-
Telnet ?'s
i was trying to do a telnet on whois.alldomains.com and for whatever reason it boots me off after i do one search, anybody know why? also, what happens when u telnet to a webserver on port 80? wouldnt the html source show up? cuz it just gives me a wierd blank screen then disconnects me.
-
Phonedog,
The days of telnet are becoming fewer and fewer with the advent of more secure means. As a result the telnet services are secured. So it's not too surprising that you can't telnet to whom every you desire.
cheers
-
??? Why would you want or need to telnet into a webserver? For that matter, why would you telnet into whois.alldomains.com?
Telnet was not designed to surf the web.
-
Code:
[rcgreen@acer X11]$ telnet antionline.com 80
Trying 63.146.109.212...
Connected to antionline.com.
Escape character is '^]'.
GET HTTP /1.1
HTTP/1.1 400 Bad Request
Date: Fri, 02 Apr 2004 22:50:44 GMT
Server: Apache/1.3.29 (Unix) PHP/4.3.4
Connection: close
Content-Type: text/html; charset=iso-8859-1
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<HTML><HEAD>
<TITLE>400 Bad Request</TITLE>
</HEAD><BODY>
<H1>Bad Request</H1>
Your browser sent a request that this server could not understand.<P>
The request line contained invalid characters following the protocol string.<P>
<P>
<HR>
<ADDRESS>Apache/1.3.29 Server at www.antionline.com Port 80</ADDRESS>
</BODY></HTML>
Connection closed by foreign host.
http://www.dgate.org/~brg/bvtelnet80/
:cool:
-
yeah, but what about the whois server? i thought whois was meant to be used via telnet
<edit>
btw: that tutorial on getting web pages thru telnet was great, thanx for not flaming me :D
</edit>
-
whois.alldomains.com is a whois server, and best accessed
by a whois client. If your system doesn't have one, you can download it.
http://www.google.com/search?hl=en&i...indows+console
:cool:
-
whois was meant to be used by a whois client which uses port 43 i believe. i suppose you could do it with telnet if you adheared to the format.
echo GET/HTTP\n\n |nc -vv antionline.com 80 >ao.txt
<!-- BEGIN TEMPLATE: P_home -->
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<HTML>
<HEAD>
<!-- no cache headers -->
<meta http-equiv="Pragma" content="no-cache">
<meta http-equiv="no-cache">
<meta http-equiv="Expires" content="-1">
<meta http-equiv="Cache-Control" content="no-cache">
<!-- end no cache headers -->
<META NAME="keywords" CONTENT="Computer Security,Hacking,Hacker,Crackers,Virus,Virii,Webpages,DOS,Denial of Service,files,links,encryption,spoofing,news,texts,password,port monitors,key logger,phreaking,boxes,wardialers,patches,exploits,fixes,hot fixes,antionline,bugs,technology,">
<META NAME="description" CONTENT="AntiOnline's mission is to educate users about computer security related issues.">
<TITLE>AntiOnline - Computer Security</title>
<!-- BEGIN TEMPLATE: headinclude -->
<link rel="P3Pv1" href="/w3c/p3p.xml">
<meta http-equiv="MSThemeCompatible" content="Yes">
<style type="text/css">
BODY {
SCROLLBAR-BASE-COLOR: #2962B4;
SCROLLBAR-ARROW-COLOR: #FFFFFF
}
TD { FONT-SIZE: 12px; FONT-FAMILY: Verdana,Arial,Helvetica,sans-serif; }
SELECT {
FONT-FAMILY: Verdana,Arial,Helvetica,sans-serif;
FONT-SIZE: 11px;
COLOR: #000000;
BACKGROUND-COLOR: #CFCFCF
}
TEXTAREA, .bginput {
FONT-SIZE: 12px;
FONT-FAMILY: Verdana,Arial,Helvetica,sans-serif;
COLOR: #000000;
BACKGROUND-COLOR: #CFCFCF
}
#all A:link, #all A:visited, #all A:active {
COLOR: #000020;
}
#all A:hover {
COLOR: #802ba8;
}
#cat A:link, #cat A:visited, #cat A:active {
COLOR: #000000;
TEXT-DECORATION: underline;
}
#cat A:hover {
COLOR: #000000;
TEXT-DECORATION: underline;
}
#ltlink A:link, #ltlink A:visited, #ltlink A:active {
COLOR: #000020;
TEXT-DECORATION: none;
}
#ltlink A:hover {
COLOR: #802ba8;
TEXT-DECORATION: underline;
}
.thtcolor {
COLOR: #000000;
}
.nf {
FONT-FAMILY: verdana, arial, helvetica, sans-serif;
FONT-SIZE: 12px;
}
.sf {
FONT-FAMILY: verdana, arial, helvetica, sans-serif;
FONT-SIZE: 10px;
}
</style>
<script language="JavaScript" type="text/javascript">
<!--
function confirm_newpm() {
input_box=confirm("You have a new private message. Click OK to view it, or cancel to hide this prompt.");
if (input_box==true) { // Output when OK is clicked
second_box=confirm("Open in new window?\n\n(Press cancel to open your Inbox in the current window.)");
if (second_box==true) {
window.open('private.php?s=','pmnew','width=600,height=500,menubar=yes,scrollbars=yes,toolbar=yes,location=yes,directories=yes,resizable=yes,top=50,left=50');
} else {
window.location="private.php?s=";
}
} else {
// Output when Cancel is clicked
}
}
// -->
</script>
<script language="JavaScript">
<!-- START HIDE
function whodownloaded(attachmentid) {
window.open
("whodownloaded.php?attachmentid=" + attachmentid,
"whodownloaded", "toolbar=no,scrollbars=yes,resizable=no,width=240,height=300, top=50, left=50"); }
-->
</script>
<script>
function openquote(){
var popurl="quote.php?action=add"
winpops=window.open(popurl,"","width=700,height=350,")
}
</script>
<script language="JavaScript">
function whovoted(pollid, optionid) {
window.open("poll.php?action=whovoted&pollid="+pollid+"&optionid="+optionid, "whovoted", "toolbar=no,scrollbars=yes,resizable=no,width=240,height=300, top=50, left=50");
}
</script>
<!-- END TEMPLATE: headinclude -->
<SCRIPT LANGUAGE=JavaScript>
<!--
OAS_url = 'http://mjxads.internet.com/RealMedia/ads/';
OAS_sitepage = 'intm/it/www.enterpriseitplanet.com/security/antionline';
OAS_listpos = '336x280,468x60-2';
OAS_query = '';
OAS_target = '_top';
OAS_version = 10;
OAS_rn = '001234567890'; OAS_rns = '1234567890';
OAS_rn = new String (Math.random()); OAS_rns = OAS_rn.substring (2, 11);
function OAS_NORMAL(pos) {
var_a=('<A HREF="' + OAS_url + 'click_nx.cgi/' + OAS_sitepage );
var_b=(var_a + '/1' + OAS_rns + '@' + OAS_listpos + '!' + pos + '?' );
var_c=(var_b+ OAS_query + '" TARGET=' + OAS_target + '>');
document.write(var_c);
var_aa=('<IMG SRC="' + OAS_url + 'adstream_nx.cgi/' + OAS_sitepage );
var_bb=( var_aa + '/1' + OAS_rns + '@' + OAS_listpos + '!' + pos + '?');
var_cc=( var_bb + OAS_query + '" BORDER=0></A>');
document.write(var_cc);
}
//-->
</SCRIPT>
<SCRIPT LANGUAGE=JavaScript1.1>
<!--
OAS_version = 11;
if (navigator.userAgent.indexOf('Mozilla/3') != -1 )
OAS_version = 10;
if (navigator.userAgent.indexOf('Mozilla/4.0 WebTV') != -1)
OAS_version = 10;
if (OAS_version >= 11) {
var_aaa=('<SCRIPT LANGUAGE=JavaScript1.1 SRC="' + OAS_url);
var_bbb=(var_aaa + 'adstream_mjx.ads/' + OAS_sitepage + '/1');
var_ccc=(var_bbb + OAS_rns + '@' + OAS_listpos + '?' + OAS_query );
var_ddd=(var_ccc + '"><\/SCRIPT>');
document.write(var_ddd);
}
//-->
</SCRIPT>
<SCRIPT LANGUAGE=JavaScript>
<!--
document.write('');
function OAS_AD(pos) {
if (OAS_version >= 11)
OAS_RICH(pos);
else
OAS_NORMAL(pos);
...etc., etc.
-
telnet is handy for a few things still. IRC for one, getting webpage headers, and checking your own ports. If you want to try out a terminal webpage client, go get one of the links or lynx binaries. It is loads of fun!