The Elite Hackers Site
rotating skulls and crossbones are awesome
  • Navigation
  • /root
  • Intro/Disclaimer
  • Hacking News
  • Getting Started
  • Hacking Tools
  • MySpace Hacking
  • Hacking Text Files
  • Elite Wallpapers
  • code2600
  • Viruses
  • Hacking Links
  • Link This Site
  • About
  • FAQ
  • Contact
  • Vote!
  • Administration
  • Stats
  • System Info
  • You:
  • Affiliates
  • Add Me On Facebook!

    Follow me on Twitter!

    I am a hacker

    This site made entirely in Notepad

    Click here to Vote for The Elite Hackers Site!


    Valid CSS!

    Hacking Tools

    Remote Hacking with Telnet

    Telnet is a remote hacking tool that was made by Microsoft. Telnet actually lets you remote into machines, or connect to different computers remotely -- WITHOUT physically being at the computer. Hackers do EVERYTHING remote, and for obvious reasons. As a golden rule, hackers NEVER hack directly from their own home/parents' basement. This makes it really easy for the feds to hunt you down.

    Instead, skilled hackers remote into a chain of several computers around the world, making your tracks a lot harder to find. This is called footprinting. Telnet will allow you to log into any computer (provided that it's running Telnet). I recommend running Telnet and having it open on your computer(s).

    Why Telnet?

    There are several reasons to run Telnet. Assuming that you're running Windows XP, here are some of the benefits

    Telnet is the only technology that gives you the power to control machines remotely. And in order to cover your tracks, it is highly recommended that you learn how to use it.

    How to Chain-hack with Telnet

    Chain hacking is a method in which a hacker uses Telnet to connect through a chain of computers and hack a computer/person/server from a different location. It might sound complicated to the average newbie, but it's quite simple. Just follow these steps:

    1. Choose public place with an internet connection, such as a library or coffee shop. Bring your own equipment if possible.
    2. Run telnet (Start > Run > Telnet)
    3. Log into a remote server
    4. Use that server to remote into another server
    5. Repeat steps 2-4 a couple times
    6. Hack your target

    What you're basically doing is using a series of machines as a chain in order to conceal your location/identity. The farther away each server/remote PC is from the other, the better. If you can remote across to a different continent, I would recommend doing so, because that's what I do when I hack big company databases. This method is explained in more detail here.

    A hacker who knows what he's doing in Telnet

    Going Further with Telnet

    While this site provides a lot of information, programs like Sub7, Ping, and Telnet have extensive documentation of their own. If you would like to read up on all of the rich features on Telnet, is your number one resource.