Ethical Experts
Ethical Experts
Ethical Experts
Would you like to react to this message? Create an account in a few clicks or log in to continue.
Ethical Experts

A Community Dedicated to Helping and Learning . Here You Will Get Hacking Tutorials and Monetizing Methods . We Hope You Have a Pleasant Stay
 
HomeHome  SearchSearch  Latest imagesLatest images  RegisterRegister  Log in  
Still Currently working on the forum design, until I find a perfect design that can sit there for the whole life :p .. Please Bare with us if you see the design change while / after you refresh a page or return ! Sorry for the Inconvenience ~!
Search
 
 

Display results as :
 
Rechercher Advanced Search
Latest topics
» Hack Pack : Largest Hacking Tools Collection
Telnet Hacking  EmptyTue Apr 28, 2015 9:35 am by THE-OUTSIDER

» Hi everyone!
Telnet Hacking  EmptyFri Nov 07, 2014 11:24 pm by zekrum

» Hacking Email ID's
Telnet Hacking  EmptyThu Sep 25, 2014 7:22 pm by NAVEEN KUMAR . S

» entering in a computer binary
Telnet Hacking  EmptySat Sep 20, 2014 1:29 pm by erosh23

» hi hackers
Telnet Hacking  EmptySat Sep 20, 2014 1:26 pm by erosh23

» Introduce Yourself !
Telnet Hacking  EmptySat Sep 20, 2014 1:23 pm by erosh23

» Hello guys
Telnet Hacking  EmptyWed Jul 30, 2014 10:52 pm by RZero67

» need botnet like zues Betabot or any good botnet files please admin help me
Telnet Hacking  EmptyFri Jul 25, 2014 9:44 pm by sire_roktiv

» Extension Spoofer v0.1 [Beta Release]
Telnet Hacking  EmptyFri Jul 11, 2014 9:33 am by The Joker

Most Viewed Topics
Hack Pack : Largest Hacking Tools Collection
HACK WIFI PASSWORD USING CMD WHEN YOU ARE CONNECTED WITH WIFI
Hack Your BroadBand !! RISK FREE !!
Hacking With Keyloggers Prorat
How to Hack the Windows Admin Password Using OphCrack in Backtrack tutorial
How to Get Unlimited time in an Internet Cafe ... :D
How to Hack Websites & Servers - Tutorial
Cracking a WPA/WPA-2 Password.. ;)
Backtrack and Facebook
Credit Card Generating Sequence
Keywords
LARGEST wifi hack netcat
Facebook Like
Similar topics

     

     Telnet Hacking

    Go down 
    AuthorMessage
    The Joker
    Admin
    Admin
    The Joker


    Posts : 182
    Join date : 2012-06-11
    Age : 33

    Telnet Hacking  Empty
    PostSubject: Telnet Hacking    Telnet Hacking  EmptyWed Aug 15, 2012 7:35 am

    1 - What is Telnet ?

    Most of you only know that telnet is a Port [Port 23] or that telnet is a remote control tool, remote control means in this aspect that you as client can get a connection to for example a telnet server and then you can write commands in a derivate of a shell and these commands are executed only on this server not on your machine, but i want to show all you guys how to use this simple remote control tool in several ways, because this simpleness is brilliant, so hope i answered this question and if you are interested in go on and read if not stop reading and go pissing2 - How To Use Telnet ?

    Telnet is a text based tool, so if you want to connect to the destination [128.62.254.12] write: 'telnet 128.62.254.12 23', so you see at first there is the command telnet to start the telnet client, the next is the destination address and last is the port, you know the telnet port 23, so i hope now you can use telnet3 - How To Send Anonymous Mails ?
    3-1 - SMTP

    Yes first i have to say somehting about the smtp [simple mail transfer protocol], the standard is written down in the rfc 821 [rfc = request for comments] it goes back to the year 1982, this rfc defines the commands which could be used These commands :

    1 - HELO [client adress or name], it marks the begin of that telnet session and sends your name or address to the smtp server

    2 - MAIL FROM [your mail addie], with this command you send your mail addie to server is also written in the e-mail as sender

    3 - RCPT TO [recipient], with this command you define the recipient

    4 - DATA, this marks the begnning of the e-mail if the server sends an ack [ackwoledge] you can begin to write the message

    5 - RSET, reset this establishs the initial stage and the connection is canceled

    6 - NOOP, no operation so it means that nothing is done

    7 - QUIT, this is the ending of the smtp connection

    But this are only the most important commands many commands have been added in this time after the rfc has defined them

    EXPN, expand with this command maillist support will be available
    VRFY, verify this command requests the confirmation of the recipient address
    Caused of this addition them smtp is also called esmtp which means Extended smtp

    3-2 How To Use SMTP To Send Anonymous Mails
    First you have to find a free accessable smtp server, caused by spaming many servers has secured their systems like gmx with [smtp after pop] which means that at first you have to login at pop with your username and password for your gmx e-mail addie, after that the srever saves your ip for a special time in which you can connect to smtp server to send mails, freenet uses another secured system, this smtp server denies special recepient addies, so you have to search a free accessable mail server with out such secured servers, they exists, so after you have found such a server you can write in your shell : [telnet <serveraddy> 25] then your client connects to it, here is a complete telnet session :

    Connected to mail.gmx.net.
    220 {mp015-rz3} GMX Mailservices ESMTP
    HELO www.The-Netrix.net
    250 {mp015-rz3} GMX Mailservices
    MAIL FROM:LinusTorvalds@linux.org
    250 ... Sender Okay
    RCPT TO:BillGates@microsoft.com
    250 ... Recipient Okay
    DATA
    354 Enter mail, end with "." on a line by itself
    Operating Systems are like sex, you have the best if it is free
    .
    250 Mail accepted
    QUIT
    221 mail.gmx.net closing connection
    Connection closed by foreign host.

    First your client trys to connect to the mail server, as sign that the connection is established the server answers with a command like that, then you say hello to the server with the command [HELO] and your machines name, next is another answer from server which is unimportant, after it you send your mail addy to server with the command [MAIL FROM:] followed by your addy, then the server check this addy and if it's ok he will inform you about it, next he expects the recipient and you won't let him wait with the command [RCPT TO:] followed by the addy of the recipient, if it's also ok you can start to write your mail after the command [DATA] which is followed by the ack of the server and the text or character which marks the end of the mail, then you write your mail
    and end it how the server expect it, if the mail is ok the server will inform you for the last time in this session, after it there is no cause which should hold your connection so you will end it with [QUIT] and the server will send a last stupid message as sign that the connection is closed

    4 - How To Use Telnet In Several Aspects
    4-1 - How To Delete Files Of A Website
    There is a way to delete files of a website with the help of the http [hyper text transfer protocol] but this security hole is mostely
    closed, this hole is caused by stupid administrators which can't configure there apache or iis or any other http server

    4-1-1 - HTTP

    The http exists since 1990, before this time the internet was used to make a file exchange with the ftp or to get in mailboxes where you can write messages or many other things, with the http and html [hyper text mark language] the www_clients like netscape or ie can interprete this hyper text to display informations or other things like you know, but what the user can't see when he uses such a client that the http follows also the request_answer_play, the client requests informations with a special command, which i will explain beside others later, and the http server answers with the requested informations, this requests or answers are http messages which could be simple_request or simple_response or full_request or full_response, the simple http_messages based on http/0.9 and the full messages on http/1.0, but the difference between this messages is very small, except the one of html/0.9 and html/1.0

    1 - get [address], the address is the whole like http://www.destination.com/index.html this command requests the informations [the code] in this file and if the file is a cgi it have to be executed and the produced informations will be send to client the difference between this simple_request and the full_request is that the full_request ends with http/1.0 like this : [get http://www.destination.com/index.html http/1.0]

    2 - head [addy], it have to be a complete addy too, the small difference between this command and the get command is that this command only meta_tags and the other informations in the title tag

    3 - post [addy], this is used for bigger data it is mostley used for data which have to be send to a program

    4 - put [addy], with put you send data to the server like html documents and this data is saved under the addy

    5 - delete [addy], this is the opposite of put so it deletes the data which you have specified with the addy

    4-1 - How To Delete Files Of A Website
    With your instinct you have discovered that there is a security hole, the http protocol today is used in combinition with the ftp, so that means ftp is used by webmasters to upload their files and http is used by the client to resolve these site, but in former times concrete, at the development of the http the developers aimed to make it easier to upload files, so not with the ftp and that means without a special ftp-client, so they created a command to upload and delete files on a webserver, but the problem is that the http didn't use an authentication but ftp does, so that means that the most administrators disabled these commands to shut a security hole, but there are not only experienced admins out there but stupid too, so there is still such a hole which waits to be used, how ever telnet is an excellent simple tool, so if you want to use this security hole connect to the destination hostname or ip [you can use a hostname because dns will be used to resolve the ip] on port 80, i have showed you guys how to do it, when the connection is established you can use the commands which are discribed in section 4-1-1
    Back to top Go down
    http://teamiha.tumblr.com
     
    Telnet Hacking
    Back to top 
    Page 1 of 1
     Similar topics
    -
    » Creating a Telnet Trojan for Windows XP

    Permissions in this forum:You cannot reply to topics in this forum
    Ethical Experts :: Hacking Section :: Hacking Tutorials-
    Jump to: