Telnet is not a hacking tool, Telnet is actually a command\service (you name it) for connection over the TCP.
Telnet is a remote connection by shell. The Telnet port is 23, but port 992 is the official one btw.
But wait…if we’re saying that Telnet is not a hacking tool, so why do we need this tutorial in here?
The answer is: We’ve added this tool to the RTFM list, because we’re using this tool to access to our target.
When we hacked into our target for the first time, we’ve created an Admin user, and we’re enabled the services through windows command line , for the next access.
So now, we do not need to hack again for access to our target, telnet is open, now, we can access none-stop.
Hiii…pppsssttt, we’ve a secret, there is a way to enable Window Telnet server by one command 😀
[LETS MAKE IT WORK]
#1) Open terminal & type:
assault@kalivm:~$ sudo telnet 192.168.50.7
*You will get this output*
*As you can see, we longed into our target by Admin user and the password. But, you can create an Admin user, and add this new Admin user into the Telnet group policy just for case*
#2) inside telnet type:
*Now we can access everywhere*
*In Windows OS, the Telnet features look like this – You can open this window by: Start > run > appwiz.cpl*
*The Windows control panel will popup, and at the left side there is: Turn Windows features on or off*
Here is an example by Gamer Forever