Success! www.spiderinvest.net - perfermoney adder, bitcoins adder, track2 generator
Download HYIP Script, AutoSurf Script, MLM Script, E-gold Game Script , Gift Card Generator, HYIP Package, E-gold Software, PayPal software, Perfectmoney software, Creditcard Full Info, Payza Hack, Perfect Money Adder Software, Egopay Hack

The Best Store of spider software (this real site), Place Your Order Now !
HYIP Cheat | E-Gold Software | Bank Software | Casino Software | Paypal Software | Egopay Software ( NEW ) | Autosurf Script | Email Software | CC Full Info

PAYMENT ACCEPTED






Date Time
11:55:08 AM Sat
November 18th 2017
21 User Online
IP : 54.162.250.227

OUR CONTACT EMAIL
sy5g0n3@yahoo.com

NEW SOFTWARE LIST
[TRACK2DUMP]
WESTERN UNION TRANSFER
[WUHACKNEW]
MONEYGRAM TRANSFER
[MONEYGRAM 2.7]
POKERSTARS HACK
[PSTOWER 2017]
WU PROFFESIONAL 2.4
[WU PROFFESIONAL 2.4]
GIFT CARD 2.9
[GIFT CARD 2.9]
VALID CC GENERATOR
[VALID CC GENERATOR]
PREPAID GEN 2.2
[ Download PREPAID GEN 2.2 ]
BITCOINS X6 NEW
[ Download BITCOINS.X6 ]
PPSPLOIT.52
[ Download PPSPLOIT.52 ]
WU-SOLUTIONS 8.3
[ Download WU-SOLUTIONS 8.3 ]
BITCOINS HACK 3.0
[ Download BITCOINSHACK.3.0 ]
PM ADDER 9.1
[ Download PM ADDER 9.1 ]
TRACK2SPC
[ Download TRACK2SPC]
EMVCARD GENERATOR
[ Download EMVCARD GENERATOR ]
PAYPAL DATABASE HACK 1.8
[ Download PAYPALDBHACK.18 ]
WIREGLOBAL-41
[ Download WIREGLOBAL-41 ]
WU-TRANSFER.2.0
[ Download WU-TRANSFER.20 ]
WUBUG-LEAKAGE.22 NEW
[ Download WU-LEAKAGE.22 ]
PM-ADDER-FRAPE.2.1
[ Download PMFRAPE21 ]
DIABOLICPOKER
[ Download DIABOLIC ]
TRACK2GENERATOR
[ Download TRACK2GEN ]
BITCOIN GENERATOR
[ Download BITCOIN GENERATOR ]
BITCOIN CRYPTO ADDER
[ Download BITCOIN CRYPTO ADDER ]
PM-FUND-SPLITTER 15
[ Download PM-FUND-SPLITTER ]
NOGIR 3.2.5 ( NEW ROULETE SOFTWARE )
[ Download NOGIR 3.2.5 ]
WUBUG 7.3 New
[ Download WUBUG.7.3 ]
PERFECTMONEY BALANCE GENERATOR 3.4
[ Download PM Generator ]
Perfect Money Adder 1.2 ( New 2017 )
[ Download PM Adder 1.2 ]
Payza Money Adder 9.2 ( New Update 2017 )
[ Download Payza Adder 9.2 ]
Spawn.2.1 New E-Gold Hacking software
[ Download Spawn 2.1 New ]
NEWS INFO
PAYPALSPLOIT 5.2
This New software for exploit paypal, you can use this software to add paypal account ballance with no track and safe ... [CLICK HERE]
Post Date : 2017
NEWS INFO
WU-BUG 2016
western union bug 2016 New version with patch #August 2016, this software for manage wu transfer, create transfer, update transfer, MTCN list ... [CLICK HERE]
Post Date : 2017
ARTICLE & TUTORIAL
BREAKING VISA PIN
HACKING WEBPAGES
TELNET EXPLAINED
CISCO CHEAT SHEET
SuperChange
For an automatic exchange, choose the necessary pair of currencies and press button
0
0

exchange E-Gold, Webmoney

_.-°-.__.-°-.__.-°-.__.-°-.__.-°-.__.-°-.__.-°-.__.-°-.__.-°-.__.-°-.__.-°-.__.-°-.__.-°-._
_.-°-.__.-°-.__.-°-.__.-°-.__.-°-._TELNET EXPLAINED_.-°-.__.-°-.__.-°-.__.-°-.__.-°-._
_.-°-.__.-°-.__.-°-.__.-°-.__.-°-.__.-°-.__.-°-.__.-°-.__.-°-.__.-°-.__.-°-.__.-°-.__.-°-._


Note: I have decided to launch manuals about hacking using telnet in two parts. In the first part I'll explain basics of telnet and working with telnet and in the second part I'll show some advanced methods of hacking through telnet. Further this manual is in its BETA stage and I'll be grateful for suggestions for improvements.

Part 1

Welcome to another hackersclub manual. In here I am going to figure out one the most kewl utility available under the TCP/IP set of protocols. Well I guess you peoples are familiar with TCP/IP protocols. Then also I am gonna tell you the basics of these sets of protocols. Well first of all, protocols means some rules for communication between systems over a network. TCP/IP is the most popular sets of protocols used in our current state for communication over the internet. There are various utilities under TCP/IP, some are command utilities, some are transfer utilities and some are printer utilities..

Command Base Utility : REXEC (Remote Execution) , RSH (Remote Shell) and Telnet


Transfer Utilities : FTP , RCP, TFTP
Printer Utilities : LPR, LPQ


Well all these utilities works according to the TCP/IP and obeying the protocols of TCP/IP (Transmission Control Protocol/Internet Protocol). In this manual I'll lay stress mainly on Telnet, a command base utility available under the TCP/IP set of protocols.

What is telnet?

Basically telnet a.k.a(also know as) terminal emulator is a console based tool which enables an user to use the resources of another system by connection to it using its IP address and a valid shell in the target system. Well in simpler sense telnet also works like Trojans, in client server fashion. Using a telnet client an user connects to the telnet server of a remote system running on a specified port. The default port for telnet is port 23. Well these are all about telnet in the conventional sense of term. Now I think I should tell you more about telnet in hackers sense of term.. Well to start with I must say that telnet is the ultimate tool for hackers. All big big hackers use it in exploiting loopholes in systems.. You can start telnet by going to run and type telnet and press enter. Generally in win 95/98/Me a telnet window will pop up.. but in windows xp, windows 2000 telnet will start within a dos box ie. within console.
To run telnet in console even in win 98/95,Me just copy the coding below save as i_wanna_be_a_hacker.reg and run it..

REGEDIT 4 [HKEY_USERS\S-1-5-21-1229272821-1563985344-1060284298-1003\Software\Microsoft\Telnet]"MODE"="CONSOLE"

Well you can also use that telnet available in win 98 which opens up in a separate window. Click on connect and in the host field enter the target IP. In the terminal type write vt100. Or plain and simple way.. just open DOS box.. and type telnet without <> and the default settings will work as fine as mmmm.. cant find any words to compare.. sorry :(

What can I do with telnet?

Generally hackers aims at connecting to the daemon of a open port of a particular system and tries to get root on that system. First you need a good port scanner to scan down the open ports of a particular system. Then you may connect to an open port using telnet. For example once I port scanned the webserver of a friend of mine who happens to be a great web developer and found that port 25 is open along with SMTP daemon running in it. so using telnet I connected myself to his server on port 25 and using his SMTP service I send a couple of anonymous mails to my friends… mainly to him telling him that I am using his service :))
example:


c:\telnet
Welcome to Microsoft Telnet Client
Escape Character is 'CTRL+]'

Microsoft Telnet>open anisurrahman.net
Connecting to anisurrahman.net....
Connected..

well now what.. now the SMTP service is mine.. I just played around with it… well if you are not used with telnet commands just type HELP after your connected and you will get the list of all the commands supported by the webserver.

Anyway I am going to show how I send a fake mail using simple commands supported by all ESMTP sever (ESMTP = Extended Simple Mail Transfer Protocol)


Here we go :
Telnet>open anisurrahman.net 25
Connecting….
Connected to anisurrahman.net

220 Welcome to anisurrahman.net ESMTP service 8.9.3
HELO Abhisek
220 Welcome to sendmail Abhisek
MAIL FROM:abhisek@fakemail.com
240 Sender set to abhisek@fakemail.com
RCPT TO:me@anisurrahman.net
240 Recipient set to me@anisurrahman.net
DATA
220 End with "."
Subject : Hello Rony
Hey whats up boss… I am sending fake mail using you SMTP service… Don't be angry on me… Sorry..
.
240 CA55910 Message accepted for delivery..


Note: thinking what the values 240 , 220 or CA55910 is..
Don't think much.. the values 240 or 220 are just message code of the server. For example the server will response with 220 for displaying a banner in here.. see all the banners has come up with 220.. the server has denote confirmation with 240 in here… its not much important according to me..
And about CA55910..its the MSGID or Message ID… in the logs of the server this ID denotes the mail that you just send along.

Note: This is my earnest request to each and everybody who reads this manual.. please do not send any fake mail at me@anisurrahman.net and please do not use the service at anisurrahman.net He is a very good friend of mine.. I have learnt many things regarding web designing and web programming from him..

Please note: sometimes you may get Relay Denied error on some server.. well I wont go into much details about this topic cause I guess I don't have enough knowledge about it..

Bingo !! I have send a fake mail !!! I am a hacker !!! yes !!
Well nothing to think like that cause sending fake mails doesn't make you a hacker. Well it has nothing to do with hacking. Fake mails can also easily be traced down and your ISP can be found out easily. Then if the victim sends a mail at abuse@ISP.net and complains about your activity then sorry boy you may lose you ISP account..
Anyway try sending some fake mails to yourself and get used with telnet.

Hey guys [and gals if any] don't get excited and get going to hack with telnet cause things are not that easy as it seems to be. I have made myself in only to the SMTP service of anisurrahman.net I haven't yet got root on it.

Well there are many more games which you can play using telnet. For example you can start a raw session of IRC using telnet.
I guess you all are familiar with IRC(internet relay chat). You may use mIRC, Pirc etc softwares to start an IRC session. But there you don't have to do much as the software will do things for you.
Well I think here I need to explain some basics of IRC and how IRC servers works.

Well for starting an IRC session you need to connect to an IRC server on the port running the IRC daemon. The default ports are 7000,6667 etc. in mIRC when you wish to connect to a server the default port used is 6667.
Type /server irc.dal.net [port] in mIRC window.

Note : in place of port type the port number without []

If you leave it blank then the default port will be taken as 6667.
This command will connect to irc.dal.net server then by typing /join #channelname you can join any channel and start you IRC session.

Tip : To know the IP address or the host name of a person in IRC session is the easiest. Just type /whois in the channel window and you will get his/her IP address (some types this IP is resolved into host name…it depends on the server)

Now I guess your familiar with basic IRC command which you can use in mIRC.

Now lets come to our point..ie. starting a raw IRC session using telnet.
Generally many IRC warfare technique writers or others have written many manuals on starting a raw IRC session using telnet but I think they are not really intended for newbies. In here I am going to explain things in a simple easy to understand way.

When you connect to an IRC server it authenticates you only by your username and host address and asks for a nick. While using mIRC these infos are provided by the software itself as provided by the user. But while connecting to an IRC server in raw mode.. ie. using telnet you need to provide these infos.

Note : Some servers doesn't support raw IRC session as it is quite a bit insecure..

Now to start.. telnet in to an IRC server on port 7000 or 6667

Tip: In raw mode you don't need to give a / before commands as in mIRC.


Telnet>open irc.servername.net 6667


nick

user


please note: don't give the <> sign.. I have used these signs only to distinguish the commands that I have to type in to the terminal.

you are now connected to an IRC server using telnet.. you can use mIRC commands here but without /
to send a private message the command is :

PRIVMSG NICK MESSAGE :


Now I guess you are quite familiar with the workings and usage of telnet.
With telnet you can know surely use the resources of a remote computer provided that you are allowed the access the resources…. If not… then what else but to hack into it.

Brief idea of telnet hacking (basics)

Generally telnet is used to connect to a particular daemon running on a particular port on a target system. Well the very aim of using telnet to connect to the daemons is to get root on the system. But if you are thinking that you'll connect to the SMTP server of your ISP and will get root in your ISP's system then forget it pal. What hackers do is first port scan the target system and find out the open ports and the daemons running the open ports.
Note: you can use nMAP. It is a very fast and so called SYN Stealth port scanner


Breaking VISA PIN Hacking Webpages
Have you ever wonder what would happen if you loose your credit or debit card and someone finds it. Would this person be able to withdraw cash from an ATM ... [CLICK HERE] Well Silver wrote one of the most helpful unix text files in cyberspace, but with the mail that we recieved after the release of our famous 36 page Unix Bible ... [CLICK HERE]
www.spiderinvest.net @ 2007-2017