21.2.12 Lab Examining Telnet and SSH in Wireshark
21.2.12 Lab Examining Telnet and SSH in Wireshark
Objectives
Part 1: Examine a Telnet Session with Wireshark
Part 2: Examine an SSH Session with Wireshark
Background / Scenario
In this lab, you will configure a router to accept SSH connectivity and use Wireshark to capture and view
Telnet and SSH sessions. This will demonstrate the importance of encryption with SSH.
Instructions
2017 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 4 www.netacad.com
21.2.12 Lab - Examining Telnet and SSH in Wireshark
c. The Follow TCP Stream window displays the data for your Telnet session with the Workstation VM. The
entire session is displayed in plaintext, including your password. Notice that the username that you
entered is displayed with duplicate characters. This is caused by the echo setting in Telnet to allow you to
view the characters that you type on the screen.
2017 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 4 www.netacad.com
21.2.12 Lab - Examining Telnet and SSH in Wireshark
d. After you have finished reviewing your Telnet session in the Follow TCP Stream window, click Close.
e. Type exit at the terminal to exit the Telnet session.
[analyst@secOps ~]$ exit
2017 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 4 www.netacad.com
21.2.12 Lab - Examining Telnet and SSH in Wireshark
f. Examine the Follow TCP Stream window of your SSH session. The data has been encrypted and is
unreadable. Compare the data in your SSH session to the data of your Telnet session.
Reflection Question
Why is SSH preferred over Telnet for remote connections?
Type your answers here.
2017 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 4 www.netacad.com