Hello guys.
I want to sniff reverse telnet sessions, and see in the logs, if someone tried to break the device.
That's really interesting what I found today. There is a few captures from wireshark.
When we are using port 23 for telnet connection, everything is as we want to, we can see the commands in clear-text format:

When we try to connect to another device via reverse telnet, ( port 2011 in my example) we can see that we are using just TCP protocol, and we can't see any clear-text data:

So Experts,
Is there a way to configure and use these ports as basic telnet session? I need to see some clear-text there
Maybe if I can't sniff these reverse-telnet sessions, there is a method to log somehow, reverse-telnet lines (tty lines) ?