Thursday, May 22, 2008

How to Telnet with Windows XP

How to Telnet with Windows XP
The queen of hacker commands is telnet. To get Windows help fortelnet, in the cmd.exe window give the command:
C:\>telnet /?
Here's what you will get:
telnet [-a][-e escape char][-f log file][-l user][-t term][host[port]]-a Attempt automatic logon. Same as -l option except usesthe currently logged on user's name.-e Escape character to enter telnet client prompt.-f File name for client side logging-l Specifies the user name to log in with on the remote system.Requires that the remote system support the TELNET ENVIRONoption.-t Specifies terminal type.Supported term types are vt100, vt52, ansi and vtnt only.host Specifies the hostname or IP address of the remote computerto connect to.
port Specifies a port number or service name.
****************Newbie note: what is a port on a computer? A computer port is sort of like a seaport. It's where things can go in and/or out of a computer. Some ports are easy to understand, like keyboard, monitor, printer and modem. Other ports are virtual, meaning that they are created by software. When that modem port of yours (or LAN or ISDN or DSL) is connected to the Internet, your computer has the ability to open or close any of over 65,000 different virtual ports, and has the ability to connect to any of these on another computer - if it is running that port, and if a firewall doesn?t block it.********************************Newbie note: How do you address a computer over the Internet? There are two ways: by number or by name. ****************
The simplest use of telnet is to log into a remote computer. Give thecommand:
C:/>telnet targetcomputer.com (substituting the name of the computer you want to telnet into for targetcomputer.com)
If this computer is set up to let people log into accounts, you mayget the message:
login:
Type your user name here, making sure to be exact. You can't swap between lower case and capital letters. For example, user name Guest is not the same as guest.
****************Newbie note: Lots of people email me asking how to learn what their user name and password are. Stop laughing, darn it, they really do. If you don't know your user name and password, that means whoever runs that computer didn't give you an account and doesn't want you to log on.****************
Then comes the message:
Password:
Again, be exact in typing in your password.
What if this doesn't work?
Every day people write to me complaining they can't telnet. That isusually because they try to telnet into a computer, or a port on acomputer that is set up to refuse telnet connections. Here's what itmight look like when a computer refuses a telnet connection:
C:\ >telnet 10.0.0.3Connecting To 10.0.0.3...Could not open connection to the host, on port 23. A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond.
Or you might see:
C:\ >telnet techbroker.comConnecting To techbroker.com...Could not open connection to the host, on port 23.No connection could be made because the target machine activelyrefused it.
If you just give the telnet command without giving a port number, itwill automatically try to connect on port 23, which sometimes runs atelnet server.
**************Newbie note: your Windows computer has a telnet client program,meaning it will let you telnet out of it. However you have to installa telnet server before anyone can telnet into port 23 on yourcomputer.*************
If telnet failed to connect, possibly the computer you were trying totelnet into was down or just plain no longer in existence. Maybe thepeople who run that computer don't want you to telnet into it.
How to Telnet into a Shell Account
Even though you can't telnet into an account inside some computer, often you can get some information back or get that computer to do something interesting for you. Yes, you can get a telnet connection to succeed -without doing anything illegal --against almost any computer, even if you don't have permission to log in. There are many legal things you can do to many randomly chosen computers with telnet. For example:
C:/telnet freeshell.org 22
SSH-1.99-OpenSSH_3.4p1
That tells us the target computer is running an SSH server, which enables encrypted connections between computers. If you want to SSH into an account there, you can get a shell account for free at . You can get a free SSH client program from .
One reason most hackers have shell accounts on Internet servers is because you can meet the real hackers there. When you've logged in, give the command w or who. That gives a list of user names. You can talk to other users with tht talk command. Another fun thing, if your shell account allows it, is to give the command
ps -auxww
It might tell you what commands and processes other users are running. Ask other users what they are doing and they might teach you something. Just be careful not to be a pest!
***************You can get punched in the nose warning: Your online provider might kick you off for making telnet probes of other computers. The solution is to get a local online provider and make friends with the people who run it, and convince them you are just doing harmless, legal explorations.*************
Sometimes a port is running an interesting program, but a firewall won't let you in. For example, 10.0.0.3, a computer on my local area network, runs an email sending program, (sendmail working together with Postfix, and using Kmail to compose emails). I can use it from an account inside 10.0.0.3 to send emails with headers that hide from where I send things.
If I try to telnet to this email program from outside this computer,here's what happens:
C:\>telnet 10.0.0.3 25Connecting To 10.0.0.3...Could not open connection to the host, onport 25.No connection could be made because the target machine activelyrefused it.
However, if I log into an account on 10.0.0.3 and then telnet frominside to port 25, here's what I get:
Last login: Fri Oct 18 13:56:58 2002 from 10.0.0.1Have a lot of fun...cmeinel@test-box:~> telnet localhost 25Trying ::1...telnet: connect to address ::1: Connection refusedTrying 127.0.0.1... [Carolyn's note: 127.0.0.1 is the numericaladdress meaning localhost, the same computer you are logged into]Connected to localhost.Escape character is '^]'.220 test-box.local ESMTP Postfix
The reason I keep this port 25 hidden behind a firewall is to keeppeople from using it to try to break in or to forge email. Now theubergeniuses reading this will start to make fun of me because noInternet address that begins with 10. is reachable from the Internet.However, sometimes I place this "test-box" computer online with astatic Internet address, meaning whenever it is on the Internet, italways has the same numerical address. I'm not going to tell you what its Internet address is because I don't want anyone messing with it. I just want to mess with other people's computers with it, muhahaha. That's also why I always keep my Internet address from showing up in the headers of my emails.
***************Newbie note: What is all this about headers? It's stuff at thebeginning of an email that may - or may not - tell you a lot aboutwhere it came from and when. To see full headers, in Outlook clickview -> full headers. In Eudora, click the "Blah blah blah" icon.****************
Disclaimer:-
i am not liable for any criminal or bad thing which you have done using this message and document. i am giving here for the educational purpose and care should be taken from your side before using this document and please get a written permission from the person before hacking or doing some thing in the network or system.This document is intended for judicial or educational purposes. I have collected these documents and messages from the internet for educational purpose only. always use these documents for doing good only. I don't want to promote computer crime and I'm not responible of your actions in any way. If you want to hack a computer, do the decent thing and ask for permission first. please read and use this for useful purpose only to protect the systems and information from the bad people. always seek permission from the system owner or who ever responcible for the system by written and then go ahead. Give a full report with honestly to the person or company about your experiments and findings from the system. Always Do Good Think Good and Belive Good.

No comments:

க்ரீன் பீஸ் மசாலா - Green peas Masala

*க்ரீன் பீஸ் மசாலா*     பச்சைப்பட்டாணி - 250 கிராம்     (அல்லது) காய்ந்த பட்டாணி - 150 கிராம்     பெரிய வெங்காயம் - 2     தக்காளி - 2 அல...