Telehack - Exploring New Worlds
Telehack - Exploring New Worlds
Introduction
The year is 1982. Time magazine makes a radical move and replaces the
person of the year with a computer, calling it the Machine of the
year. The internet is still in its infancy and the World Wide Web is
still 10 years away. While the personal computing revolution is just
beginning these computers are stand alone machines that have no
access to the outside world. Inter-connected computers stationed
around the globe reside almost exclusively in universities and
government agencies. These machines are running software which allows
clients to “dial in” via telnet, a network protocol that uses TCP and
FTP to chat, send email, exchange files and, of course, play games.
However, in these early days, security is not of great concern,
because of the limited number of machines and their location.
But as the network expands, new users begin to start exploring beyond
their means, looking for vulnerabilities, exploits, and loopholes.
These “hackers” are constantly on the prowl seeking access to parts
unknown.
Getting Started
Get logged in
Type the command NEWUSER and follow the commands. DO NOT use a
username or password that you use for anything else. Telenet, by
design, is not a secure. Write down your information below so that
you don’t forget. (Trust me, writing it in google in plain text is
more secure than telehack)
➔ USERNAME:___________________
➔ PASSWORD:___________________
IT’S PERSONAL
You’re not just an anonymous bot, you’re a real live person who has
thoughts and feelings. Let everyone know how you’re feeling by
setting your STATUS message. What else do people know about you? Use
the FINGER command (tee-hee-hee. yes, that’s what it’s called) and
see what they’re saying about you.<________________>
It’s great to talk with people you already know, but try striking up
a conversation with someone else on telehack. They’re usually really
nice people.
The Early Days of Hacking pt II
FCS US Comp Sci - Nov 2016
Introduction
Now that you are familiar with telehack it’s time to start going
deeper. When you log in to telehack.com you log into one of thousands
of virtual servers that are all connected together in a web like the
one pictured above. If you were to look at a graph of the internet
today it would look very different.
Where am I?
Start by exploring your NETSTAT (Network Status).
➔ Which servers are you connected to? <____________>
Try using TELNET to log into another server? Can you get it?
A quick aside:
As you move through, don’t forget all of the resources that are out
there. If you get stuck, make sure you OPEN telehack.txt. You could
also ask for HELP on a specific [command].
Running Programs
Telehack comes with some preloaded files and programs. Try looking
through the DIRectory. List the file types on your directory and what
they stand for. The file types are the three letter extension after
the (.) period.
◆ Ext What it stands for
◆ ___ __________________
◆ ___ __________________
◆ ___ __________________
◆ ___ __________________
➔ OPEN some of the files and explore
➔ FNORD is a Pickle without <___________>
➔ FNORD is a the echo of <__________>
➔ What other, more popular, program did the Les Earnest, the
inventor of FINGER command, write? ______________
Starting a QUEST
Type the command QUEST into telehack.com and see what happens
➔ Hack your way to the host _(ENTER HOST NAME HERE)_
➔ Obtain the file _(ENTER FILE NAME HERE)_
Where am I going?
Now that you know where you’re going, how do you get there? The first
thing to do is to UUPLOT a course to your host.
➔ Copy your plot from the terminal window and paste it below. (if
it doesn’t display right reduce the font size and make sure
that the paragraph spacing is set to 1. Or you could take a
screenshot and paste that
➔ <____________________>
+Paste you plot here
Now that we have a map, decide on what hosts you’ll have to hop
through to get to where you’re going. You are on the telehack server.
Lines represent connections between one server and another.
➔ ____________________
➔ ____________________
➔ ____________________
➔ ____________________
➔ ____________________
Try trying to get into your host server through different ports. Did
you get into the target host?
➔ How does a buffer overrun attack work? Hint, you’ll probably
have to look it up
◆ _____________________________
➔ Open Fing your iPad (that program we downloaded earlier) and
find my computer. What ports do I have open? What are those
ports used for?
◆ ___ ______________
◆ ___ ______________
◆ ___ ______________
Once you breached the security you’ll need to TELNET into the <host>
to keep going. You’ll need to work your way all the way over to the
quest host to get your reward.
So you’ve reached your target host and read the file, now what?
First:
➔ What did your message say?
◆ _____________________
Well, if you’ve made it this far, you’re probably a pretty smart and
resilient person. Make sure you read telehack.txt and sysmon.txt
Extra Credit
➔ Unlink your account
➔ Gain root access