/
10.2.2.1.9. Telnet Attack / Manipulation Attack

SecHard

10.2.2.1.9. Telnet Attack / Manipulation Attack

Many protocols are used to transport sensitive network management data. Secure protocols should be used whenever possible. A secure protocol option includes using SSH instead of Telnet so that both authentication data and management information are encrypted. If Telnet is used, all traffic flows in plaintext and can be subject to Telnet Communication Sniffing, Telnet Brute Force Attack and Telnet DoS - Denial of Service attacks.

line vty 0 15

transport input ssh

Related content

10.2.2.1.9. Telnet Attack / Manipulation Attack
10.2.2.1.9. Telnet Attack / Manipulation Attack
More like this
Telnet Attack
Telnet Attack
More like this
10.2.2.1. Network Attacks
10.2.2.1. Network Attacks
More like this
23.1.4. Security Summary Report
23.1.4. Security Summary Report
More like this
10.2.2.1.1. Physical Security / Physical Attack
10.2.2.1.1. Physical Security / Physical Attack
More like this

SecHard