Hacking On Telnet Explained
Hacking On Telnet Explained
Hacking On Telnet Explained
In this Guide you will learn: What is telnet? How to telnet How to get telnet accounts <begin11c.shtml> Why you might not want to telnet <begin11c.shtml> How to install a telnet server on your home Windows computer <begin11c.shtml> How to turn o a telnet server on your home !inu" computer <begin11d.shtml> How to e"plore computers using telnet <begin11d.shtml> Why not use a portscanner instead? <begin11 .shtml> How to brea# into web sites using telnet <begin11 .shtml>
$Where do I type that command?$ %eople as# that all the time when they read my early Guides to &mostly' Harmless Hac#ing. I wrote those guides bac# when the Internet was in its in ancy and almost everyone in cyberspace used telnet. However( nowadays you might never even hear about telnet( much less use it( unless you are a hac#er. )o i you are still wondering about telnet( today is your luc#y day.
What Is Telnet?
*elnet is a protocol that is most commonly used to log into a remote computer. It also is the single most power ul hac#ing tool on the planet. With +ust a telnet client program( you can: send email download source code rom web sites send une"pected input to webservers that can give you ama,ing and sometimes illegal results give arbitrary input to many other services on Internet host computers probe the services o ered by servers( routers and even people-s home computers.
How to Telnet
.on-t #now how to telnet? /lic# the easy telnet lin#s at happyhac#er.com and land in the middle o a real hac#er wargame0 *his should wor# regardless o your computer operating system 11 i you have an up to date browser( i your online service provider gives you a true Internet connection( and i your computer is able to telnet at all. .id those lin#s get you into a telnet session? Were you able to login to a remote computer? I yes( congratulations. I not( how can you i" the problem? I no telnet program appeared on your monitor when
you clic#ed these lin#s( perhaps your browser is too ancient to allow telnet. *ry installing the latest 2etscape browser &<http:33www.netscape.com3>'. 4r( perhaps your operating system does not include a telnet program. In that case( install or reinstall Windows 56 or 57. I you own a 8ac( get the superb 8ac 4) 9 or !inu" %%/ &<http:33www.linu"ppc.com3>'. I a telnet program came up and ailed to connect( possibly the computer you were trying to telnet into was down or +ust plain no longer in e"istence. 4r( you may be using :merica 4nline &or a similar e"tremely poor online service'. I so( your simplest solution may be to get a better online service provider. .etermined to hac# using :4!? )ee http:33happyhac#er.org3aol.shtml <..3aol.shtml> or some ways to ma#e :4! give you a true Internet connection. 4;( so you-ve managed to telnet or the irst time. %resumably you don-t want to limit yoursel to telnet lin#s on web sites. How do you telnet anywhere you want to go? I you have !inu" or any other type o <ni" &=).( )/4( )olaris( )un 4)( Iri"( <ltri"( etc.' telneting is easy. >ust bring up $console$ or $shell$ &or whatever your G<I calls the command line inter ace'. :t the prompt type: telnet <hostname or I% address>
2ewbie note: *he owners or administrators o any Internet host computer decide who gets user names and passwords. =elieve it or not( about once a wee# someone emails me as#ing what user name and password their own online service provider has assigned them or a telnet login. *hat-s why I-m telling people the obvious 11 i you want to telnet into any computer( and you don-t have a user name and password( you must as# the owner( administrator o tech support or that system or a user name and password. I they won-t give that to you( they don-t want you to have it0 You can go to jail warning: If you guess the user name and password, or use a computer breakin technique to get or create them, or if someone other than an owner or administrator or a legitimate user on that system gives you a user name and password, it is against the law to use them. Many computer criminals give out user names and passwords that they obtained illegally.
More on Telnet: the Number One Hacker Tool How to Get Telnet Accounts
4;( so you want to get legal user names and passwords so you can telnet into other computers. Here are some o the best ways: )ee http:33happyhac#er.org3lin#s?.shtmlEshells <..3lin#s?.shtml> or organi,ations that will give you ree shell accounts. Fou can telnet into these. :s# Internet )ervice %roviders or shell accounts. )ome o er them( although most don-t. )et up a telnet server on your own computer &see instructions below'. Fes( once you are running a telnet server( you can telnet rom your computer bac# into your computer. )imply give the command $telnet 1?G.@[email protected]$. 8a#e riends with people who run Internet computers with telnet servers.
rom hac#ers. It-s your uneral( don-t come crying top me i a telnet visitor destroys your computer
More on Telnet: the Number One Hacker Tool How to Turn off a Telnet Server on your ni!"type Computer
I you go online with !inu" or other <ni"1type computer( a telnet server is the easiest way to ensure you get destroyed by a malicious hac#er. Here-s how to prevent this. 4n most o these( the ile 3etc3inetd.con launches most o your servers. Cdit the ile to put a $E$ in ront o the line that has telnet in it and either reboot your computer or #ill and restart inetd. I your computer doesn-t use inetd to launch services( you should be able to ind telnetd under 3etc3init.d. Install ssh instead and only use that to log into your shell account.
persuade your online service provider to cancel your account. *he other reason to analy,e computers using telnet is that you learn more. It-s the di erence between eating at 8c.onalds and learning how to coo#.
/oo#ie: 3K 8y=ogus/oo#ie *he Lberhac#er0 11 How to =rea# into /omputers <..3uberhac#er3inde".shtml> boo# details a number o serious attac#s you can per orm through sending unny input to a webserver. =asically( you need to learn how to write shell programs( and then ind ways to get them to be run by the webserver. I-m not going to e"plain them here( however. *hese attac#s( when carried out against a vulnerable webserver( are so easy that little #ids could do them( and I don-t want to be responsible or their behavior. It-s much harder or little #ids to get a hold o Iussell-s and my boo#s than it is or them to read this G*8HH on the Happy Hac#er website. )o are you dying to #now what to send a webserver in order to brea# into it( without having to buy a boo#? Here are some hints. How to do this will depend on what webserver it is( what operating system it runs on( whether its security wea#nesses have been i"ed( and whether the web designer has used things such as /ommon Gateway Inter ace &/GI' or )erver )ide Includes &))Is' that have wea#nesses in them. Fou will have to research these issues at Web sites that archive vulnerabilities and e"ploits such as <http:33www.security ocus.com3> and <http:33pac#estorm.securi y.com3>. Fou will need to study web site programming &H*8! 11 hyperte"t mar#up language( /GI and ))Is' and shell programming. Fou will need to learn webserver commands &documented at <http:33www.wD.org3hyperte"t3WWW3mar#up38ar#up.html>'. Fou will have to use your brain and be persistent. =ut at least i you come across a telnet e"ploit( now you #now the answer to the Huestion $where do I type that command?$