A security analyst noticed a colleague typing the following command:
‘Telnet some-host 443’
Which of the following was the colleague performing?

A.
A hacking attempt to the some-host web server with the purpose of achieving a distributed
denial of service attack.
B.
A quick test to see if there is a service running on some-host TCP/443, which is being routed
correctly and not blocked by a firewall.
C.
Trying to establish an insecure remote management session. The colleague should be using
SSH or terminal services instead.
D.
A mistaken port being entered because telnet servers typically do not listen on port 443.
Explanation:
telnet uses port 23. Shouldn’t it be D?
0
0
Consider the Linux syntax:
telnet [-468ELadr] [-S tos] [-b address] [-e escapechar] [-l user]
[-n tracefile] [host [port]]
We know telnet does not listen on :443, by default, but, if something is listening on that port, like https, it will connect and return whatever the listening service spits out. In the case of https, probably nothing useful, if anything at all, but the point is to see if it connects. If nothing is listening, it will time out.
0
0
Telnet uses port 23 by default. You don’t need to specify it in a command. Considering Telnet is a tool and not a method for hacking, B makes the most sense.
0
0