raisujan.com.np-Technology All in One.
fb

Latest Updates
Telnet command
Updated: Thursday 4th September 2014

Photo

Telnet The Secret Exposed...

 For years, people and myself, have offend tried to" work telnet unto a coma".. With no success, for the past few years, I have gathered data, and finally know the system, its faults, capabilities, and errors. This really should be in a text file, but, I wish this information to be reserved for the few users on this system.  Before I start, here are a few basic commands to get familiar with:

 Execution          syntax of command             function ----------------------------------------------

 Connect            c (sp)                        Connects to a host (opt)

 Status             stat                          Displays network port add

 Full-Duplex        full                          network echo

 Half-Duplex        half                          Terminal echo

 Mail  or Telemail           mail    telemail              telemail

 Set Parmaters      set (sp) 2:0,3:2              Select Pad Parameters

 Read Paramaters    par?        par?(sp)2:0,3:2   display pad

 Set and read Paramaters         set?(sp)2:0,3:2

 Escape                                         escape from data modew

 File Trasnfer      dtape                         Prepares network for bulk

 Continue           cont

 Disconnect         bye   or    d     

 Hang up            hangup

 Terminal          term(sp)d1                    Set TERM

 Test    test(sp)char    test(sp)echo                  test(sp)triangle

 This is the end of the commands,   view next msg for useage:

 Trap and pipe x.25 prot. (telenet)...

 Please note this is a very difficult transaction... The following flow chart, will only work on a machine with atleast 10 Mhz.. However, an account on a unix, with cu capabilities will also work.. Package networking, is exactly what it means… before, i go into detail, let me give you and over view...

 ------------    Host ------------           !           !           !           !           ----------------              telnet, remote       $      diverter, and              package.           -----------------                             !                             !                   --------------------                   !      !    !       !                   !      !    !       !                   u      u    u       u                   s      s    s       s                   e      e    e       e                   r      r    r       r                   s      s    s       s

 

Your first step is to find out what commands you can run in DOS. If you type

"help" at the DOS prompt, it gives you a long list of commands. However, this

list leaves out all the commands hackers love to use. Here are some of those

left out hacker commands.

TCP/IP commands:

telnet, netstat, nslookup, tracert, ping, ftp

NetBIOS commands (just some examples):

Nbtstat, net use, net view, net localgroup

TCP/IP stands for transmission control protocol/Internet protocol. As you can guess by the name, TCP/IP is the protocol under which the Internet runs. Along with user datagram protocol (UDP). So when you are connected to the Internet, you can try these commands against other Internet computers. Most local area

Networks also use TCP/IP.

NetBIOS (Net Basic Input/Output System) protocol is another way to communicate between computers. This is often used by Windows computers, and by Unix/Linux type computers running Samba. You can often use NetBIOS commands over the Internet (being carried inside of, so to speak, TCP/IP). In many cases, however, NetBIOS commands will be blocked by firewalls. Also, not many Internet computers run NetBIOS because it is so easy to break in using them. I will cover NetBIOS commands in the next article to XP Hacking.

The queen of hacker commands is telnet. To get Windows help for telnet, in the cmd.exe window give the command:

C:>telnet /? Here's what you will get:

telnet [-a][-e escape char][-f log file][-l user][-t term][host [port]]

-a Attempt automatic logon. Same as --l option except uses the currently logged on user's name.

-e Escape character to enter telnet cclient prompt.

-f File name for client side logging

-l Specifies the user name to log in with on the remote system. Requires that

the remote system support the TELNET ENVIRON option.

-t Specifies terminal type. Supportedd term types are vt100, vt52, ansi and vtnt only.

However you have to install a telnet server before anyone can telnet into port 23 on your computer.

Help +OK help list follows

USER user, PASS password, STAT, LIST [message], RETR message, DELE message, NOOP, RSET, QUIT, APOP user md5, TOP message lines, UIDL [message], HELP

C: >nslookup

Default Server: DNS1.wurld.net

Address: 206.61.52.11

> set q=mx

> dimensional.com

Server: DNS1.wurld.net

Address: 206.61.52.11

C: >nslookup

Default Server: DNS1.wurld.net

Address: 206.61.52.11

Now give the command:

> server 207.217.126.41

Default Server: ns1.earthlink.net

Address: 207.217.126.41

Next command should be:

> set q=mx

> earthlink.net

Server: ns1.earthlink.net

Address: 207.217.126.41

earthlink.net MX preference = 5, mail exchanger = mx04.earthlink.net

C:>nc -L -p 5000 -t -e cmd.exe

You can specify a different port number than 5000. Just make sure it doesn't conflict with another port by checking with the netstat command. Then you and your friends, enemies and random losers can either telnet in or netcat in with the command: C:>nc -v [ipaddress of target] [port]

Of course, you will probably get hacked for setting up this port. However, if you set up a sniffer to keep track of the action, you can turn this scary back door into a fascinating honeypot. For example, you could run it on port 23 and watch all the hackers who attack with telnet hoping to log in. With some programming, you could even fake a unix-like login sequence and play some tricks on your attackers.