Results 1 to 9 of 9

Thread: The Ultimate Tutorial About Telnet.

  1. #1
    Join Date
    Sep 2003

    The Ultimate Tutorial About Telnet.



    here are sites that will allow you to play with telnet.

    http://www.chem.ox.ac.uk/it/telnet.html http://www.westwords.com/guffey/nettel.html

    First of all what is telnet?Telnet is a protocol which is part of the TCP/IP suite. It is quite similar to the UNIX rlogin program. Telnet allows you to control a remote computer from your own one. It is terminal emulation software. In the old days harddrives were humonguous and expensive (i am talking waY back here) and there were no personal computers. To make use of existing computers you had to lease hardrive space and use terminals to operate the system. For developers this was great because computing became lots cheaper. You needed a server and many connections could be made. With telnet u can emulate this type of distributed computing and for example operate a supercomputer from a distance.

    TCP/IP works with ports and telnet has one also. It's nr 23. It's has several rfc's. Nr 854 dates back to 1983 and is named telnet protocol specification.
    With telnet you can do various things like send mail, log in to irc or proxy and even (though hardly anymore) view and modify websites. There are telnet services available allowing you to search through large databases using telnet. With this you use the remote computer's power so it won't presure your precious resources. Usually help or remotehelp are the commands to use to find out what you can and cannot do. If you can't see what you type in then set echo. Once you made a connection you can use the computer as if it was your own. You use command lines for this.
    Telnet knows different emulation types. VT-100 is most used. This emulation was used on the video terminals of DEC. There are still VT-100 servers running out there. Scientists use these.

    To use telnet you need a client. Windows has telnet built in by default (as does UNIX but that's a different story), but there are third party clients available on the net. You start a telnet session by typing in the command 'telnet server.net 23' where the port number is optional. Since Telnet was based on UNIX (as it is part of TCP/IP which also was based on UNIX) it uses UNIX commands. Basic knowledge would help you here. The port number specifies what services you will use. 23 is the default one. You can log into various services. 80 is the HTTP server for that.
    So say you wanted to modify your site from a distance on a leased line. You don't have your fav progs and hardly any time.
    /* telnet server.net 80 (leave the /*)
    /* GET http://www.server.net/YOURSITE.HTM HTTP/1.1
    You can use this method to get the output of a cgi-script as well. The simple request doesn't use the HTTP/1.1 (this is the HTTP version running on the server). If you perform a bad request you usually get some info on the server. Use this to find a the correct versions of services running.
    To put files to the server u use the PUT command. Telnet is pretty simillar to FTP which is also part of TCP/IP. There are other commands available like POST, which is used to put larger data files to the server, HEAD to get the sites header and DELETE. This one is obvious isn't it.
    You can also use telnet to send raw imails. The port to login to is 25.
    First you have to identify your self. This geos like this:
    /* telnet mail.server.net 25
    /* HELO www.you.net
    When you typed this command you'll get some feedback telling you who and what you logged on to. When you login u may get also some feedback telling you things. :`;
    After this you tell the server where the mail is from like this:
    /* MAIL FROM:you@youradress.net
    The server will give you feedback again telling you
    /* ...Sender OK
    You are accepted. Now for the receipant
    /* RCPT TO:yourroommate@hisadress.net
    again feedback
    /* ...Receptient OK
    The server stil does it's duty.....
    /* DATA
    After typing this command you'll get the instructions on the proper way to send the mail. Type your mail using the instructions. After you're done sending your mail close the connection using
    You can use this to receive your mail as well (if your provider allows you). The POP port is 110. Telnet to the server on this port. Once there use the following commands.
    /* PASS ;type in your password (simple huh.).
    Once you are accepted as a valid user use the following to list your mail.
    /* LIST
    Ports can be configured so they may be different on some systems. Many admins use the default ones though.

    Two things come in handy when completly understanding telnet and how it works. They are a basic understanding of TCP/IP and a basic understanding of UNIX commands.

    You could use telnet to connect to a proxy and from there on continue your quest. Find a good proxy (use a search engine to locate one) and create an account. Now telnet to the server on the port specified on the website and hang loose. Using a proxy to use the web keeps your identity better hidden. Proxies often use port 8080 or 3128. If you use IE or Netscape you configure them to use a proxy. If you have computer friends maybe they could help you locate one nearby. To learn more about proxies read a tutorial about them. Telnet is part of TCP/IP and with this comes specific built in connection security. This basicly comes down to the three-way-handshake which i will not furtherly discuss in this tut. Terminal emulation was embraced by developers because it is a quick and secure way for remote computing.

    Bcause telnet is developed to be quick and reliable you could use it to connect yourself to an irc-server and chat with your buddies without a resource consuming GUI. You may even want to use a proxy to keep the (f)lamers from finding out your ip. To do this you have to know that the irc protocol has it's ports dedicated to 6666:6669. Ports can be configured so you have to know to what port you should connect. The identd runs on port 113. Better use a shell account to connect to IRC servers or a GUI client. Once you are there u can use the usual irc commands. If you have got a good shell (command.com) you can use scripts to automate procedures. To learn more about irc: Request for Comments: 1459 Internet Relay Chat Protocol. mIrc is a pretty good irc-client for nowadays high resource conputers if you want to learn this to. Since linux was built on UNIX and linux is free, you should have by now installed this operating system. OK
    U can also post to newsgroups if the server allows this. Newsgroups use nntp (rfc 977) over port 119. Use your skills. If you want to get information on a particular system you can use a technique known as port scanning. There are pretty fancy port scanners on the net but to become a guru you will have to know how hits take place. So use port surfing instead. Telnet to the server on various ports to get info on services. This is much more rewarding then using someone else's portscanner. If you want to become a good hacker learn a programming language and write your own. Because TCP/IP is not designed for a specific platform it works much the same on any. TCP/IP uses ports that have certain services.
    There are severel interresting ports for trying telnet like 7:echo. This one replies whatever you type in.
    13 daytime
    15 netstat
    37 time time
    39 rlp
    53 domain
    119 nntp
    443 https

    Use your commands to get the requested info. By connecting to different services you get a clear look at the system in use. If you want to exploit a system use the info and go to exploiters.net. If you come across a system you don't know read the ALT.2600.FAQ.
    There are also a lot of trojans circulating (like back orifice or netbus). If you know how to use these you can do some rad things but mostly the use if trojans is considered lame. Learn the commands and setup your private backdoor. When you want to attack a system prepare yourself for this. There has been some discussion on the legality of port-scanning/surfing. Many servers log every attempt to connect to it. Be warned.
    The expansion of free software towards the windows market gives great tools to set up your own hackerlab. For this you use your computer and one other. Set up a simple network with a server.
    Configure the server and start hacking.
    If you have a root account on a telnet server you can use this to remotely administer the server. There are many wats to get a root account. Remember that if an administrator finds a new root account on his system he will know it has been tampered with. Covering your tracks is fatal if you want to stay uncaught. Telnetting from a PDA is a pretty fancy way to read your mail or post to newsgroups from a distance. Because GSM phones can only transmit upto 9600 bps you might not want to load up the web.

    U can use telnet to create a shell account. This allows you to use a good shell even though u use Microsoft OS. Shell accounts vary in the services they have available. To find a good shell account search the net or try freeshell.org. Look for a shell that offers the progs you'dd like to use.

    And in my closing statement i would like to thank these people that without there help this Tutorial would not have been possible.


    And to all those that i have forgotten cheers.
    Anyhow enjoy

  2. #2
    Just a Virtualized Geek MrLinus's Avatar
    Join Date
    Sep 2001
    Redondo Beach, CA
    "Borrowed" from: http://www.linuxadvisory.com/tutorial96.html

    When writing tutorials please use your own words and don't just cut'n'paste someone elses. Especially if it's from a member here (no0dle, does this look familar?)
    Goodbye, Mittens (1992-2008). My pillow will be cold without your purring beside my head
    Extra! Extra! Get your FREE copy of Insight Newsletter||MsMittens' HomePage

  3. #3
    This is my tutorial and has allready been posted on this site before.
    Like MsMittens said you can also find it on linuxadvisory.
    And in my closing statement i would like to thank these people that without there help this Tutorial would not have been possible.
    Yeah thanks

    btw the original and unedited version has also been posted by Noia.
    He did give the proper credit though.

  4. #4
    Join Date
    Sep 2003
    Your all a bunch of ****s........
    I have spent two months workin on that.
    And you all got the nerve to accuse me of something?

    Anyhow i really couldn't care what u r accusin me of.
    I know that i hand wrote all of it, i searched websites for my information, and you got the cut and paste thing right, i cut and pasted it from my floppy disk.

    And well if it looks like another tutorial already in here, then to bad. I know that i worked many long hours to compile this tutorial. And i recieved lot's of help from many friends whom mainly helped me gather the information.

    Well if it is your tutorial noodles, then hey man im sorry, but i did honestly spend a lot of time writing this thing..

    And at the end of the day i know that i have done nothing wrong, So i will not let this negative response ruin my day.

    And MS MITTENS you think that you are all high and almighty...
    Well there's certainly a few skeletons in your closet...............!

    Anyhow cya all and if you gotta neg me for this then enjoy,
    Its not gonn affect my life in any way..................

    And another thing, noodles that tutorial can be found at www.hackerthreads.org
    And the wierd thing is that that one at hacker threads was written 2 years ago by my mate weaze..
    So whom did the cut and paste.........?

    Thank you very much, you **** head


  5. #5

    You mean that?

    The post date doesn't correspond to two years ago. Odd. *shrugs*

  6. #6
    Join Date
    Jul 2002
    Originally posted here by reset_button
    I have spent two months workin on that.
    Awwwww, what a poor & sick !BASTERD!
    You want us to feel ****ing sorry for you? You want our pity or something? Well then you got it, pal.

    Holy **** two months on that and you even needed help from your buddies? This might come as a surprise to you and your low intelligence but anyways... this tutorial isn't a big deal I mean theres nothing hard about useing telnet. And Ga' damn look at how many peaple he needed to thank for helping him with this. Hahahahahaha!!!! LOL

    Originally posted here by reset_button
    Its not gonn affect my life in any way...
    You spent two months on it as if its some kinda great ****ing work of art. You cried, bitched, then screamed to the top of your lungs infront of your computer screen. With a life like yours I'd have to agree with the quote shown above... Hell it looks like you've hit rock bottom, I mean there is no possable way you and your life could sink to a lower level of stupidity.

  7. #7
    You must really be retarded.
    the post on hackerthreads dates back to Posted: 05-30-2003 02:28 PM
    Note that Noia's post dates back to posted 03-05-2002 08:00 PM
    I know that i hand wrote all of it
    And the wierd thing is that that one at hacker threads was written 2 years ago by my mate weaz
    You contradict yourself and like GreekGoddess said, that thread dates back onlty a couple of months.
    <sarcasm>Funny that you wrote exactly the same words as me, must be a coincidence </sarcasm>
    And you all got the nerve to accuse me of something?
    You are a ****tarded twit.

    Funny side note:
    has also plagarised this tutorial, they even stamped copyright on it. ( 2003).

    More side note:
    will show you that hackerthreads gives ME the proper credit.
    Security Tutorials
    ... Explains what is telnet and how to use it. Telnet by noODle: First of all
    what is telnet? Telnet is a protocol which is part of the TCP/IP suite. ...
    www.hackerthreads.org/tutorials/telnet.php - 23k - In cache

  8. #8
    Join Date
    Sep 2003
    um look at that actually dat you moron,,
    try it was put on there on the 15\2\2001
    What you so ignorant that you forgot how to read.........?

    And in fact i am pissed of as i've only been learnin about computers and there progams for only a little while.
    So yes to me this tutorial is a work of art

    It's the first good thing to come out of me.
    And yes the reason why i needed so much help in the first place is because i am illiturate, plus dislexic..
    You know what those two words mean.......?

    Hmmm wait's for these moron's to pull out there manuals and look up those two words......!

    I don't care how much you all neg me, because i know i've done the right thing, all my friends whom helped know i've done the right thing..

    And to me that's the only thing that matter's, At least i'm not askin stupid questions..
    Hmmm how do i hack this how do i hack that.?
    **** what do i have MORON tattoed onto my forehead.......?
    No i don't think so..........

    So my finally say to all this is,
    That it's typical for you security no it alls to gang up on us newbies...
    But in reality it's you lot that are the one's that are ganged up on,
    You hide behind your monitor and when you gotta say that **** to the person's face you **** yourself's......And i'd really like for you lot to walk up to me and accuse me of what you are accusing me off.................

    (lmfao At that idea)

    It reminds me of this one bloke Kevin Mitnick.
    Hmmm he did this he did that and to the underworld he is meant to be some powerful genius..?

    Well i laugh at that, Kevin ain't ****, he never went to College, He has never worked for any kind of company and he never will....

    And he went around baggin people, but as soon as it was time for him to say it to there faces he hid like a lil girl and cried to he's mumma.

    And i laughed when he got caught, gees he carn't be that smart if he carn't elude the police for that long.............?

    But the happiest day in my life was tha day he did get caught and all those people that he bad mouthed, well they got there revenge.....

    And that is funny, Because i had this security dude saying **** about me when i was getting my computer repaired, I questioned him when he returned to the counter, and he got all nervous. And hid in the back office and got one of the other guys to serve me...
    Now that was funny because i waited until he got of work and i asked him if he would repeat it to my face.....?

    Now he **** bricks and denied everything, but how could he? When my Uncle had heard the conversation as well.?>?

    Anyhow the point to this is that all you lot say **** because you think that you are better then everyone else, when in reality you arn't...
    Hey you might be good at using computers, but **** i'm a qualified electrical engineer, and you don't see me accusing people of this and that.........?
    Because im not like you lot, and i'm sure that if i ever saw anyof use in real life then i would snap your knees without a hesitation....

    So have your little negs flame me like i really care....
    Because that's all you lot care about who flammed whom?

    Its like a big ego trip for you lot so enjoy, Continue to get off on flammin me, at my entire life aint revolved around sitting in front of a monitor and keyboard all the flammin time..



  9. #9
    Just a Virtualized Geek MrLinus's Avatar
    Join Date
    Sep 2001
    Redondo Beach, CA
    Ok. This thread has reached it's useless level.

    Tis closed.
    Goodbye, Mittens (1992-2008). My pillow will be cold without your purring beside my head
    Extra! Extra! Get your FREE copy of Insight Newsletter||MsMittens' HomePage

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts