• Welcome to Valhalla Legends Archive.
 

how do you use telnet

Started by programermcgeek, September 10, 2004, 07:24 PM

Previous topic - Next topic

Ersan

Why the hell did you people even dignify this original thread with a response?

Grok

Quote from: Ersan on September 11, 2004, 04:21 PM
Why the hell did you people even dignify this original thread with a response?

We are a computer technically oriented group.  The original question was fair.  Would you have us only entertain questions from people we respected?

muert0

And he's trying to learn. Just seems like he's really young and doesn't know how to look for the answers or sees posting on here as looking for the answers. And he needs to work on his social skills a little.
To lazy for slackware.

Adron

Quote from: Grok on September 11, 2004, 04:53 PM
Quote from: Ersan on September 11, 2004, 04:21 PM
Why the hell did you people even dignify this original thread with a response?

We are a computer technically oriented group.  The original question was fair.  Would you have us only entertain questions from people we respected?

Those we respect and those we haven't seen before. Those we've seen before and don't respect shouldn't be entertained.

iago

http://netcat.sourceforge.net -- netcat is much nicer than telnet.  It's the "swiss army knife of hacking".  In addition to normal telnet functions, it can do listening connections and all sorts of other cool stuff:



Quoteiago@darkside:~$ nc --help
GNU netcat 0.7.1, a rewrite of the famous networking tool.
Basic usages:
connect to somewhere:  nc [options] hostname port [port] ...
listen for inbound:    nc -l -p port [options] [hostname] [port] ...
tunnel to somewhere:   nc -L hostname:port -p port [options]

Mandatory arguments to long options are mandatory for short options too.
Options:
 -c, --close                close connection on EOF from stdin
 -e, --exec=PROGRAM         program to exec after connect
 -g, --gateway=LIST         source-routing hop point, up to 8
 -G, --pointer=NUM          source-routing pointer: 4, 8, 12, ...
 -h, --help                 display this help and exit
 -i, --interval=SECS        delay interval for lines sent, ports scanned
 -l, --listen               listen mode, for inbound connects
 -L, --tunnel=ADDRESS:PORT  forward local port to remote address
 -n, --dont-resolve         numeric-only IP addresses, no DNS
 -o, --output=FILE          output hexdump traffic to FILE (implies -x)
 -p, --local-port=NUM       local port number
 -r, --randomize            randomize local and remote ports
 -s, --source=ADDRESS       local source address (ip or hostname)
 -t, --tcp                  TCP mode (default)
 -T, --telnet               answer using TELNET negotiation
 -u, --udp                  UDP mode
 -v, --verbose              verbose (use twice to be more verbose)
 -V, --version              output version information and exit
 -x, --hexdump              hexdump incoming and outgoing traffic
 -w, --wait=SECS            timeout for connects and final net reads
 -z, --zero                 zero-I/O mode (used for scanning)

Remote port number can also be specified as range.  Example: '1-1024'

Highly recommended!
This'll make an interesting test for broken AV:
QuoteX5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*


muert0

#20
Then there's phlak. http://www.phlak.org/modules/news/
QuotePHLAK is a modular live security Linux distribution. PHLAK comes with two light gui's (fluxbox and XFCE4), many security tools, and a spiral notebook full of security documentation. PHLAK is a derivative of Morphix, created by Alex de Landgraaf.
It's stuffed full of tools and documentation on how to use them.
But be warned if you're going to go screwing around in other people's computers and you don't have permission it is a crime. And if most ISPs find out you are doing anything like that they will cut you off in a heartbeat.
http://www.phlak.org/modules/sections/index.php?op=viewarticle&artid=1

There's also knoppix-std but I think phlak has a little more documentation.
To lazy for slackware.

iago

Quote from: muert0 on September 12, 2004, 01:49 AM
Then there's phlak. http://www.phlak.org/modules/news/
QuotePHLAK is a modular live security Linux distribution. PHLAK comes with two light gui's (fluxbox and XFCE4), many security tools, and a spiral notebook full of security documentation. PHLAK is a derivative of Morphix, created by Alex de Landgraaf.
It's stuffed full of tools and documentation on how to use them.
But be warned if you're going to go screwing around in other people's computers and you don't have permission it is a crime. And if most ISPs find out you are doing anything like that they will cut you off in a heartbeat.
http://www.phlak.org/modules/sections/index.php?op=viewarticle&artid=1

There's also knoppix-std but I think phlak has a little more documentation.

Phlak is l33t.  We have it at work for on-site stuff.
This'll make an interesting test for broken AV:
QuoteX5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*