This tutorial shows how to identify a machine and log in using Telnet commands.
Steps
Step 1. Download one of the indispensable tools for a hacker
Before you can enter the world of hacking, you will need to install software on your computer to detect the communication ports open on a specific computer (port-scanner). One of the most powerful free port scanners is nmap. If possible make sure you install the version that uses the graphical interface. It is distributed with an installation program for Windows.
Step 2. Use Zenmap
After downloading nmap, you will need to download the 'Zenmap GUI' as well. Start the Zenmap program, then, in the 'Target' field, enter the IP address of the computer you want to connect to. Tell the program that you want to scan a group of IP addresses, then type the first address followed by the '-' symbol (without quotes and without spaces) and the final IP address. For example, if you want to scan IP addresses between 192.168.1.100 and 192.168.1.299, you will need to use the following syntax '192.168.1.100-299' (without quotes). Select 'Intense scan' from Zenmap's 'Profile' menu. Hit the 'Scan' button and see how the program scans all computers and devices for open communication ports. Look at the report generated by nmap until you see information in green color. They indicate the presence of open ports on the computer being tested. If the open door was 23, it means that the device in question could be violated, obviously if a security password has not been set.
Step 3. Start Telnet
In Windows, go to the 'Start' menu, select the 'Run' item (or use the 'Windows + R' hotkey) and type the command 'telnet' (without quotes) in the 'Open' field. The 'Telnet' window will appear on the screen.
Step 4. In the Telnet window, type the following command 'o [IP address] [Port number]' (without quotes)
Step 5. You will need to use the IP address of the device that has communication port 23 open
If you do not type the port number, by default, the number 23 will be used. Press the 'Enter' key to connect.
Step 6. You are now connected to the device
There is the sacred rule 'look but do not touch' so do not damage or modify anything. If you know the person who owns the computer, you can help them by letting them know that there is a security breach on their device. She will be very grateful to you!
Advice
- There is more than one connection port. For example port 25 (SMTP protocol) is used by the computer to send e-mails.
-
Here are some of the commands related to Microsoft Telnet software:
- o - open hostname [port]: opens a connection to the specified host using the specified port (the default port used by Telnet is 23)
- c - close: close the current connection
- u - unset: use default connection parameters
- d - display: displays the connection parameters on the screen (type of terminal, port, etc.)
- st - status: displays information about the connection status
- set - set: modify the connection parameters
- q - quit: close the Telnet program
- sen - send: send a string to the server
- ? / h - help: displays help information related to telnet commands
- You can also use the command prompt to perform this procedure, using the following command 'telnet [IP address] [port number]' (without quotes).