Use telnet to interact with IoT device shells for pentesting operations including device enumeration, vulnerability discovery, credential testing, and post-exploitation. Use when the user needs to interact with network-accessible shells, IoT devices, or telnet services.
7.5
Rating
0
Installs
Security
Category
Excellent pentesting skill for IoT telnet interaction. The description clearly communicates when to use the skill (telnet-accessible devices, IoT pentesting). The SKILL.md provides comprehensive task knowledge including a custom Python helper script, detailed BusyBox guidance, enumeration checklists, privilege escalation techniques, and firmware extraction methods. Structure is very clear with logical sections and quick-start examples. The skill shows strong novelty by packaging domain-specific IoT pentesting workflows (BusyBox limitations, common IoT patterns, session logging, pre-built enumeration scripts) that would require significant tokens and expertise for a CLI agent to replicate. Minor improvement possible: could reference the other support files (enum_*.txt, examples.md, OBSERVING_SESSIONS.md) more explicitly in the main workflow, though their existence is acknowledged. Overall, this is a well-executed, domain-specific skill that meaningfully reduces the complexity and token cost of IoT security testing.
Loading SKILL.md…