Remote Hacking With Telnet

09/07/2011 18:05

 

Remote Hacking with Telnet

Telnet is a remote hacking tool that was made by Microsoft. Telnet actually lets you remote into machines, or connect to different computers remotely -- WITHOUT physically being at the computer. Hackers do EVERYTHING remote, and for obvious reasons. As a golden rule, hackers NEVER hack directly from their own home/parents' basement. This makes it really easy for the feds to hunt you down.

Instead, skilled hackers remote into a chain of several computers around the world, making your tracks a lot harder to find. This is called footprinting. Telnet will allow you to log into any computer (provided that it's running Telnet). I recommend running Telnet and having it open on your computer(s).

Why Telnet?

There are several reasons to run Telnet. Assuming that you're running Windows XP, here are some of the benefits

  • Small
  • Fast
  • Built right into Windows - easily accessable
  • Widely used
  • Secure
  • Lets you log into computers remotely

Telnet is the only technology that gives you the power to control machines remotely. And in order to cover your tracks, it is highly recommended that you learn how to use it.

How to Chain-hack with Telnet

Chain hacking is a method in which a hacker uses Telnet to connect through a chain of computers and hack a computer/person/server from a different location. It might sound complicated to the average newbie, but it's quite simple. Just follow these steps:

  1. Choose public place with an internet connection, such as a library or coffee shop. Bring your own equipment if possible.
  2. Run telnet (Start > Run > Telnet)
  3. Log into a remote server
  4. Use that server to remote into another server
  5. Repeat steps 2-4 a couple times
  6. Hack your target

What you're basically doing is using a series of machines as a chain in order to conceal your location/identity. The farther away each server/remote PC is from the other, the better. If you can remote across to a different continent, I would recommend doing so, because that's what I do when I hack big company databases. This method is explained in more detail here.

A hacker who knows what he's doing in Telnet