23 - Pentesting Telnet
Instantly available setup for vulnerability assessment & penetration testing. Run a full pentest from anywhere with 20+ tools & features that go from recon to reporting. We don't replace pentesters - we develop custom tools, detection & exploitation modules to give them back some time to dig deeper, pop shells, and have fun.
Basic Information
Telnet is a network protocol that gives users a UNsecure way to access a computer over a network.
Default port: 23
Enumeration
Banner Grabbing
All the interesting enumeration can be performed by nmap:
The script telnet-ntlm-info.nse
will obtain NTLM info (Windows versions).
From the telnet RFC: In the TELNET Protocol are various "options" that will be sanctioned and may be used with the "DO, DON'T, WILL, WON'T" structure to allow a user and server to agree to use a more elaborate (or perhaps just different) set of conventions for their TELNET connection. Such options could include changing the character set, the echo mode, etc.
I know it is possible to enumerate this options but I don't know how, so let me know if know how.
Config file
HackTricks Automatic Commands
Instantly available setup for vulnerability assessment & penetration testing. Run a full pentest from anywhere with 20+ tools & features that go from recon to reporting. We don't replace pentesters - we develop custom tools, detection & exploitation modules to give them back some time to dig deeper, pop shells, and have fun.
Last updated