/
10.2.2.1.9. Telnet Attack / Manipulation Attack
SecHard
10.2.2.1.9. Telnet Attack / Manipulation Attack
Many protocols are used to transport sensitive network management data. Secure protocols should be used whenever possible. A secure protocol option includes using SSH instead of Telnet so that both authentication data and management information are encrypted. If Telnet is used, all traffic flows in plaintext and can be subject to Telnet Communication Sniffing, Telnet Brute Force Attack and Telnet DoS - Denial of Service attacks.
line vty 0 15
transport input ssh
, multiple selections available,
Related content
10.2.2.1.9. Telnet Attack / Manipulation Attack
10.2.2.1.9. Telnet Attack / Manipulation Attack
More like this
Telnet Attack
Telnet Attack
More like this
10.2.2.1. Network Attacks
10.2.2.1. Network Attacks
More like this
23.1.4. Security Summary Report
23.1.4. Security Summary Report
More like this
10.2.2.1.1. Physical Security / Physical Attack
10.2.2.1.1. Physical Security / Physical Attack
More like this
SecHard