From: Skip Carter (skip@taygeta.com)
Date: Thu Apr 20 2006 - 18:46:38 EDT
Telnet has the concept of the Network Virtual Terminal,
for which it sends control codes in-band. The escape codes
you are seeing are those control codes. Think of it as kinda
like curses for the NVT.
For details see:
http://www.scit.wlv.ac.uk/~jphb/comms/telnet.html
Skip
On Thursday 20 April 2006 09:37, gamgamus@yahoo.com wrote:
> Hello,
>
> I have captured some AS400 telnet traffic with tcpdump on port tcp 23.
>
> It seems to be encoded in some way, because I only can see a few initial
> cleartext words, like: IBMRSEED, KBDTYPE, CODEPAGE, IBM-3477. The following
> stream of words are unreadable with encoding or chiper.
>
> When I see the dump with Ethereal, the decoded data are like:
>
> \000\r\022\240\000\000\004 and goes on...
>
> Does anyone known how to decode this capture to get the cleartext form?
-- Dr. Everett (Skip) Carter Phone: 831-641-0645 FAX: 831-641-0647 Taygeta Network Security Services email: skip@taygeta.net 1340 Munras Ave., Suite 314 WWW: http://www.taygeta.net/ Monterey, CA. 93940 ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request@cenzic.com for details. ------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:51 EDT