Picture of How to hack Telnet
Here is a guide to learn basic hacking techniques. Telnet is the base of most hacking.

This was titled like this to be entered into the Burning Questions Group. I understand it to mean, "How to hack via Telnet," so that's what this instructable is about.
Remove these adsRemove these ads by Signing Up

Step 1: Download Stuff

Picture of Download Stuff
The only thing you will need is a port scanner. nmap is a free and powerful port scanner. You can download it for Windows, Mac OSX, or Linux. If possible make sure you install the GUI with it. It comes with the Windows installer.

Step 2: Using Zenmap (nmap's GUI)

Picture of Using Zenmap (nmap's GUI)
It's pretty simple. Open the program and in the "Target" box, type the ip address of the computer you want to hack.

If you don't know the ip address, go to the computer you want to access (I will assume you have the legal rights to whatever you are trying to access), open a command line and type ipconfig. You can try to hack devices too sometimes. Routers and switches sometimes have telnet. Try scanning these too.

Say you want to scan a range of IP addresses, then you would type the beginning IP address followed by (no spaces) a dash ( - ) and the end of the last IP address. For example, if you wanted to scan to then you would type .

In the "Profile" menu of Zenmap, select "Intense scan" if it is not already selected. Click scan and watch as the program scans the computer or device for open ports. Watch the nmap output until you see some words in green. These are the open ports on the computer or device. If port 23 is open, your device is hackable.

Many servers and routers have port 23 open.

If you can't find a device with Telnet enabled, use nethack.alt.org .

Step 3: Make sure that you don't make hacking instructables at school

Picture of Make sure that you don't make hacking instructables at school
I started this instructable in the computer lab of the local community college. I soon got a message saying that what I was doing was considered suspicious activity. I think the port scanner is what did it. I wish I could post a picture of the message, but they blocked internet access to my computer. Oh well, I guess I'll finish this at home.

Step 4: Start the telnet program

Picture of Start the telnet program
Now you can go and download some telnet programs. But whats the point of that? Most operating systems come with telnet built in. For Windows, click Start -> Run (or Windows Key + R) and type telnet in the box. This will open a telnet screen.

Step 5: Start the connection

Picture of Start the connection
In the telnet box type "o TheAddressOfTheComputerYouWantToConnectTo PortNumber"
You will want to use the IP address that you found port 23 open on, or the game, nethack.alt.org.
For example, using nethack.alt.org as our telnet server you would type "o nethack.alt.org 23".

If you don't type a port number, it will assume you mean 23.

Now hit enter to connect.

Step 6: Play with the device you connected to

Picture of Play with the device you connected to
Now here is where it will get slightly more difficult for me to explain. The reason this is, is that every device has its own interface from here. Some will need code, and others will take you though its program, step by step. Nethack is a game that you play.

One of the most easy thing to hack via telnet, is a Cisco router. All Cisco routers have a telnet server built in. To learn the Cisco "language" go to this website.

When connected to a Cisco router you will get something similar to the picture below. Type "enable" and you can use the privileged mode. After entering privileged mode, type "config t" to configure the router.

Step 7: Jumping

Picture of Jumping
The way most hackers use telnet to hack, is to telnet one device away from their computer. They use that device to open a connection to somewhere else. They do this several times in different parts of the world to protect their own identity. They like to target homes that do not know they are running a telnet server. They use those because if they do not keep a log of connections, it will be hard for anyone to track them if legal issues became a problem. Hackers can take down big systems using telnet, but most major companies put up protection against these types of attacks.

Let me remind you that while it is not illegal to use telnet on stuff you own or have permission to, it is very illegal to use telnet to harm systems you do not have permission to. This guide was meant as a tool to hack into your own stuff. Many Linksys routers have telnet in them. People use the telnet as a means of making the power sent to the antennas (wireless routers) stronger. This in turn, makes the signal stronger.

PS. The WRT54G is the easily hackable Linksys router.
1-40 of 180Next »
Mi-technology2 months ago
how can i use.. the telnet control the programs on another computer?
dan-ball6 years ago
When I try to do the scan, it says "dnet: Failed to open device eth5 QUITTING!" What's going on?
me too
you have to do "Intense scan, all TCP Ports" for it to work properly.
me too
me too,
has anyone found the reason of this?
adamazing3 years ago
  1. Don't use telnet, download PuTTY, it's much nicer to use and lets you save connections. It'll also let you connect to SSH. Either that, or download Cygwin to get a Linux-like environment within Windows.
  2. DON'T use nmap if you're sitting in a college/school computer lab signed in under your own username. 
  3. DON'T use nmap on its most agressive settings, especially if you are doing it against a network you don't own or have permission to use it on (in the form of a written contract).  
Ignoring 2 and 3 will lead to you getting caught. Fast. As you discovered.

hq6 years ago
If you remember what the massage said tell me please.
Mr.Ownage hq6 years ago
I got it from my school a few weeks ago, that's some serious bullsh*t They said if I dont stop, they'd put me on a list (some sort of black list) and I wouldn't be able to get the programming class next year and I would be banned from any computer lab Frankly, I dont care to be banned, but I gotta take that freaking class if I wanna live later...
wirah Mr.Ownage4 years ago
Oddly enough, my early days of hacking my school's computer network is the exact reason I own a computer consultancy company today.

Problem with schools are they don't encourage the sort of activity which allows you to think for yourself, and would rather you follow a set and closed path which in most cases, leads nowhere.

I'd get some old computers, build yourself a network, and learn about networking that way. Oh, and use Linux, Windows is not build for this sort of work, and will serve only to get in your way.
adamazing wirah3 years ago

Problem with schools are they don't encourage the sort of activity which allows you to think for yourself, and would rather you follow a set and closed path which in most cases, leads nowhere.

That's a little disingenuous isn't it? They don't encourage the sort of activity that slows the network down for everyone else and that if successful would lead to the exposure of confidential, private student/staff data. They would rather people with just enough knowledge to be dangerous did not engage in potentially harmful behaviour on their network.  
Mostly, it's probably just annoying them that they have to deal with some idiot kiddy who discovered nmap and has decided to use it on its most agressive settings (WTF?) when they could be...you know...doing the productive parts of their job.
thats why you go in the libary with a laptop, crack their internet, then do it
hq Mr.Ownage6 years ago
So what did the message say?
electronicz3 years ago
Does the nmap port scanner contain a virus??
abran53 years ago
too bad i can't use the ip address of the computer i'm using
redrhinos73 years ago
does polyscript work?
redrhinos73 years ago
where do you download telnet?
hooohooo3 years ago
What is port 23 isn't open but others are? How do you go about hacking something then?
account3r23 years ago
I think I purposely left an open, password protected port on my router...
hm383 years ago
This is a guide to finding a telnet server and connecting to it in the hope that it's not got a username or password set. This is not hacking but it does give people just enough information to get into trouble.

If you go around connecting to random unsecured telnet servers with no idea what you are doing you are not going to gain anything.

The best piece of advice you can give is find your System Admin and tell them they have an open telnet service.
dude this is all great stuff but it left me with some questions.
1 can you hack your way into a server?
2 can you control a pc from another one with telnet?
npm4 years ago
nvm i found out how
npm4 years ago
my computer seems not to have a telnet program built in do you know where is can download a good one.
8s.cschreur4 years ago
You should try to download the software over again. Also, some Devices aren,t hackable via Telnet.
8s.cschreur4 years ago
Thanks! I got it to work fine!
8s.cschreur4 years ago
Cool! Thanks for the info.!
hey man great tutorial, just what ive been looking for. i was just wondering how exactly do i get into the nethack.alt.org? ive gotten to the point where it asks for a login and all that stuff, but how do i get into the actuaall server?
It won't let me enter a password.
if you want to create a batch virus goto aryankhurana.t35.com to take a demo of ultimate virus creator. its a very powerfull tool to create virus.
girrrrrrr26 years ago
i am running this in wine... and when ever i try to start it. where ever there should be words there is a big black mark... any help please?
Why would you use wine to do this? nmap and telnet are originally native UNIX apps and come with any decent LINUX distro....
is ubuntu a decent distro?
yes, open the command line and type telnet (stuff)
revolutin hiroe5 years ago
 hello sir i am abbas i am doing b.E final year my project is network security if you free plz teach me
Many people hate it, many people follow it as if it were a religion. You can download nmap/zenmap from Ubuntu's repositories, or at least Debian's.
Prometheus7 years ago
PS. The WRT54G is the easily hackable Linksys router. Not true for outsiders, if you are smart enough to change permissions and WEP keys. Probably one of the more secure routers you can have unless you have the proper permissions. Hackable internally? yes. Hackable externally? not very easily. An example of my password is "_34ÉñTkG_mXº93_". No matter if you saw it, you'd never be able to enter it properly without months of constant attempts, which I'd eventually be made aware of, but I don't even share it with anyone unless I want them to have it. I'll give you a hint: Those are not underscores in the password, even though they show as such. This instructable is as good for hacking your own equipment as it is for keeping others from doing so. Nice work on the project! A + rating for you.
Actually, in the text you entered on instuctables it is technically underscores..
"Technically", but that is the default display character for "non-display characters". As I said before, you can try this on my router, and it'll just laugh at your attempts. They show as underscores here because the site itself uses them for characters it cannot display, but are still there. Example:

0xFF = _
Shift "-" = _

I entered those both as two different characters, despite the fact that they appear the same. The example you see above in the previous post is exactly as I intended, and was not a flaw or misinterpretation of punctuation or any other. This is how the security works, by using the other 200-or-so characters NOT used for common text, so that even if they can see them, they can't be sure exactly what the real password is.
GZNG Prometheus5 years ago
where do you get the en/decoders from?
1-40 of 180Next »