TELNET protocol

GPTKB entity

Statements (50)
Predicate Object
gptkbp:instanceOf gptkb:network_protocol
gptkbp:access username and password
gptkbp:accessibleBy telnet client
command line interface
GUI clients
gptkbp:alternativeTo SSH
rlogin
serial console
gptkbp:canBe mainframes
routers
switches
network devices
terminal emulators
gptkbp:canBeDisabled legacy equipment
gptkbp:canBeDisabledOn modern equipment
gptkbp:category gptkb:network_protocol
gptkbp:commanded NVT (Network Virtual Terminal)
gptkbp:compatibleWith many modern systems by default
gptkbp:defaultPort 23
gptkbp:definedIn gptkb:RFC_854
gptkbp:deprecatedIn modern security standards
gptkbp:designedFor remote communication
gptkbp:encryption none
gptkbp:features unencrypted
https://www.w3.org/2000/01/rdf-schema#label TELNET protocol
gptkbp:introducedIn 1969
gptkbp:notRecommendedFor secure communications
gptkbp:operates client-server model
gptkbp:OSIModelLayer application layer
gptkbp:protocolFamily gptkb:TCP/IP
gptkbp:relatedTo gptkb:SSH_protocol
serial communication
rlogin protocol
gptkbp:replacedBy SSH
gptkbp:standardizedBy gptkb:IETF
gptkbp:status obsolete for secure use
gptkbp:supports text-based communication
gptkbp:transportation gptkb:TCP
gptkbp:usedBy IT professionals
system administrators
network engineers
gptkbp:usedFor remote terminal access
gptkbp:usedIn legacy systems
gptkbp:usedOn gptkb:LANs
gptkb:Internet
gptkbp:vulnerableTo eavesdropping
man-in-the-middle attacks
credential theft
gptkbp:bfsParent gptkb:Ken_Harrenstien
gptkbp:bfsLayer 7