Implementing Common Protocols and Services

CompTIA Security+ (SY601) Domain:

  • Domain 3.0: Implementation

CompTIA Security+ (SY601) Objectives:

  • Objective 3.1: Given a scenario, implement security protocols

Overview

Telnet and SSH are two protocols that can be utilized to remotely administer a server. However, there is a huge difference between them. TELNET sends all information over the wire in clear text and SSH communication between two systems is encrypted. During this lab, you will utilize TELNET, SSH, and FTP to perform functions between two systems on a network. After completing the tasks, you will examine how the traffic looks with Wireshark, an open source Protocol Analyzer.

OUTCOMES:

In this lab, you will learn to:

  1. Use Telnet and SSH on a network and understand why you would use one over the other.
  2. Use FTP and SCP on a network and understand why you would use one over the other.
  3. Use Wireshark to capture and observe network traffic.

Key terms and descriptions

SSH
Secure shell uses port 22 and encrypts traffic, which typically provides a terminal interface.
TELNET
a protocol where the data is transmitted between two machines over in clear text. The use of TELNET, which uses port 23, should be avoided on networks because it is not secure.
PuTTY
a free SSH client for Windows. Although Microsoft Windows does come with a TELNET client, it lacks an SSH client. For this reason, a third party application like PuTTY needs to be utilized in order for a Windows machine to connect to an SSH server.
Wireshark
a free and open source protocol analyzer, which will allow a user to capture network traffic or to analyze a capture file.
WinSCP
WinSCP is a free program for Microsoft Windows, which will allow you to securely transfer files over an encrypted connection. The use of SCP is preferred over using FTP because the file will be transmitted over an encrypted channel.