Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Protocols and Servers

Premium room

Learn about common protocols such as HTTP, FTP, POP3, SMTP and IMAP, along with related insecurities.

easy

100 min

95,608

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

This room introduces several protocols commonly used across networks:

These protocols form the foundation of how you browse the web, transfer files, and send and receive email. Understanding how they work at a low level is essential for anyone pursuing a career in cybersecurity, whether in penetration testing, network defence, or security engineering.

Each protocol task is designed to show what happens beneath the surface, which is usually hidden by a (Graphical User Interface). You will "talk" using the above protocols with a simple Telnet client to understand what your client is doing under the hood. The purpose is not to memorise the protocol commands but rather to observe the protocol while it is working.

Why Learn These Protocols Today?

You might wonder why you are studying protocols that are decades old. There are several important reasons.

First, these protocols are still in use. While most public-facing services now use encrypted versions (HTTPS, SFTP, IMAPS), the underlying protocol mechanics remain the same. The commands you send over HTTPS are the same commands, wrapped in encryption.

Second, you will encounter cleartext protocols during penetration tests and security assessments. Legacy systems, internal networks, devices, and misconfigured services often still use unencrypted protocols. Recognising and exploiting these weaknesses is a core penetration testing skill.

Third, understanding the protocol helps you understand the attacks. When you know how works, you understand why email spoofing is possible. When you understand , web application vulnerabilities make more sense. This foundational knowledge makes you a better security professional.

This room also discusses some of the insecurities inherent in these protocols. In particular, the focus is on passwords sent in cleartext. When credentials are transmitted without encryption, anyone with access to the network traffic can capture them. This was acceptable when these protocols were designed for trusted academic networks, but it is a serious vulnerability on modern networks.

In the follow-up room, Protocols and Servers 2, you will explore how these protocols can be secured using encryption, and examine attacks such as sniffing, man-in-the-middle, and password attacks in more detail.

Prerequisites

This room assumes a working understanding of /IP, ports, and the client-server model. You should also be comfortable with the terminal. If you need a refresher on any of these topics, complete the following first:

Answer the questions below
We suggest that you start the AttackBox and the virtual machine as you proceed to tackle the following tasks. You can connect to the different services over Telnet for better practice and learning experience.