Prompt
Telnet is an older protocol that allowed an interactive text-oriented communication with remote systems, use the provided capture to answer the following questions about telnet.
Walk-Through
Use Wireshark or, if provided, the web-based CloudShark tool to solve the challenge. The Telnet protocol is an old, insecure protocol used to remotely login to and administer computers. Additional information about Telnet is included at the beginning of the tutorial video for this challenge.
Guide
Questions 1- 6 can be solved by following the TCP stream on any of the packets. Following the TCP stream yields the following:
Keep in mind that telnet will echo (repeat) back what is typed (except for passwords). Therefore, for the login name, you’ll only want to use the characters in blue text in your answer. There are periods at the end of the login and the password; these are not part of the credentials.
When you find the command that is run once the user is authenticated (question 3), look up more information about it!
This will help in understanding the hostname (Question 5) and the CPU architecture (Question 6).
Tutorial Video
Cyber Skyline Live - What is Telnet - March 24, 2022
In Cyber Skyline Live - What is Telnet, you'll learn from Franz Payer, CEO of Cyber Skyline, about how to use telnet and analyze telnet traffic. Reach out with questions at contact@cyberskyline.com. Cyber Skyline is the organizer of the National Cyber League, a bi-annual, all-virtual cybersecurity student competition, advancing hands-on skills and knowledge. Check the website at nationalcyberleague.org for details on NCL.
www.youtube.com
Questions
1. What is the username that was used to log in? 2. What is the password that was used to log in?
3. What command was executed once the user was authenticated?
4. In what year was this capture created?
5. What is the hostname of the machine that was logged in to?
6. What CPU architecture does the remote machine use?
©️ 2025 Cyber Skyline. All Rights Reserved. Unauthorized reproduction or distribution of this copyrighted work is illegal.