Telnet H@cking!!


SUBMITTED BY: darkrise

DATE: March 16, 2016, 9:41 a.m.

FORMAT: Text only

SIZE: 15.7 kB

HITS: 577

  1. TABLE OF CONTENTS:
  2. Chapter One: Intro
  3. 1. Introduction
  4. 2. Warnings
  5. 3. Copyright Information
  6. 4. Disclaimer
  7. 5. Who Am I?
  8. 6. Shout Outs
  9. Chapter Two: Before We Start
  10. 1. What The Hell Is Telnet?
  11. 2. What Was The Original Purpose?
  12. 3. What Can I Do With It?
  13. 4. Is It Illegal?
  14. 5. Will I Go To Jail?
  15. 6. Is It Fun?
  16. Chapter Three: Getting Started
  17. 1. Possible Targets
  18. 2. Is The Target Alive?
  19. 3. Scanning For Ports
  20. 4. Getting An IP
  21. 4.A. Messenger
  22. 4.B. Social Engineering It
  23. 4.C. Your Firewall
  24. Chapter Four: Connecting
  25. 1. Connecting To An IP
  26. Chapter Five: What To Do After Your Connected
  27. 1. Doing Something!
  28. 2. FTP
  29. Chapter Six: Cracking A Pass
  30. 1. Brutus
  31. 2. Password Lists
  32. 3. Default Passwords
  33. Chapter Seven: FAQ's
  34. 1. 'I Get A Blank Screen After Connecting!'
  35. 2. 'It Says It Can't Connect! WTF!'
  36. 3. 'My Computer Flips Off After Connecting!'
  37. 4. 'Where Do I Type My Commands?'
  38. 5. 'I Got Arrested!!! Can I Sue You?'
  39. Chapter Eight: Wrapping Up
  40. 1. Contact Me
  41. 2. TGS
  42. ~`CHAPTER ONE: INTRODUCTION`~
  43. ~`Introduction`~
  44. Hey. I decided that my old telnet tutorial was not sufficient, so I
  45. decided to redo it, among all the other work I have to do. This will
  46. provide a step by step method to: Connect to an IP, Connect to a
  47. certain port, Decide if the port is responsive, Find commands that you
  48. can use on this 'Box', Use the commands, Crack a password using
  49. 'Brutus', Find Targets, and many other things. It will also include
  50. many pictures that you can use as a reference. Remember, all command
  51. prompts are different, don't be discouraged.
  52. ~`Warnings`~
  53. This is a form of hacking. Whether you do or do not damage a computer,
  54. you are committing a felony. Connecting to a computer or something of
  55. the kind without permission is punishable by law and will get you corn
  56. holed in a state prison by a 365 pound, one eared black man by the
  57. name of bubba. You can be held to Criminal, as well as Civil suites
  58. for your actions.
  59. Doing this is a good way to get enemies' also. Remember, there are
  60. hundreds of hacking groups out there, and hundreds of hackers, there's
  61. a chance that you can be fucking with a hacker of a group, and that is
  62. not a fun thing to do.
  63. ~`Copyright Information`~
  64. This or any portion of this paper is allowed to be duplicated. You may
  65. host it on your site, as long as it stays intact. Failure to comply
  66. with this will result in swift legal action.
  67. ~`Disclaimer`~
  68. I cannot be held responsible for your actions because of this. I will
  69. not take responsibility. If you don't agree with this, DO NOT READ
  70. FURTHER. I do not condone hacking, as well as any other form of
  71. illegal behavior. Also, you will encounter a number of IP's in this
  72. forum, DO NOT USE ANY OF THEM. The ones I used for demonstration I did
  73. not hurt, and I take no responsibility if you do use them. You have
  74. been warned.
  75. NOTE: I used www.sjms.org (the website of a fine military academy) in
  76. some of my examples. I mean no harm to come to www.sjms.org. I did not
  77. hack www.sjms.org, and I don't recommend you doing it either. I take
  78. no responsibility if you do though.
  79. ~`Who Am I?`~
  80. I am Errorised of the www.waushare.com forums. If you'd like to get a hold of me, do
  81. so at koft@habbocommunity.co.uk
  82. ~`Shout Outs`~
  83. Hey I'd like to say hello to my good buddies: Wau / Placi / Maki / Unstable /
  84. Phantom / BOOSTER / Chaos Zero / T1M3 / M4K3 / RedFox / Mr.Wolves / h3r3t1c
  85. and whoever else I forgot (due to the pot) These are all buddies, as
  86. well as PSP-Hacks members.
  87. ~`CHAPTER TWO: BEFORE WE START`~
  88. ~`What Was The Original Purpose Of Telnet?`~
  89. Telnet was originally made for someone to do all sorts of things. From
  90. checking your mail to connecting to your company's server while on a
  91. business trip, telnet does it all. The makers of
  92. it had a dream in mind that the average person could deal with
  93. command/text based programs. But of course when the masses got into it
  94. and every brother and sister bought a computer,
  95. Windows was made, which totally destroyed most text based programs.
  96. Now fucking idiots run computers and company's with computers, and
  97. can't even deal with a damn telnet program!
  98. ~`What Can I Do With It?`~
  99. Although Telnet has died for the business men, it is still growing
  100. quickly with the not-so-trustful person. For the hacker, Telnet is the
  101. hammer in the tool box. Telnet is one of the most
  102. world wide programs among hackers, as well as other fun loving people.
  103. When you finally hit that golden hack after your first long hours of
  104. struggling with telnet (not!), you are god!
  105. You can change other people's passwords, snoop on e-mails, forge dirty
  106. e-mails to ones lover,
  107. ~`Is It Illegal?`~
  108. Two words: HELL YES. Hacking is the most illegal thing one can do on
  109. the internet. Do not be mistaken, it's quite illegal.
  110. ~`Will I Go To Jail?`~
  111. Only if you're caught. This is why it's good to encrypt your entire
  112. hard rive, if they can't get anywhere in your hard rive, how the hell
  113. are they going to charge you with anything? It is very good to be
  114. paranoid. My computer is a vault. The military runs 1800 bit
  115. encryption tops. The average bit encryption for any given file in my
  116. computer is around 7000, Triple Blowfish encrypted. There's also a
  117. shredder that hides in the startup registry that I made in a batch
  118. file, it hides there and if you don't turn it off within 15 seconds of
  119. starting up, bye bye computer and bye bye evidence. It's always good
  120. to be paranoid.
  121. ~`Is It Fun?`~
  122. Despite my comments about jail, it is quite fun. Most hackers do what
  123. they do for the simple thrill of knowing secrets that no ones supposed
  124. to know. Having inside information on people
  125. who they barely know or care about. Knowing top secret information
  126. that only god and the president are supposed to know, now that's fun!
  127. ~`CHAPTER THREE: GETTING STARTED`~
  128. ~`Possible Targets`~
  129. A target is a person, place, or thing (kind of like a noun, eh?) in
  130. which you are planning on attacking. A target can be anyone! Common
  131. targets include: Family, Friends, Government, Phone
  132. Company's, and Former Attackers. Normally the first target is a friend
  133. or family member, someone who's not so smart and someone you know for
  134. a fact has no security. Security just gets in the way. '7337' hackers
  135. learn to deal with security, newbie's fall into the trap. So for now
  136. stick with someone easy.
  137. ~`Is The Target Alive?`~
  138. Go to command prompt (or Ms-DOS) and type ping 0.0.0.0. (replacing the
  139. zeros for the real IP). If it returns, then the computer is connected
  140. to the internet. If it says that its lost, then the computer offline
  141. (duh!).
  142. ~`Scanning For Ports`~
  143. We will be using Blues Port Scanner to scan for ports. You can get
  144. blues port scanner at download.com or www.library.2ya.com. It is about
  145. 400 KB, not too big.
  146. You scan an IP for ports by pasting (CTRL V) the IP in both boxes in
  147. the top. This makes it scan only that ip. You then put the selected
  148. range of ports in which you wish to scan.
  149. The more you scan, the more of a chance they will notice your
  150. movements, but do as you please.
  151. ~`Getting An IP`~
  152. IP is short for Internet Protocol. Each computer has an IP. Getting
  153. someones IP can be as easy as asking for it. Here's a few ways:
  154. Messenger:
  155. Ok, so you have MSN messenger. Your a 'bad mofo', a 'rough rider', now
  156. its time to get what you need from your victim. The first thing to do
  157. is build trust. It would be wise to do this on someone you know will
  158. trust you enough to buy into your shit. Here's how you get their IP:
  159. 1. Send them a file through MSN (or whatever they have). It can be
  160. anything, a game, a dead hamster, a naked picture of yourself,
  161. whatever.
  162. 2. Once they accept, go into Command Prompt and type "netstat".
  163. 3. With a bit of hunting and picking you should be able to find their
  164. IP in the box.
  165. Social Engineering:
  166. Social Engineering is a fancy term that people use to discribe smooth
  167. talkers. Social Engineerers are slick, smooth, smart, and know what
  168. their talking about. They get into the part before
  169. attacking, they have great social skills and are easy people to trust.
  170. Social Engineerers build up a nice level of trust, the more the
  171. better, until they get the information they want.
  172. Once, on a SC 'field trip' with a friend of mine, we actually got
  173. dressed up to walk to a payphone and make the attack that we've been
  174. building trust for months. It was worth it.
  175. But anyway, back to the subject.
  176. Usually, all you need to do is ask the person. If they know better
  177. then to give you the IP if you flat out ask them, then they will know
  178. better then if you try to scare it out of them. Get em to go to
  179. ipchicken.com and give you the numbers in the blue letters.
  180. Your Firewall:
  181. If you have a firewall, then chances are you've seen someone trying to
  182. scan you for open ports. If you use Black ICE, all the better. I
  183. suggest you download it at www.library.2ya.com.
  184. What Black ICE does is gather up all the attempts to port probe you,
  185. connect to your computer, or anything else, and stick it in a database
  186. for further use. You can easily pick out targets from the list and use
  187. them for your will.
  188. Double click on the person you wish to get the ip with, and on the
  189. right it gives you the IP AND the DNS! How nice eh?
  190. ~`CHAPTER FOUR: CONNECTING`~
  191. ~`Connecting To An IP`~
  192. Ok, so you've got your list of open ports on the computer. For this
  193. demonstration I'll be using someone who attempted to hack me a while
  194. back. After scanning a few thousand ports, we come up with this list.
  195. Now not all of these allow connections. The ones labeled with a red
  196. box next to them are 'dead' ports for the telnet program. This is
  197. usually because they only communicate using a certain 'language' that
  198. Telnet doesn't support. When you try to connect to these you get a
  199. blank screen with dashs where you try to type (see below). The
  200. listings labeled with a green next to them allow connections and will
  201. talk to you without having to give it a user or pass. The ones labeled
  202. with a blue box next to them means that they are responsive, are not
  203. dead, but they require authentication before your allowed to connect.
  204. If you really need into this computer and they've got password
  205. protected ports, there's a section later in the paper that tells you
  206. how to get in. So anyway, lets focus on the responsive port. This is
  207. unfortunately the SMTP port (Simple Mail Transfer Protocol). Although
  208. it does not allow a significate amount of access to this persons
  209. computer without knowing advanced things, it does give us a good basis
  210. for a demonstration in Telneting. Below will show you step by step on
  211. how to connect and other things with this port.
  212. 1. Connect to the computer by typing "Telnet 0.0.0.0 25" in Command
  213. Prompt/Ms DOS. You should replace the "0.0.0.0" for the IP address you
  214. wish to connect to, and the 25 for the specific port you plan on
  215. connecting to. For this demonstration, I will be using the IP
  216. 161.58.163.4 and the port 25. So the command should read "telnet
  217. 161.58.163.4 25". There's no special place to type (as I've received
  218. many e-mails questioning this), when you type, it should show up at
  219. the bottom.
  220. 2. Press enter.
  221. Congratulations! You just made your first connection! Although it's
  222. not a quantum leap in the exploration of computer security, it's a
  223. start.
  224. ~`Doing Something After You Connect
  225. ~`CHAPTER FIVE: WHAT TO DO AFTER YOUR CONNECTED`~
  226. ~`Doing Something!`~
  227. Alright, so you've got your open connection on an open port. It's best
  228. to keep the connection time down to a minimum to reduce them knowing.
  229. I'll now demonstrate on what to do after you're connected.
  230. 1. Generically speaking, typing help will give you a list of all the
  231. commands supported for that Box. However, some require you to log on
  232. before doing so, what a drag!
  233. Alright, after typing help this is how it responded.
  234. You see that there's a nice listing of commands you can use. Since
  235. this port is not pass protected, you have no worries about
  236. restrictions. Typing "help" and then the command in which you want
  237. help on will make it elaborate, which is a great feature for a newbie!
  238. This is a pic of me asking it to elaborate on a few things.
  239. 2. You can never forget to say "hello". It's quite rude to run through
  240. someone's home (computer) without even introducing yourself. This
  241. young lady was much nicer after I said "helo" to it.
  242. [NOTE: I lost the pics and I'm too fucking lazy to make a helo pic…
  243. I'm sure you're smart enough to figure it out]
  244. 3. Use the commands in the box to figure out what you want to do.
  245. Since every computer and port is different, it is impossible for me to
  246. show you every single thing you can do. Learn to get off your bum and
  247. ask it what some of the commands mean, its a good learning tool.
  248. ~`FTP`~
  249. You can also connect to port 21 (FTP, or File Transfer Protocol) using
  250. telnet. Typing help will give you a listing that you nee
  251. ~`CHAPTER SIX: CRACKING A PASSWORD`~
  252. ~`Brutus`~
  253. Brutus is a great Brute Force password cracker. It is easy to use for
  254. the newbie, fast, and reliable. You can find it by doing a search at
  255. www.google.com for "Brutus".
  256. ~`Password Lists`~
  257. I'm proud to announce that two of our TGS members, The_IRS and
  258. Computer Geek, have combined many lists and have came out with a
  259. password list with a total of 2.1 passwords. You can download it here:
  260. http://www.aftdesign.com/hacking/passwords.html
  261. ~`Default Passwords`~
  262. You can find many lists of default passwords for any operating systems
  263. on the web. Doing a search at google.com for "Default Password Lists"
  264. will come in handy. Here is a very good site with many default
  265. passwords that you can access in the meantime:
  266. http://www.phenoelit.de/dpl/dpl.html
  267. ~`CHAPTER SEVEN: FAQ`~
  268. 1. "I Get A Blank Screen After Connecting!"
  269. The port that your connecting to is 'dead', or unusable. This could be
  270. due to a number of different things. For instance, lets say that your
  271. trying to connect to someones computer through telnet, on the kazza
  272. port (which I beleive is 1214). This port is not designed to take
  273. packets (data) from the telnet program, and is specifically designed
  274. to give and receive packets (data) from the kazza program. This could
  275. be one of your problems. Trying to connect to a backdoor for a Sub7
  276. program will also do the same.
  277. 2. "It Says I Can't Connect! WTF!"
  278. This is because the port is either closed, or the computer is firewall
  279. protected. As a newbie I wouldn't suggest messing with it.
  280. 3. "My Computer Flips Off After Connecting!"
  281. I'll bet money your using Windows. You are aren't ya? I knew it! This
  282. is a Windows Dump File. Either update Windows, get Linux, or forget
  283. hacking.
  284. 4. "Where Can I Type My Commands?"
  285. Type a few letters to see where they commands will show up. Most
  286. likely it will be at the bottom of the Command Prompt/MS DOS screen.
  287. 5. "I Got Arrested!!! Can I Sue You?"
  288. NO! You read my disclaimer at the top. I don't care who you are, I'm
  289. not taking responsibility.
  290. ~`CHAPTER EIGHT: WRAPPING UP`~
  291. ~`Contact Me`~
  292. You can get a hold of me at koft@habbocommunity, or the
  293. www.waushare.com or www.crazy-coderz.net forums, I usually hang around there. Any questions
  294. are welcome, however, I will not do illegal things for you, don't ask.
  295. Hope This Helps!
  296. Errorised / Error.

comments powered by Disqus