      @aknayak644 Před 3 lety +1

      @@davidbombal yes sir thanls for your reply.....it means that if we host a simple html web page of the apache web ser through kalli linux.....can it be accessed through other devices through internet....if yes then sir how????plzzzz clarify my doubt...

    • @davidbombal
      @davidbombal  Před 3 lety +1

      @@aknayak644 You will need to configure the device to be accessible from the Internet - normally you need to enable port forwarding on your Internet router.

    • @aknayak644
      @aknayak644 Před 3 lety +2

      @@davidbombal yes sir thanks a lot......actually sir i want to leqrn a lot pf things from u but not able to communicate u........tyrough youtube comments is the only way is to qsk my doubts to u......can u plzzz tell me how can i communicate u????...love u sir❤❤

  • @DivergentDroid
    @DivergentDroid Před 3 lety

    I use Telnet to log into a locally hosted game server through the Ubuntu Terminal. I also use the Ubuntu Terminal for the telnet connection or I use a Client made to connect to the game server via Telnet. I also then run a Discord Bot through the Ubuntu Terminal that creates a bridge between the game server and a Discord Direct Message connection. In this manner, anyone in my Discord Server can access the social game server and play acting as a Client for the game server. The Discord Bot creates accounts for my Discord Members automatically on first logging onto the game server. As far as I know the Only one directly connected through Telnet is me and it's my machine to my own machine where the game server is hosted. Does this sound like I need to use SSH to connect to my game server? I don't know if any info is discoverable between the Discord Server and the Bot and then to my game server.

  • @hajerkadi8679
    @hajerkadi8679 Před 3 lety

    What is telnet is it the tunisian satellite ??

  • @rahulr4990
    @rahulr4990 Před 3 lety

    Thank you sir. You are great. 🥰

  • @ashishshivhare2574
    @ashishshivhare2574 Před 3 lety

    very informative video 🙏

  • @mariusavram7823
    @mariusavram7823 Před 3 lety

    Thank you!

  • @vipulchavan3557
    @vipulchavan3557 Před 3 lety

    Heyy.... Remember me.... Love from india

  • @TTeshager
    @TTeshager Před 3 lety

    Thank you!!!

  • @mr.jarvas7832
    @mr.jarvas7832 Před 3 lety

    Sir whichis the best oprating system
    Kali linux
    Black arch linux
    I am confused🤔🤔🤔🤔

    • @eyosiyas_js
      @eyosiyas_js Před 3 lety +1

      Kali Linux is the best Linux operating system

    • @davidbombal
      @davidbombal  Před 3 lety +1

      Use either. Most people start with Kali.

    • @mr.jarvas7832
      @mr.jarvas7832 Před 3 lety

      @@davidbombal thank u sir

  • @SaiSaga.r
    @SaiSaga.r Před 3 lety

    Sir I have one question when we install open source tools in kali is it harmful to our pc how do we protect from this❤️

    • @davidbombal
      @davidbombal  Před 3 lety

      It depends on what you install.

    • @SaiSaga.r
      @SaiSaga.r Před 3 lety

      @@davidbombal thank for ur reply teacher ❤️

  • @nitroflamegtsyt3964
    @nitroflamegtsyt3964 Před 3 lety

    What if the IOS does not allow you to use SSH based on regional location?

    • @davidbombal
      @davidbombal  Před 3 lety +1

      Which version of IOS is not allowing you to use SSH? If you must use Telnet, then try to encrypt via a tunnel.

    • @nitroflamegtsyt3964
      @nitroflamegtsyt3964 Před 3 lety

      @@davidbombal Thanks for the information. I will have to get back to you on the IOS version. Another question: Do you have a course on GNS3 on the Udemy platform?

    • @davidbombal
      @davidbombal  Před 3 lety

      @@nitroflamegtsyt3964 For some of the demonstrations. For the labs all you need is Packet Tracer

  • @rahulsen311
    @rahulsen311 Před 3 lety

    Big fan sir

  • @ciprianpeica85
    @ciprianpeica85 Před 3 lety

    I moved on to SSH 5 years ago :p

  • @maxoriginal3490
    @maxoriginal3490 Před 3 lety

    спасибо, интересно

  • @MrPenguin098
    @MrPenguin098 Před 3 lety

    1st to learn 😀

    • @davidbombal
      @davidbombal  Před 3 lety +1

      Thank you for your support Armando! Learning is the best :)

  • @Penguin-org
    @Penguin-org Před 3 lety

    Hello sir

  • @dechaneltchana2346
    @dechaneltchana2346 Před 3 lety

    never ever...

  • @sarmadtawsalkar3023
    @sarmadtawsalkar3023 Před 3 lety

    ❤️❤️

  • @zerotheory941
    @zerotheory941 Před 3 lety

    b...b.. but starwars?

  • @TydinisGR
    @TydinisGR Před 3 lety

    Hiii

  • @angryapple1882
    @angryapple1882 Před 3 lety

    Who uses Telnet nowadays lol

    • @davidbombal
      @davidbombal  Před 3 lety +2

      lol... you would be surprised ....

    • @jaimerosariojusticia
      @jaimerosariojusticia Před 3 lety +1

      You may still find in production some devices that only work with telnet and/or serial console, even after reaching the EOS/EOL. Some companies that sold these devices or software went out-of-business. Meanwhile, other vendors wouldn’t work on a migration process due to the lack of demand from that legacy product.
      Also, other vendors simply turned down migration solution due to copyright, licensing, patents, higher costs and the lack of support, documentation and information of a customized system available (which later turned into a “brick”) at the time. Many of those systems are still in production labeled as LEGACY.

    • @davidbombal
      @davidbombal  Před 3 lety +2

      @@jaimerosariojusticia I understand that. What can one do in those cases? Use Telnet across encrypted tunnels if you can. Or on specific secure networks, or out of band networks etc. What do you do?

    • @jaimerosariojusticia
      @jaimerosariojusticia Před 3 lety +1

      @@davidbombal First, thanks for the content and the reply. Yes, there is always high risk vulnerabilities with unencrypted protocol services across networks. Some workarounds I’ve seen in production is to place a firewall between the legacy device and the network using ACLs with NAT. Other workaround I’ve seen is to use a server between the legacy device and the network. SSH is used to access the server, and from within the server, telnet is used to access the legacy device. Legacy device is then connected directly to a secondary interface on the server. There are also other interesting workarounds and solutions that are more elaborated and sophisticated which can offer a better management/performance experience. Other legacy solutions require specific hardware which are no longer available.
      Not everything can be migrated P2V.
      Again, thanks for the videos. Have a great day.

    • @davidbombal
      @davidbombal  Před 3 lety +1

      @@jaimerosariojusticia Great examples. Thanks for sharing :)