0% found this document useful (0 votes)
68 views

TELNET

Telnet is a network protocol that allows users to access a remote computer by creating a virtual terminal connection. It establishes a two-way text-based communication channel between two machines using TCP/IP. Through Telnet, users can log on to a remote computer and access specific applications and data as if they were a local user on that system. Telnet works by emulating a physical terminal connection and allows users to run command lines remotely. However, it is not a secure protocol as connections are unencrypted, allowing other parties to view usernames, passwords, and other sensitive information transmitted in plain text over the connection.

Uploaded by

yohanis eshetu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views

TELNET

Telnet is a network protocol that allows users to access a remote computer by creating a virtual terminal connection. It establishes a two-way text-based communication channel between two machines using TCP/IP. Through Telnet, users can log on to a remote computer and access specific applications and data as if they were a local user on that system. Telnet works by emulating a physical terminal connection and allows users to run command lines remotely. However, it is not a secure protocol as connections are unencrypted, allowing other parties to view usernames, passwords, and other sensitive information transmitted in plain text over the connection.

Uploaded by

yohanis eshetu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

TELNET

Presented By:-Mr. Yohanis Eshetu


M.Tech 1year ECE, DCCN
Punjabi University, Patiala
10/25/22
What is Telnet?

 Telnet is a network protocol used to virtually access a


computer and to provide a two-way, collaborative and
text-based communication channel between two
machines.

10/25/22
1
Cont.

 It follows a user command Transmission Control


Protocol/Internet Protocol (TCP/IP) networking protocol
for creating remote sessions. On the web, Hypertext
Transfer Protocol (HTTP) and File Transfer Protocol
(FTP) simply enable users to request specific files from
remote computers, while, through Telnet, users can log
on as a regular user with the privileges they are granted
to the specific applications and data on that computer.

10/25/22 23
Cont.

 Anabstract example of the syntax for a Telnet command


request is as follows:

telnet the.libraryat.whatis.edu

10/25/22
3
Cont.

 The result of this request would be an invitation to log


on with a user ID, and then the program would prompt
the user for a password. If accepted, the user is granted
access to the remote host.
 Telnet is most likely to be used by program developers
and anyone who has a need to use specific applications
or data located at a remote machine.

10/25/22 4
Cont.

10/25/22
5
How Telnet works

 Telnet is a type of client-server protocol that can be used to open


a command line on a remote computer, typically a server. Users
can utilize this tool to ping a port and find out whether it is open.
Telnet works with what is called a virtual terminal connection
emulator, or an abstract instance of a connection to a computer,
using standard protocols to act like a physical terminal connected
to a machine. FTP may also be used along with Telnet for users
working to send data files.

10/25/22
6
Cont.

10/25/22 7
Cont.

10/25/22
8
Cont.

 Users connect remotely to a machine using Telnet,


sometimes referred to as Telnet ting into the system. They
are prompted to enter their username and password
combination to access the remote computer, which enables
the running of command lines as if logged in to the
computer in person. Despite the physical location of users,
their IP address will match the computer logged in to
rather than the one physically used to connect.

10/25/22
9
Uses of Telnet

 Telnet can be used for a variety of activities on a server,


including editing files, running various programs and
checking email.
 Some servers enable remote connections using Telnet to
access public data to play simple games or look up weather
reports. Many of these features exist for nostalgic fun or
because they still have compatibility with older systems that
need access to specific data.

10/25/22
10
Cont.

 Users are also able to connect to any software that utilizes


text-based, unencrypted protocols via Telnet, from web
servers to ports. Users can open a command prompt on the
remote machine, type the word telnet and the remote
machine's name or IP address, and the telnet connection
will ping the port to see if it is open or not. An open port
will show a blank screen, while an error message that says
the port is connecting means that it is closed.

10/25/22 11
Security

 Telnet is not a secure protocol and is unencrypted. By


monitoring a user's connection, anyone can access a
person's username, password and other private
information that is typed over the Telnet session in
plaintext. With this information, access can be gained to
the user's device.

10/25/22
12
Thank you

10/25/22

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy