Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

Remote Hacking with Telnet

Name: Anonymous 2008-12-29 5:07



Telnet is a remote hacking tool that was made by Microsoft. Telnet actually lets you remote into machines, or connect to different computers remotely -- WITHOUT physically being at the computer. Hackers do EVERYTHING remote, and for obvious reasons. As a golden rule, hackers NEVER hack directly from their own home/parents' basement. This makes it really easy for the feds to hunt you down.

Instead, skilled hackers remote into a chain of several computers around the world, making your tracks a lot harder to find. This is called footprinting. Telnet will allow you to log into any computer (provided that it's running Telnet). I recommend running Telnet and having it open on your computer(s).

Name: Anonymous 2008-12-29 5:32

>made by Microsoft.
Just you keep on thinking that

Name: Anonymous 2008-12-29 6:21

>>2
underage b&

Name: Anonymous 2008-12-29 6:45

There are several reasons to run Telnet. Assuming that you're running Windows XP, here are some of the benefits

    * Small
    * Fast
    * Built right into Windows - easily accessable
    * Widely used
    * Secure
    * Lets you log into computers remotely

Telnet is the only technology that gives you the power to control machines remotely. And in order to cover your tracks, it is highly recommended that you learn how to use it.

Name: Anonymous 2008-12-29 6:47

I don't know if I should laugh or cry at this thread.

Name: Anonymous 2008-12-29 7:18

IP (Internet Protocols)

IP stands for Internet Protocols. An IP address is the address for servers and a person's computer who is connected to the internet. Everyone on the internet has an IP address, and once you find out what it is, you know exactly where they are, and you can begin to hack them.

Internet Protocols Addresses are usually made up of random numbers seperated by dots. Every IP address is unique, no one can have the same one. This is why it is very important that you're careful when typing, you do NOT want to accidentally hack the wrong person/network.
Examples:

    * 66.17.44.186
    * 81.73.50.42
    * 192.168.1.1
    * 127.0.0.1
    * 84.10.1.5982
    * 17.44.186
    * 816.83.337.04

Obtaining a target's IP is address is the first step to prepare for an attack. Explained below are methods of obtaining a victim's IP address.

Name: Anonymous 2008-12-29 7:19

Ping

Ping is a tool used to endlessly make requests to a server or another person. It works with both IP address or domain names. Domain names are the addresses that you type in to go to a website. Domain names are easier to remember, which is why the internet was invented.

Either way, by pinging a site, you can easily over-load it with requests, and at the same time obtain the IP. Ping is supported even in Microsoft DOS.

Name: Anonymous 2008-12-29 7:25

Sub7

If you haven't heard of Sub7, I suggest you leave now, find out what it is, then come back. Stop wasting my time. If you think you have the skilled mind for it, stick around, and I will introduce you to one of the many essential tools hackers have ready at all times.
Origin

Sub7 was invented in the late 1980's by a legend known as Mobman. Mobman wanted to make the basic tasks of a hacker easily accessable and easy to implement. I'm not sure what exactly he programmed it in, but it was probably something extremely difficult and involved, like Visual Basic or A+. I read up on Mobman, no one knows of his whereabouts and some even claim that he is dead (real hackers know better). Either way, we can all thank Mobman for this great program.
What it is

Sub7 is a R.A.T (Remote Administration Tool) that basically has two parts: a client, and a server. After you have the server installed on another machine, or trick another person into installing the server on their machine, you can use the client to connect to them through network protocols and routes. After you're connected to them, the client provides you with a series of hacking tools and features to use on your victim. Which, obviously, is the goal of any hacker.

Sub7 has made this easy, but the only hard part is having the server installed on the other machine. You can see the official Sub7 website for tactics on how to accomplish this.

Name: Anonymous 2008-12-29 7:29

Features

Sub7 is well-known for it's wide selection of elite tools and features. Listed below are just a few that come to mind:

    * Keylogger
    * Uploader
    * Server
    * Customized skins
    * Hide cursor
    * Client
    * CDROM close/open
    * Hide cursor
    * IP Pinging
    * Name lookup/revolution
    * Change the appearance of icon

Availability

Sub7 was banned by the United Nations in 1995, but I consulted my many underground resources and found it for you. The last version that was made was Sub7 Legends, and is available for download here. This file is extremely rare, and was very hard to find. I had to download it through KaZaA.

Name: Anonymous 2008-12-29 8:15

sage

Name: Anonymous 2008-12-29 8:33

HMA MA Anus

Name: Anonymous 2008-12-29 9:06

Oh, so you want to track down members of MY chat room?
209.62.62.138
If you win, I'll drop dox on these folks.
If you lose, however, you leave /prog/ forever.
Hack me, you pussy.
Your friends are invited as well, I will be waiting.
proggit, pm me. You know who I am.

Name: Anonymous 2008-12-29 9:58

Secret Guide to Myspace Hacking
http://www.elite-hackers.com/?p=myspace

Name: Anonymous 2008-12-29 11:03

This is for ita-fags.
Did you know about the mighty Kalidor guide?

Name: Anonymous 2008-12-29 11:04

>>14
Rtf only, but it rocks.

it.geocities.com/buggya78/Kalidor.rtf

Name: Anonymous 2008-12-29 11:22

ti hackero`!

Name: Oh dear 2008-12-29 19:56

* 816.83.337.04

Name: Anonymous 2008-12-30 3:24

notepad is a hacker's tool that is used for writing illegal viruses. the hacker uses it by typing in computer code & saving it as a txt file. the hacker then converts the file to an exe file (executable file -> a type of virus file) using a compiler (compiler -> a mixture of the two words "computer" & "killer") and uploads it to his internet. the virus then spreads by looking for vulnerable computers with open ports (ports -> secret back doors that are installed by hackers in computers) & infecting them via the TCP/IP Internet Protocol (-> a common internet protocol used by hackers & internet pirates).

Name: Anonymous 2008-12-30 3:28

>>17
* 17.44.186

Name: Anonymous 2008-12-30 4:02

Either way, by pinging a site, you can easily over-load it with requests, and at the same time obtain the IP. Ping is supported in Microsoft DOS, as shown below:

As you see, the hacker here is using Windows XP (a good choice), and in order to get the IP of mediacollege.com, the only thing he had to do was open up a DOS prompt and type in ping mediacollege.com. Upon doing so, mediacollege.com was instantly hit with 4 requests which distracted their server long enough in order for Ping to steal the IP address.
------------------------------------------------------

I feel this has to be quoted for emphasis

Upon doing so, mediacollege.com was instantly hit with 4 requests which distracted their server long enough in order for Ping to steal the IP address.

Name: Anonymous 2008-12-30 6:02

http://www.elite-hackers.com/?p=faq
A: People who met me online know that I'm a Linkin Park fanatic. While this has nothing to do with hacking, Linkin Park is the only band that I can relate with, and their music is the only thing that can help me cope with my self-angst. Their superior music abilities with their singing and lyrics just make the perfect band for me.
Oh man, not only is this a great website and he knows everything about hacking, I can totally relate to him too! What a great resource, thanks!

Name: Anonymous 2008-12-30 10:04

WHEN I WAS
A YOUNG HAX0R

Name: Anonymous 2008-12-30 10:10

I wrote an ANSI C compiler when i was 6

Name: Anonymous 2008-12-30 13:55

MY COMPUTER
TOOK ME DOWN TO THE ANSI
TO COMPILE C!

Name: Anonymous 2008-12-31 12:00

>>21
That FAQ pretty much shows the entire site is a huge joke, but it's really awesome.

Name: Anonymous 2008-12-31 12:00

>>21
That FAQ pretty much shows the entire site is a huge joke, but it's really awesome.

Name: Anonymous 2008-12-31 12:01

>>21
That FAQ pretty much shows the entire site is a huge joke, but it's really awesome.

Name: Anonymous 2008-12-31 12:25

>>21
That site is obviously a huge practical joke, but it's still really awesome.

Name: Anonymous 2009-03-06 7:59


Something of it slow   at the moment   none 13 Your   greatest accomplishment Having?

Name: Anonymous 2009-03-06 12:11

The programming sections everything was wrote by   me Everything is   an object yet.

Name: Anonymous 2013-01-19 0:16

/prog/ will be spammed continuously until further notice. we apologize for any inconvenience this may cause.

Name: Anonymous 2013-01-19 3:04

>>1 Bullshit.

>BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos

...

>Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone.

Name: Anonymous 2013-01-19 8:31

hork hork

Name: Anonymous 2013-01-19 11:38


Don't change these.
Name: Email:
Entire Thread Thread List