How to sneak into other people's computers can do easily from telnet ...
Who would not know about talnet can kitashare here,,,,
UNDERSTANDING TELNET
Telnet (Telecommunication Network) is a network protocol that is used in the Internet connection or Local Area Network. TELNET developed in 1969 and standardized as IETF STD 8, one of the first Internet standards. TELNET has several limitations that considered a security risk.
What is Telnet
Telnet is an Internet remote login applications. Telnet is used to login
to other computers on the Internet and access various public services,
including the library catalog and various databases. Telnet
allows the user to sit in front of
a computer connected to the Internet and access other computers that also
connected to the internet. In other words, the connection can happen to other machines
in one room, one campus, even individual computers around the world.
Once connected, the input provided on the keyboard will control
directly to the remote computer before. Will be accessible to any service
provided by the remote machine and the results are displayed on the local terminal.
Can run a normal interactive session (login, command execution), or
accessible to a variety of services such as: seeing the catalog of a
library, access to the text of the USA today, and many more services
provided by each host on the network.
TELNET use 2 programs, which one is the client (telnet) and server
(Telnetd). The
happened is there are two programs running, which is client software that
run on
the computer that requested the services and software that run servers
by computer
resulting in earlier service
The task of the client are:
. Making network connections TCP (Transfer Control Protocol) with the server.
. Receive input from the user
. Reformatting back input from the user and then change the format
standard and sent to the server.
. Receiving the output from the server in a standard format.
. Changing the output format was to be displayed on the screen.
- Inform the network software that the computer was ready to accept
connection.
- Waiting for a request in the form of a standard format.
- Carry out the request.
- Send back the results to the client in the form of a standard format.
- Waiting for next request ..
Telnet uses the connection to the Destination Port = 23. For the interaction of many
machine then dpat diganbarkan as follows:
Telnet is a program that lets you become an Internet host computers
terminal from the other host computers on the Internet. With ftp you can open
only connection to transfer files. Telnet allows you to log in
as a user on the computer distance
far and run programs Internet services provided by computer
them. Telnet provides direct access to various services on the Internet.
The host computer you are providing various services, but if the service
does not exist, you
can use it via Telnet. For example, when the public Internet
write interface to help other users, Telnet allows you
their host access and use the interface they make. Thus
also when one makes a useful service, Telnet allows
you access the resources of this valuable information.
How to use Telnet
How to use Telnet is very easy, you type telnet followed by
address you want to call when using a UNIX or click the Telnet icon
in Windows and then select the connect menu and then the remote system.
Example:
1. Using UNIX
% Telnet well.sf.ca.us
Trying 198.93.4.0 ...
Connected to well.sf.ca.us.
Escape character is'^]'.
Unix (r) System V Release 4.0 (well)
This is the WELL
Type newuser to sign up.
Type trouble if you are having trouble logging in..
Type the guest to learn about the WELL.
If you already have a WELL account, type your username.
Login: |
If it means you've been connected to the computer terminal in the distance
far and could interact with the programs available. Telnet
quietly behind the screen when you interact with
The remote computer. In most cases, the necessary command
known is the command used on the remote host. Host
the possibility of running Unix, although you can also find the system
other operations on the host server such as UMS or Windows NT. Most
systems, particularly databases, offers a menu. If the menu is not available,
then better observe auxiliary files (help) is available. Can be typed?
or help or simply h to observe whether the help files available. For
end the Telnet session type quit or exit, on some systems
use the bye or off. When using Windows depending on the program
used eg WinTel, live click on the Icon program concerned
Another example (with putty)
can use putty to telnet client that you can download at
download.com
and Yara easy use
1. live run putty
2. input host server address
3. select the default telnet to port 32
4. and click open
5. then you will see a black page with a cursor and menu
reading log:
6. Please login and you will go to the host at destination
Another example (command windows)
for example putty in windows command is also quite easy
1. go to command window (select Start -> Run -> typed cmd
then enter)
2. in command window typing c: \ telnet host_tujuan then enter,
For example "c: \ telnet 192.168.0.1"
3. then there is the inscription: Welcome to Microsoft Telnet Client
Escape Character is 'CTRL +]'
You are about to send your password information to a remote computer
ins Internet
zone. Might this not be safe. Do You Want to send anyway (y / n):
4. select only "n" and press enter
5. after that will show the login menu "Login to your acount"
6. completed
hopefully useful
28 October, 2010
How to infiltrate the computers of others
Posted by Zo0o on 2:56 PM
0 komentar:
Post a Comment