Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
New Member

Reverse telnet sessions are using not TELNET protocol?

Hello guys.

I want to sniff reverse telnet sessions, and see in the logs, if someone tried to break the device.

That's really interesting what I found today. There is a few captures from wireshark.

When we are using port 23 for telnet connection, everything is as we want to, we can see the commands in clear-text format:

telnet1.jpg

When we try to connect to another device via reverse telnet, ( port 2011 in my example) we can see that we are using just TCP protocol, and we can't see any clear-text data:

telnet2.jpg

So Experts,

Is there a way to configure and use these ports as basic telnet session? I need to see some clear-text there

Maybe if I can't sniff these reverse-telnet sessions, there is a method to log somehow, reverse-telnet lines (tty lines) ?

Everyone's tags (4)
1 REPLY
New Member

Reverse telnet sessions are using not TELNET protocol?

Nothing to add?

1020
Views
0
Helpful
1
Replies
CreatePlease to create content