0% found this document useful (0 votes)
191 views4 pages

Telehack - Lab1 - SPTI

This document provides an introduction to hacking in the early days of the internet during the 1980s. It describes how the internet was still in its infancy, with the World Wide Web still 10 years away. Computers at the time were standalone machines with no access to the outside world. Interconnected computers were located mostly at universities and government agencies. These early networks had limited security due to the small number of machines and their locations. However, as networks expanded, some new users began exploring systems to find vulnerabilities and access restricted areas, known as "hackers". The document prompts the reader to explore this early internet world through commands on an online terminal called Telehack.

Uploaded by

juan caceres
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
191 views4 pages

Telehack - Lab1 - SPTI

This document provides an introduction to hacking in the early days of the internet during the 1980s. It describes how the internet was still in its infancy, with the World Wide Web still 10 years away. Computers at the time were standalone machines with no access to the outside world. Interconnected computers were located mostly at universities and government agencies. These early networks had limited security due to the small number of machines and their locations. However, as networks expanded, some new users began exploring systems to find vulnerabilities and access restricted areas, known as "hackers". The document prompts the reader to explore this early internet world through commands on an online terminal called Telehack.

Uploaded by

juan caceres
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

The Early Days of Hacking

SPTI – Escuela de Ingenieros – 03/09/2021


Name: Juan Sebastian Caceres Leon

.=.,
;c =\
__| _/
.'-'-._/-'-._
/.. ____ \
/' _ [<_->] ) \
( / \--\_>/-/'._ )
\-;_/\__;__/ _/ _/
'._}|==o==\{_\/
/ /-._.--\ \_
// / /| \ \ \
/ | | | \; | \ \
/ / | :/ \: \ \_\
/ | /.'| /: | \ \
| | |--| . |--| \_\
/ _/ \ | : | /___--._) \
|_(---'-| >-'-| | '-'
/_/ \_\

Introduction
The year is 1982. Time magazine makes a radical move and replaces the
person of the year with a computer, calling it the Machine of the
year. The internet is still in its infancy and the World Wide Web is
still 10 years away. While the personal computing revolution is just
beginning these computers are stand alone machines that have no access
to the outside world. Inter-connected computers stationed around the
globe reside almost exclusively in universities and government
agencies. These machines are running software which allows clients to
“dial in” via telnet, a network protocol that uses TCP and FTP to
chat, send email, exchange files and, of course, play games. However,
in these early days, security is not of great concern, because of the
limited number of machines and their location.

But as the network expands, new users begin to start exploring beyond
their means, looking for vulnerabilities, exploits, and loopholes.
These “hackers” are constantly on the prowl seeking access to parts
unknown.
Your task is to explore the world of 1980’s internet by following clues, researching esoterica, and
bringing light to the darkness. Along your journey you will be asked to complete certain tasks.
Tasks are preceded with an arrow ➔
 Wherever you see _________________ you must fill in the blank
with an answer of your own
 Whenever you see <________________> you must fill in the blank by
copying the output from the terminal.
 COMMANDS that can be entered into the terminal will be bold and
in all caps

Before we begin, please define the following:


 Telnet _Es un protocolo de red TCP/IP que es utilizado desde 1960
para establecer conexiones remotas con otros ordenadores,
servidores y dispositivos con un sistema compatible en el acceso
mediante este sistema de comunicación. _______________
 TCP _(Protocolo de control de transmision) es protocolo de red
importante que permite que dos anfitriones(hosts) se conecten e
intercambien flujo de datos. _______________
 FTP _Es una herramienta muy util para mover informacion desde la
computadora en la que trabajas al servidor donde se aloja un
sitio web._______________
 CLI _Es un tipo de interfaz de usuario de computadora que permite
a los usuarios dar instrucciones a algún programa informatico o
al sistema operativo por medio de una línea de texto
simple_______________

Define: (Click Link for examples) A definition includes.


 Expansion of all Acronyms.
 The class of object or concept to which the term belongs.
 The differentiating characteristics that distinguish it from all
others of its class

Getting Started

WELCOME TO TELEHACK - MAY THE COMMAND LINE NEVER DIE


Point your browser to telehack.com. You are greeted by green on black
command line screen welcoming you TELEHACK and providing you with a
list of commands. Try a few by typing in the name of the command and
then “enter.” If you need to stop a program from running type ctrl-c.
To pull up the list of commands type ? and then return.
 What’s the WEATHER like? <weather
44f clouds
scattered clouds
humidity: 41%
wind: 4.1 mph 280 degrees (W)
sunset in 3h>
 Where is the GEOIP of 83.156.25.39? < Soissons, France >
 What does the COWSAY?
< Hola mundo >
------------
\ ^__^
\ (oo)\_______
(__)\ )\/\
||----w |
|| ||
_______________>

Get logged in
Type the command NEWUSER and follow the commands. DO NOT use a
username or password that you use for anything else. Telenet, by
design, is not a secure. Write down your information below so that you
don’t forget. (Trust me, writing it in google in plain text is more
secure than telehack. Use the prefix esc.
Example:esc_james
 USERNAME:_ecisebas_________________
 PASSWORD:_Hola 123__________________

YOU’VE GOT MAIL


As soon as you’re logged in, you’ll receive the message “You have
mail.”
 Read your MAIL
◆ Where can you go for help?
 _help___________________
 _help telnet________________
 _?____________________
 QUIT the mail program
In general, if you get stuck you can type ? to list available
commands.

+priv POSTMASTER - Congratulations, you just got a POSTMASTER


badge. More coming.
 Read the TELEHACK.TXT file.
◆ What are the steps to enable telnet in Windows 7?
 _Start _________________
 _Control Panel _________________
 Programs And Features _________________
 _Turn Windows features on or off_______
 _Check Telnet Client _________________
 _Hit OK _________________

IT’S PERSONAL
You’re not just an anonymous bot, you’re a real live person who has
thoughts and feelings. Let everyone know how you’re feeling by setting
your STATUS message. What else do people know about you? Use the
FINGER command (tee-hee-hee. yes, that’s what it’s called) and see
what they’re saying about you.< Status set to "Vive feliz!"_>

GET OUT THERE AND MAKE FRIENDS


From the beginning, the internet has been used to help speed up
communication. Telehack is no exception. SEND one of your classmates a
message. Not sure what USERS are online? I bet Telehack knows if you
ask politely.

Tired of having your commands constantly interrupted by messages from


others. Why not just TALK to them instead?

 No one home? Need to leave a message? SEND me MAIL. I’ll make


sure to check it and respond ASAP

esc9crhys: que mas prro

It’s great to talk with people you already know, but try striking up a
conversation with someone else on Telehack. They’re usually really
nice people.

You might also like