Use telnet to interact with IoT device shells for pentesting operations including device enumeration, vulnerability discovery, credential testing, and post-exploitation. Use when the user needs to interact with network-accessible shells, IoT devices, or telnet services.
2.1
Rating
0
Installs
Security
Category
No summary available.
Loading SKILL.md…