Tsa4 Arciga Rigor
Tsa4 Arciga Rigor
Background / Scenario
In this lab, you will configure a router to accept SSH connectivity and use Wireshark to capture and view
Telnet and SSH sessions. This will demonstrate the importance of encryption with SSH.
Required Resources
● CyberOps Workstation VM
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 10 www.netacad.com
Lab - Examining Telnet and SSH in Wireshark
d. Open another terminal window. Start a Telnet session to the localhost. Enter username analyst and
password cyberops when prompted. Note that it may take several minutes for the “connected to
localhost” and login prompt to appear.
[analyst@secOps ~]$ telnet localhost
Trying ::1...
Connected to localhost.
Escape character is '^]'.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 10 www.netacad.com
Lab - Examining Telnet and SSH in Wireshark
e. Stop the Wireshark capture after you have provided the user credentials.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 3 of 10 www.netacad.com
Lab - Examining Telnet and SSH in Wireshark
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 4 of 10 www.netacad.com
Lab - Examining Telnet and SSH in Wireshark
c. The Follow TCP Stream window displays the data for your Telnet session with the CyberOps Workstation
VM. The entire session is displayed in plaintext, including your password. Notice that the username that
you entered is displayed with duplicate characters. This is caused by the echo setting in Telnet to allow
you to view the characters that you type on the screen.
d. After you have finished reviewing your Telnet session in the Follow TCP Stream window, click Close.
e. Type exit at the terminal to exit the Telnet session.
[analyst@secOps ~]$ exit
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 5 of 10 www.netacad.com
Lab - Examining Telnet and SSH in Wireshark
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 6 of 10 www.netacad.com
Lab - Examining Telnet and SSH in Wireshark
d. Apply an SSH filter on the Wireshark capture data. Enter ssh in the filter field and click Apply.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 7 of 10 www.netacad.com
Lab - Examining Telnet and SSH in Wireshark
e. Right-click one of the SSHv2 lines in the Packet list section of Wireshark, and in the drop-down list,
select the Follow TCP Stream option.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 8 of 10 www.netacad.com
Lab - Examining Telnet and SSH in Wireshark
f. Examine the Follow TCP Stream window of your SSH session. The data has been encrypted and is
unreadable. Compare the data in your SSH session to the data of your Telnet session.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 9 of 10 www.netacad.com
Lab - Examining Telnet and SSH in Wireshark
h. Close Wireshark.
Reflection
Why is SSH preferred over Telnet for remote connections?
SSH is preferred over Telnet for a number of reasons which include its better security, flexibility and portability.
With the development of SSH, it has provided a more secure way of transmitting data across networks
through advanced encryption systems that prevent tampering. On the topic of tampering prevention, SSH also
provides authentication mechanisms that make it difficult for unauthorized persons to access the system.
Additionally, SSH is available on most platforms, and can be used for file transfers and tunneling, not just
remote terminal connections.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 10 of 10 www.netacad.com