Mark..

Telnet/ftp (without sum form of tunneling) is "bad" because it passes data in clear 
text, run a sniffer on ur box (which u have root to) and initiate a telnet session to 
/ from it. U will be able to collect username/password pairs from the sniffed traffic. 
now try the same with an ssh session...



Haroon Meer
+27 83 786 6637
[EMAIL PROTECTED]
 
It took the computing power of three C-64s to fly to the Moon.
It takes a 486 to run Windows 95. Something's not right here...


>>> "Johnston, Mark" <[EMAIL PROTECTED]> 08/15/00 11:03AM >>>
Hi,
I would like to prove to someone that telnet is way bad, in comparison to
ssh when it comes to security.
So what would I need to do to check for telnet/ftp passwords on an internal
server ?

NB : I have root access to the box I'm going to try this on, so NO I'm not
trying to hack someone else's PC.

Thanks
Mark

>>> <<<

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to