Telnet

Prompt

Telnet is an older protocol that allowed an interactive text-oriented communication with remote systems, use the provided capture to answer the following questions about telnet.

Telnet.pcap9.4KB

Walk-Through

Use Wireshark or, if provided, the web-based CloudShark tool to solve the challenge. The Telnet protocol is an old, insecure protocol used to remotely login to and administer computers. Additional information about Telnet is included at the beginning of the tutorial video for this challenge.

Guide

Questions 1- 6 can be solved by following the TCP stream on any of the packets. Following the TCP stream yields the following:

Select “TCP Stream” at the bottom of CloudShark to filter the communications over Telnet.
The answers have been redacted.
Select “TCP Stream” at the bottom of CloudShark to filter the communications over Telnet. The answers have been redacted.
💻

Keep in mind that telnet will echo (repeat) back what is typed (except for passwords). Therefore, for the login name, you’ll only want to use the characters in blue text in your answer. There are periods at the end of the login and the password; these are not part of the credentials.

💡

When you find the command that is run once the user is authenticated (question 3), look up more information about it!

This will help in understanding the hostname (Question 5) and the CPU architecture (Question 6).

Tutorial Video

Cyber Skyline Live - What is Telnet - March 24, 2022

In Cyber Skyline Live - What is Telnet, you'll learn from Franz Payer, CEO of Cyber Skyline, about how to use telnet and analyze telnet traffic. Reach out with questions at contact@cyberskyline.com. Cyber Skyline is the organizer of the National Cyber League, a bi-annual, all-virtual cybersecurity student competition, advancing hands-on skills and knowledge. Check the website at nationalcyberleague.org for details on NCL.

Cyber Skyline Live - What is Telnet - March 24, 2022

Questions

1. What is the username that was used to log in? 2. What is the password that was used to log in?

3. What command was executed once the user was authenticated?

4. In what year was this capture created?

5. What is the hostname of the machine that was logged in to?

6. What CPU architecture does the remote machine use?

©️ 2025 Cyber Skyline. All Rights Reserved. Unauthorized reproduction or distribution of this copyrighted work is illegal.