I really appreciate the effort you put into your content. The audio and video quality is also absolutely superb.
@davidbombal4 жыл бұрын
Thank you Nick
@educastellini4 жыл бұрын
-Great content ... !!! -For security reasons the network engineer always has to mitigate the chances of invasion of the devices on the network and to protect it in the best way and with the best practices. -Telnet is unprotected and a very bad option that unfortunately sometimes due to the lack of knowledge that the teacher taught in the video, people leave the protocol active. -Always important to pay attention if in the "line vty" configuration leave only "transport input ssh", never the line "transport input all" or "transport input telnet" configured. -In cases it would be good to create an access list to block the telnet. -In Juniper firewalls these protocols must be enabled and are blocked by default.
@ethioappreview12074 жыл бұрын
Yes bro u are my role modeland best person while u are teaching what u are talking is clear and best of the best
@davidbombal4 жыл бұрын
Thank you very much!
@Learner5554 жыл бұрын
Thanks David for uploading the video in Wireshark series!!
@davidbombal4 жыл бұрын
You're welcome Kazim!
@rayancrasta74604 жыл бұрын
Thanks a lot for this vid, will buy your Wireshark soon after the Linux gsn3 course
@davidbombal4 жыл бұрын
Thank you Rayan
@ronnyrafoo2 жыл бұрын
Telnet, a modest icon of the unresolvable. Lets see what the future of chain-linking has to offer.
@davidbombal4 жыл бұрын
Get the full Wireshark course for $9: bit.ly/wireshark9 Need help? Join my Discord: discord.com/invite/usKSyzb Download pcapng file here: bit.ly/2GSsNGg ====================== Special Offers: ====================== Cisco Press: Up to 50% discount Save every day on Cisco Press learning products! Use discount code BOMBAL during checkout to save 35% on print books (plus free shipping in the U.S.), 45% on eBooks, and 50% on video courses and simulator software. Offer expires December 31, 2020. Shop now. Link: bit.ly/ciscopress50 ITPro.TV: itpro.tv/davidbombal 30% discount off all plans Code: DAVIDBOMBAL Boson software: 15% discount Link: bit.ly/boson15 Code: DBAF15P GNS3 Academy: CCNA ($10): bit.ly/gns3ccna10 Wireshark ($10): bit.ly/gns3wireshark DavidBombal.com DavidBombal.com: CCNA ($10): bit.ly/yt999ccna Wireshark ($9): bit.ly/wireshark9
@jamesdietsch78684 жыл бұрын
Thanks for the upload David! Well explained! Great content as always :)
@davidbombal4 жыл бұрын
Thank you James!
@lstyle32104 жыл бұрын
Yep, I definitely have your Wireshark course from Udemy. Will you be creating Cisco firewall course in the future ?
@davidbombal4 жыл бұрын
Depends on time and demand. I am way behind with things :(
@solemba5954 жыл бұрын
@Bombal you are among of the Best instructor in the world, 99% of students can understand your explanations. Thank you so much for share...
@rajatraturi19964 жыл бұрын
@@davidbombal please create cisco firewall course as well.
@TheEasternCoder4 жыл бұрын
Thanks for uploading this video. I also saw this video in your ( wireshark packet analysis) Udemy course.
@davidbombal4 жыл бұрын
Thank you for your support :)
@TheInternetdirect4 жыл бұрын
thank you very much for your work, I finally understood many many things. I learned a lot about important things that I didn't know even exist. :)
@davidbombal4 жыл бұрын
You are welcome!
@anuradhalakruwan19184 жыл бұрын
Good lesson David sar..... 👍👍👍👍👍🌹🌹🌹🌹🌹🌹
@davidbombal4 жыл бұрын
I appreciate that, Anuradha!
@sarthakmathur76964 жыл бұрын
This is so cool!! Thanks for the video
@davidbombal4 жыл бұрын
Glad you liked it Sarthak!
@ikennaakupuome95954 жыл бұрын
Apologies! This is outside the scope of this video. I want to know the easiest way to relay dhcp on PC1 and PC2 on this ladder network using R1 as the server. R1, R2 and R3 are connected as illustrated below. R1 ! R2 ! R3 ! Switch / \ PC1 PC2 The PCs are in separate vlans. A written explanation will suffix. Thanks
@sembutininverse4 жыл бұрын
thanks for the video, great content with awesome explanation ❤️
@davidbombal4 жыл бұрын
Thank you for watching!
@aditiagarwal87704 жыл бұрын
Wow, You explained it really well. Thanks!
@davidbombal4 жыл бұрын
Thank you. Glad you enjoyed it Aditi!
@aditiagarwal87704 жыл бұрын
@@davidbombal Yeah, I actually wait for your videos and questions, they are knowledge booster.
@user-jk6ie6cd3h4 жыл бұрын
Great video David.please can you tell where you get ubuntu client cli based gns3 applianse from?.thanks
@hamdansajid4 жыл бұрын
i remember only the starWars movie, as telnet was in win XP, nowadays its not in latest Windows version
@davidbombal4 жыл бұрын
lol... great comment
@KiranKumar-dw4vq4 жыл бұрын
Awesome👏we have to be very careful in every step. Hmm
@davidbombal4 жыл бұрын
Yes we do.
@TheEasternCoder4 жыл бұрын
It is same as http unencrypted traffic , clear shown in plain text.
@ThePharaon83 жыл бұрын
Hello I'm a subscriber to your KZbin channel and I find your tutorials great. I have knowledge in pentest, and I learn every day. I would like to ask you what are the different procedures for entering a local business network for example and accessing your local oracle server from the internet? I read one of your tutorials from 2016 on port forwarding, but over time other more effective techniques have surely emerged. In summary, how to hack a LAN network from the Internet, that is to say WAN? i use kali. How to bypass DMZ protections? What are the best tools or scripts to use? Thanks again and see you very soon.
@mirzadzafic89994 жыл бұрын
Hi David, great video. I have question. In the GNS3 it is simple to catch telnet packets on link. You also say in real world we need to span port, or inject some device in te network to catch packets. Is there any more way that hacker can catch traffic in the real network or what was the common way that hacker can catch packets in this topology in real world i would like to know. Thank you
@ahmedareem95994 жыл бұрын
Many thanks sir !
@davidbombal4 жыл бұрын
Thank you Ahmed
@ashishshivhare25744 жыл бұрын
very informative video 🙏
@davidbombal4 жыл бұрын
Thank you Ashish!
@realhomy4 жыл бұрын
Nice video
@davidbombal4 жыл бұрын
Thank you!
@rahulr49904 жыл бұрын
Thank you sir. You are great. 🥰
@davidbombal4 жыл бұрын
Most welcome Rahul
@mohsinattiq88104 жыл бұрын
If you find security holes in a certain product , how do you contact that company to fix the issue ? what’s the ethical way to raise a concern?
@vipulchavan35574 жыл бұрын
Heyy.... Remember me.... Love from india
@mariusavram78234 жыл бұрын
Thank you!
@davidbombal4 жыл бұрын
You're welcome Marius!
@MSPHOTOGRAPHY-ep8by3 жыл бұрын
Hello sir I how to agian access to pcs which using telnet port 23 on the same network
@johnbosire56756 ай бұрын
hello how can i change gpon serial number
@TTeshager4 жыл бұрын
Thank you!!!
@davidbombal4 жыл бұрын
You're welcome Teshager!
@rahulsen3114 жыл бұрын
Big fan sir
@davidbombal4 жыл бұрын
Thank you Rahul
@aknayak6444 жыл бұрын
Sir plzzzz clear my doubt....🙏🙏🙏 Sir what is the difference between a web server running a website which we can acess on internet and a apache server runned through kali linux ....plzzzzz explain me sir...i can't underatqnd yhe difference...
@davidbombal4 жыл бұрын
At the most basic level, they are the same. The website on the Internet is just reachable from Internet devices (but also a bunch of other stuff like scaling ability).
@aknayak6444 жыл бұрын
@@davidbombal yes sir thanls for your reply.....it means that if we host a simple html web page of the apache web ser through kalli linux.....can it be accessed through other devices through internet....if yes then sir how????plzzzz clarify my doubt...
@davidbombal4 жыл бұрын
@@aknayak644 You will need to configure the device to be accessible from the Internet - normally you need to enable port forwarding on your Internet router.
@aknayak6444 жыл бұрын
@@davidbombal yes sir thanks a lot......actually sir i want to leqrn a lot pf things from u but not able to communicate u........tyrough youtube comments is the only way is to qsk my doubts to u......can u plzzz tell me how can i communicate u????...love u sir❤❤
@DivergentDroid4 жыл бұрын
I use Telnet to log into a locally hosted game server through the Ubuntu Terminal. I also use the Ubuntu Terminal for the telnet connection or I use a Client made to connect to the game server via Telnet. I also then run a Discord Bot through the Ubuntu Terminal that creates a bridge between the game server and a Discord Direct Message connection. In this manner, anyone in my Discord Server can access the social game server and play acting as a Client for the game server. The Discord Bot creates accounts for my Discord Members automatically on first logging onto the game server. As far as I know the Only one directly connected through Telnet is me and it's my machine to my own machine where the game server is hosted. Does this sound like I need to use SSH to connect to my game server? I don't know if any info is discoverable between the Discord Server and the Bot and then to my game server.
@mr.jarvas78324 жыл бұрын
Sir whichis the best oprating system Kali linux Black arch linux I am confused🤔🤔🤔🤔
@eyosiyas_js4 жыл бұрын
Kali Linux is the best Linux operating system
@davidbombal4 жыл бұрын
Use either. Most people start with Kali.
@mr.jarvas78324 жыл бұрын
@@davidbombal thank u sir
@nitroflamegtsyt39644 жыл бұрын
What if the IOS does not allow you to use SSH based on regional location?
@davidbombal4 жыл бұрын
Which version of IOS is not allowing you to use SSH? If you must use Telnet, then try to encrypt via a tunnel.
@nitroflamegtsyt39644 жыл бұрын
@@davidbombal Thanks for the information. I will have to get back to you on the IOS version. Another question: Do you have a course on GNS3 on the Udemy platform?
@davidbombal4 жыл бұрын
@@nitroflamegtsyt3964 For some of the demonstrations. For the labs all you need is Packet Tracer
@hajerkadi86793 жыл бұрын
What is telnet is it the tunisian satellite ??
@ciprianpeica854 жыл бұрын
I moved on to SSH 5 years ago :p
@davidbombal4 жыл бұрын
Unfortunately not everyone has :(
@maxoriginal34904 жыл бұрын
спасибо, интересно
@SaiSaga.r4 жыл бұрын
Sir I have one question when we install open source tools in kali is it harmful to our pc how do we protect from this❤️
@davidbombal4 жыл бұрын
It depends on what you install.
@SaiSaga.r4 жыл бұрын
@@davidbombal thank for ur reply teacher ❤️
@MrPenguin0984 жыл бұрын
1st to learn 😀
@davidbombal4 жыл бұрын
Thank you for your support Armando! Learning is the best :)
@dechaneltchana23464 жыл бұрын
never ever...
@davidbombal4 жыл бұрын
Ever!
@Penguin-org4 жыл бұрын
Hello sir
@davidbombal4 жыл бұрын
Hello
@zerotheory9414 жыл бұрын
b...b.. but starwars?
@TydinisGR4 жыл бұрын
Hiii
@davidbombal4 жыл бұрын
Hi!
@sarmadtawsalkar30234 жыл бұрын
❤️❤️
@angryapple18824 жыл бұрын
Who uses Telnet nowadays lol
@davidbombal4 жыл бұрын
lol... you would be surprised ....
@jaimerosariojusticia4 жыл бұрын
You may still find in production some devices that only work with telnet and/or serial console, even after reaching the EOS/EOL. Some companies that sold these devices or software went out-of-business. Meanwhile, other vendors wouldn’t work on a migration process due to the lack of demand from that legacy product. Also, other vendors simply turned down migration solution due to copyright, licensing, patents, higher costs and the lack of support, documentation and information of a customized system available (which later turned into a “brick”) at the time. Many of those systems are still in production labeled as LEGACY.
@davidbombal4 жыл бұрын
@@jaimerosariojusticia I understand that. What can one do in those cases? Use Telnet across encrypted tunnels if you can. Or on specific secure networks, or out of band networks etc. What do you do?
@jaimerosariojusticia4 жыл бұрын
@@davidbombal First, thanks for the content and the reply. Yes, there is always high risk vulnerabilities with unencrypted protocol services across networks. Some workarounds I’ve seen in production is to place a firewall between the legacy device and the network using ACLs with NAT. Other workaround I’ve seen is to use a server between the legacy device and the network. SSH is used to access the server, and from within the server, telnet is used to access the legacy device. Legacy device is then connected directly to a secondary interface on the server. There are also other interesting workarounds and solutions that are more elaborated and sophisticated which can offer a better management/performance experience. Other legacy solutions require specific hardware which are no longer available. Not everything can be migrated P2V. Again, thanks for the videos. Have a great day.
@davidbombal4 жыл бұрын
@@jaimerosariojusticia Great examples. Thanks for sharing :)