Re: Using tcpdump to sniff telnet password

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



Hi,

you should set the snaplen (length of packets to be captured) to 0 (max
packetsize) like :
tcpdump tcp port 23 -s 0 -w test.txt
Otherwise you won't get the full packets.

And you can use wireshark to read the dumpfile and easily find the
password(s).

	Michel

On Wed, 2008-02-06 at 15:57 +0700, Fajar Priyanto wrote:
> Hi all,
> As long as I can remember reading various articles/docs, they all say that 
> telnet is not secure because all traffic is in clear text. Well, out of 
> boredom, I try to sniff username and password from a telnet session.
> 
> The command I use: tcpdump tcp port 23 -vvv -w test.txt
> Then I read the result: strings test.txt 
> |`D 
> |fD 
> |fD 
> 38400,38400
> Red Hat Enterprise Linux ESD 
> Ologin: D 
> 5eE 
> LsE 
> _tE 
> Password: F 
> [aG 
> |hG 
> jaH 
> Last login: Wed Feb  6 15:53:3H 
> ]0;test4@server:~
> GV{
> 
> But it succeeds with FTP.
> strings test.txt 
> <.9@
> 4.:@
> 220 (vsFTPd 2.0.1)
> 4.;@
> @.<@
> USER test4
> 331 Please specify the passwor
> 4.=@
> B.>@
> PASS secret
> 230 Login successful.
> 4.?@
> :.@@
> SYST
> 215 UNIX Type: L8
> 4.A@
> 
> 
> Did I miss something? How do we capture telnet password using tcpdump?
> Thank you.
> _______________________________________________
> CentOS mailing list
> CentOS@xxxxxxxxxx
> http://lists.centos.org/mailman/listinfo/centos

_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux