Back to Browse

🎯 Exploiting Telnet Port 23 on Metasploitable 2 using Metasploit Framework

183 views
Jun 2, 2025
8:54

🎯 Exploiting Telnet Port 23 on Metasploitable 2 using Metasploit Framework | Easy Remote Access πŸ”“ In this video, we exploit the Telnet service running on port 23 of Metasploitable 2, a vulnerable Linux machine used for ethical hacking practice. Telnet is an outdated protocol known for transmitting data in plain text, including usernames and passwords. πŸ’» Tools Used: Metasploit Framework (MSF) Kali Linux (Attacker) Metasploitable 2 (Target) πŸ› οΈ Attack Process: Scan the Target – Use nmap to detect port 23 open. Manual Login – Telnet often allows access with weak or default credentials like msfadmin:msfadmin. No Encryption – Everything typed is visible, making it easy to sniff. Metasploit Automation – Use auxiliary/scanner/telnet/telnet_login to brute-force login. Gain Access – Once valid credentials are found, you get shell access. ⚠️ Why This Matters: Telnet is highly insecure and should never be used in modern systems. It’s a great example for demonstrating legacy misconfigurations. πŸŽ“ For Educational Use Only! This video is intended for learning purposes only. Always test ethically on legal and authorized systems. #attacks #coding #career #windows #programming #automobile #python #python #btech #linux #smartphone #code #cybersecurity #cybercriminals #creative #status #students #stumbleguys #education #edit #pubg #indian #instagram #hacker #hairstyle

Download

0 formats

No download links available.

🎯 Exploiting Telnet Port 23 on Metasploitable 2 using Metasploit Framework | NatokHD