O'Reilly logo

SECUR Exam Cram™ 2 (Exam 642-501) by Ken Edelman, Raman Sud

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Vulnerabilities Within Various Management Protocols

Many commonly used management protocols such as Telnet, Simple Network Management Protocol (SNMP), and syslog were not designed as secure protocols. These protocols transmit information in plaintext, which an attacker can capture. Also, some management protocols have no packet-level integrity, which allows an attacker to easily change the data within packets without your being aware that the data was changed.

Telnet

All Telnet data is transmitted in cleartext. If you are configuring a router or some other remote device, any attacker sniffing the wire can capture all your passwords and accounts. Telnet is not a good application to use within a secure computing environment. Instead of using Telnet, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required