/
10.2.2.1.9. Telnet Attack / Manipulation Attack

SecHard

10.2.2.1.9. Telnet Attack / Manipulation Attack

Many protocols are used to transport sensitive network management data. Secure protocols should be used whenever possible. A secure protocol option includes using SSH instead of Telnet so that both authentication data and management information are encrypted. If Telnet is used, all traffic flows in plaintext and can be subject to Telnet Communication Sniffing, Telnet Brute Force Attack and Telnet DoS - Denial of Service attacks.

line vty 0 15

transport input ssh

Related content

SecHard