The Telnet protocol is unsecure, it's better to use SSH instead.
XXX - add a brief Telnet description here
XXX - add a brief description of Telnet history
- TCP: Typically, Telnet uses TCP as its transport protocol. The well known TCP port for PROTO traffic is 23.
XXX - Add example traffic here (as plain text or Wireshark screenshot).
The Telnet dissector is (fully functional, partially functional, not existing, … whatever the current state is). Also add info of additional Wireshark features where appropriate, like special statistics of this protocol.
(XXX add links to preference settings affecting how Telnet is dissected).
XXX - Add a simple example capture file to the SampleCaptures page and link from here. Keep it short, it's also a good idea to gzip it to make it even smaller, as Wireshark can open gzipped files automatically.
A complete list of Telnet display filter fields can be found in the display filter reference
Show only the Telnet based traffic:
You cannot directly filter Telnet protocols while capturing. However, if you know the TCP port used (see above), you can filter on that one.
see the wikipedia's telnet page
Imported from https://wiki.wireshark.org/Telnet on 2020-08-11 23:26:37 UTC