Instructables
Picture of How to hack Telnet
Here is a guide to learn basic hacking techniques. Telnet is the base of most hacking.

This was titled like this to be entered into the Burning Questions Group. I understand it to mean, "How to hack via Telnet," so that's what this instructable is about.
 
Remove these adsRemove these ads by Signing Up

Step 1: Download Stuff

Picture of Download Stuff
The only thing you will need is a port scanner. nmap is a free and powerful port scanner. You can download it for Windows, Mac OSX, or Linux. If possible make sure you install the GUI with it. It comes with the Windows installer.

Step 2: Using Zenmap (nmap's GUI)

It's pretty simple. Open the program and in the "Target" box, type the ip address of the computer you want to hack.

If you don't know the ip address, go to the computer you want to access (I will assume you have the legal rights to whatever you are trying to access), open a command line and type ipconfig. You can try to hack devices too sometimes. Routers and switches sometimes have telnet. Try scanning these too.

Say you want to scan a range of IP addresses, then you would type the beginning IP address followed by (no spaces) a dash ( - ) and the end of the last IP address. For example, if you wanted to scan 192.168.1.100 to 192.168.1.299 then you would type 192.168.1.100-299 .

In the "Profile" menu of Zenmap, select "Intense scan" if it is not already selected. Click scan and watch as the program scans the computer or device for open ports. Watch the nmap output until you see some words in green. These are the open ports on the computer or device. If port 23 is open, your device is hackable.

Many servers and routers have port 23 open.

If you can't find a device with Telnet enabled, use nethack.alt.org .
1-40 of 185Next »
dan-ball5 years ago
When I try to do the scan, it says "dnet: Failed to open device eth5 QUITTING!" What's going on?
me too
tags.PNG
you have to do "Intense scan, all TCP Ports" for it to work properly.
me too
me too,
has anyone found the reason of this?
adamazing2 years ago
  1. Don't use telnet, download PuTTY, it's much nicer to use and lets you save connections. It'll also let you connect to SSH. Either that, or download Cygwin to get a Linux-like environment within Windows.
  2. DON'T use nmap if you're sitting in a college/school computer lab signed in under your own username. 
  3. DON'T use nmap on its most agressive settings, especially if you are doing it against a network you don't own or have permission to use it on (in the form of a written contract).  
Ignoring 2 and 3 will lead to you getting caught. Fast. As you discovered.

hq5 years ago
If you remember what the massage said tell me please.
Mr.Ownage hq5 years ago
I got it from my school a few weeks ago, that's some serious bullsh*t They said if I dont stop, they'd put me on a list (some sort of black list) and I wouldn't be able to get the programming class next year and I would be banned from any computer lab Frankly, I dont care to be banned, but I gotta take that freaking class if I wanna live later...
wirah Mr.Ownage3 years ago
Oddly enough, my early days of hacking my school's computer network is the exact reason I own a computer consultancy company today.

Problem with schools are they don't encourage the sort of activity which allows you to think for yourself, and would rather you follow a set and closed path which in most cases, leads nowhere.

I'd get some old computers, build yourself a network, and learn about networking that way. Oh, and use Linux, Windows is not build for this sort of work, and will serve only to get in your way.
adamazing wirah2 years ago

Problem with schools are they don't encourage the sort of activity which allows you to think for yourself, and would rather you follow a set and closed path which in most cases, leads nowhere.


That's a little disingenuous isn't it? They don't encourage the sort of activity that slows the network down for everyone else and that if successful would lead to the exposure of confidential, private student/staff data. They would rather people with just enough knowledge to be dangerous did not engage in potentially harmful behaviour on their network.  
  
Mostly, it's probably just annoying them that they have to deal with some idiot kiddy who discovered nmap and has decided to use it on its most agressive settings (WTF?) when they could be...you know...doing the productive parts of their job.
thats why you go in the libary with a laptop, crack their internet, then do it
hq Mr.Ownage5 years ago
So what did the message say?
electronicz2 years ago
Does the nmap port scanner contain a virus??
abran52 years ago
too bad i can't use the ip address of the computer i'm using
redrhinos72 years ago
does polyscript work?
redrhinos72 years ago
where do you download telnet?
hooohooo2 years ago
What is port 23 isn't open but others are? How do you go about hacking something then?
account3r22 years ago
I think I purposely left an open, password protected port on my router...
hm383 years ago
This is a guide to finding a telnet server and connecting to it in the hope that it's not got a username or password set. This is not hacking but it does give people just enough information to get into trouble.

If you go around connecting to random unsecured telnet servers with no idea what you are doing you are not going to gain anything.

The best piece of advice you can give is find your System Admin and tell them they have an open telnet service.
true.
dude this is all great stuff but it left me with some questions.
1 can you hack your way into a server?
2 can you control a pc from another one with telnet?
npm3 years ago
nvm i found out how
npm3 years ago
my computer seems not to have a telnet program built in do you know where is can download a good one.
8s.cschreur3 years ago
You should try to download the software over again. Also, some Devices aren,t hackable via Telnet.
8s.cschreur3 years ago
Thanks! I got it to work fine!
8s.cschreur3 years ago
Cool! Thanks for the info.!
hey man great tutorial, just what ive been looking for. i was just wondering how exactly do i get into the nethack.alt.org? ive gotten to the point where it asks for a login and all that stuff, but how do i get into the actuaall server?
It won't let me enter a password.
if you want to create a batch virus goto aryankhurana.t35.com to take a demo of ultimate virus creator. its a very powerfull tool to create virus.
girrrrrrr25 years ago
i am running this in wine... and when ever i try to start it. where ever there should be words there is a big black mark... any help please?
Why would you use wine to do this? nmap and telnet are originally native UNIX apps and come with any decent LINUX distro....
is ubuntu a decent distro?
yes, open the command line and type telnet (stuff)
revolutin hiroe4 years ago
 hello sir i am abbas i am doing b.E final year my project is network security if you free plz teach me
Many people hate it, many people follow it as if it were a religion. You can download nmap/zenmap from Ubuntu's repositories, or at least Debian's.
Prometheus6 years ago
PS. The WRT54G is the easily hackable Linksys router. Not true for outsiders, if you are smart enough to change permissions and WEP keys. Probably one of the more secure routers you can have unless you have the proper permissions. Hackable internally? yes. Hackable externally? not very easily. An example of my password is "_34ÉñTkG_mXº93_". No matter if you saw it, you'd never be able to enter it properly without months of constant attempts, which I'd eventually be made aware of, but I don't even share it with anyone unless I want them to have it. I'll give you a hint: Those are not underscores in the password, even though they show as such. This instructable is as good for hacking your own equipment as it is for keeping others from doing so. Nice work on the project! A + rating for you.
Actually, in the text you entered on instuctables it is technically underscores..
"Technically", but that is the default display character for "non-display characters". As I said before, you can try this on my router, and it'll just laugh at your attempts. They show as underscores here because the site itself uses them for characters it cannot display, but are still there. Example:

0xFF = _
Shift "-" = _

I entered those both as two different characters, despite the fact that they appear the same. The example you see above in the previous post is exactly as I intended, and was not a flaw or misinterpretation of punctuation or any other. This is how the security works, by using the other 200-or-so characters NOT used for common text, so that even if they can see them, they can't be sure exactly what the real password is.
GZNG Prometheus4 years ago
where do you get the en/decoders from?
I totally know what your saying, I use the same system for my passwords too. But the underscores that are actually on this website are underscores, and not special symbols. They could be 0xFF, or in another text 0x5F. But on instructables, the physical text on the screen is really an underscore. Try copying and pasting it.
1-40 of 185Next »