Tried to create an account, but newuser function was disabled?
Is this permanent?
Please Help Me
I cant get passed this human verification test i have been trying for an hour any help will be very appreciated 🙂
My Telehack account has just been deleted by u/forbin. Over an year of hard work going after badges gone to the trash in a matter of seconds. All the friends I've made along the way, gone. No one ever told me the reason why my account was deleted. Maybe it's because I said "PootHub – the place where I like to doot". Honestly, I don't see why this simple joke has angered him. I wasn't saying anything explicit. I never disrespected anyone that didn't disrespect me first (fuck you, wumpus). Way worse things have been said at relay by the operators. It was just a pun using Telehack jargons. This comment didn't come out of nowhere. Yes, I behave different. Yes, I have a different sense of humor. I have Asperger's syndrome. I've taking antidepressants for the last 9 years. I can't laugh too hard without hiccuping because I have tried to choke myself when I was 17 and this has caused a permanent minor damage to my throat). Talking shit on relay was doing so good to my mental health (you're not alone in this, u/AnomalyCat). Interacting with new and old people. But the boss doesn't care about that. Apparently all he cared about was this single sentence.
I'd like to thank these people for bearing with me and making my journey in this planet a little less painful (in alphabetical order):
u/Devon: for teaching me cool tech concepts and answering (almost) all my feature requests, bug and vulnerability reports
u/EgRoJ: for giving me hints on getting some of most difficult badges
u/GunpointG: for teaching me how to use a lot of tools when I really got into Telehack last year
u/Haxsys: for the crazy stories on relay
u/ihaveroot: for being a fellow offensive security enthusiast and laughing at (almost all) my jokes
pete: for being a fellow musician
u/QuantX: for helping me getting an extremely difficult badge and always being nice to me on relay
u/Searinox: for always sharing with me his BASIC scripts and being a fellow musician. I have learned a lot from reading his scripts
Root refers to the “root” account on Unix and Linux systems. It comes from the idea of directory “trees”, the root
being the most basic level of the tree from which all other branches grow. A root user would have access to everything.
“Getting root” on a system refers to the act of getting admin access.
Rootkits exist in real life, and often do more than just give the user root access. Many involve infesting malware into the system files. Real rootkits are srs bsns. (Actually, they are.)
Root in Telehack
In Telehack, having a root account on a host will allow you to run certain commands not accessible to regular users. It’s important to note that only one user can have root access on a host. To access these special commands you use one of the following commands:
|su||Elevates the user to a root shell allowing direct access to root commands|
|sudo [command]||Allows execution of a root command from a user shell|
Claiming root on a system where no user currently has root is a fairly simple two step process.
- Run the oskit corresponding to the desired host’s operating system
- Run rootkit.exe
If you are unable to run either the oskit or the rootkit that means someone else currently has root on that host.
Stealing Root from Someone Else
There are currently programs that can be used to steal root on Telehack.
|pdebug.exe||Crashes a process running on the host|
|killproc.exe||Requires root. Kills a process on a remote host in listed in the netstat|
Use either of these programs to kill the oskit and rootkit running on the target host. Then simply follow the instructions listed above.
In order to get root a user must kill your oskit and then your rootkit on a host then run their own oskit and rootkit. To avoid this several programs have been provided to make accessing a host more difficult.
|portblock.exe||Blocks porthack attacks on a host|
|ghostports.exe||Increases the difficulty of a porthack attack on a host|
Additionally, you can actively prevent a user from stealing your root by forcefully disconnecting them via killing their shell. This can be accomplished by doing the following:
For instance, when your PC connected to this Wiki over the web, it was using the HTTP protocol, which normally operates over port 80. Had port 80 been closed on the Wikia server, the page would not load.
The danger of open ports is that some services are vulnerable to exploits. In the real world, hackers use port scanners to check for open ports, and then separate tools to take advantage of possible vulnerabilities on those open ports. And that is what porthack emulates, but all in one simple tool.
The result of running porthack is that it gives you an official login account on the remote server — though it does not give you root.
To run porthack against a server, you must have login access on a server adjacent to it. You cannot be logged in as a guest.
Also, porthack.exe must be on the host.
Use netstat to see which servers are adjacent. If you already have login access, the remote server will have an asterisk (*) next to it. Pick a host without an asterisk, and make a note of the hostname.
Type “run porthack”.
You will be asked if you wish to continue. Say “y”.
You will run into the captcha, which will display a number. Type the number. If not, go to the next step.
Enter the hostname you wish to get access to.
Porthack will now probe for open sockets, and offer a list of open ports. Sometimes there are as few as one, sometimes as many as six or seven. Now try one of the ports by entering it in.
Porthack uses the same type of exploit on every remote server: The buffer overrun. This is a common type of real exploit, which is kind of awesome so you should go read about it.
You may get an error, and that’s fine. It means there were no exploits found for that port. When it succeeds, porthack will install a TSR Loopjacker, essentially creating a login on that system for you. You can now log in using rlogin or telnet.
Here you can see screenshots about the porthack application in it’s earlier forms:
alright so first off your gonna need Cheat engine for this, so if u dont have it then u can download it from www.cheatengine.org
ok so once u have CE ur gotta start up the 12sky game and login to your char. Alright now open up CE and attch it to the process 12Sky.exe. now that u have done that click on the memory view button that should be just below the address/value search result window and a new screen should show up called memory viewer, on the bottom half of this screen you should see alot of numbers and letters coloured green, now right click anywhere in this area and select search memory from the pop up window, now all you have to do is search for your exact password and it should take you to the region in wich it is stored as an example if your password was = Password12 then u should see something like this:
50 61 73 73 77 6F 72 64 31 32 00 00 00 00 00 00 Password12
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 o V
00 00 00 00 F0 0D 56 01 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 @
well now all u have to do is change the 00 3 slots down from the 50 into 01 so it should now look like this:
50 61 73 73 77 6F 72 64 31 32 00 00 00 00 00 00 Password12
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 o V
00 00 00 00 F0 0D 56 01 00 00 00 00 00 00 00 00
01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 @
and thats it once u go back into the game u should notice the difference. and also if u want to move to a different zone then type /movezone # into the chat window just make sure to use it in whisper just in case u misspell.
oh and one other thing, beware that You could get a permanent ban for using the telehack so use it at your own risk
We present you the TeleHacker – application for mobile and desktop devices developed to monitor Telegram messaging app chats remotely & anonymously.
Having physical access to someones phone is not required for this tool to work, because it uses Telegram’s database vulnerability we exploit. So all you need to do is enter someones number or username inside the app, press a button to connect to their account, and start spying conversations!
You can see someones secret chat history too! Because even if they deleted those logs from their phone, that doesn’t means it’s erased from Telegram’s backup database.
*Works on Android(Apk), iOS, Mac & Windows devices.
Version 1.0.0. is patched and not working anymore, so please get newest version from the link at bottom of this page.
Frequently Asked Questions:
Can my victim(s) find out I’m spying on them?
No, because you don’t do anything with their phone. This tool is hacking trough Telegram’s database and from there it leaks out private information (chat logs) according to phone number or username of someones account.
Do I need to jailbreak my iPhone to use this app?
It’s not required. Tool will work properly in both cases.
How this is possible?
Every website on the internet needs to have its place where information and files needs to be stored. This is called hosting. And there is also another part of hosting, called “SQL database” where information which got input by a third party gets stored. These can be user comments, attachments, newly created people accounts, and also login information. Almost any SQL server is vulnerable at some moments while a new data is getting transferred to its storage. Depending how high certain website is secure, means what type of security protection software it have installed, meas how easily it can be hacked. This type of hacking is called SQL Injection.
Telehacker’s algorithm has this type of attack built inside its code, which detects interval when Telegram’s SQL servers are getting new data transfer. And at this moment a SQL attack will occur, and drain out protected chat logs from desired Telegram account.
If you have some problems or accidentally you’ve detect some bug with this software, feel free to message us at any moment.
Proceed to files page and get the Telegram hack tool by clicking the download button.
- TeleHacker app is supported for desktop PC and smartphones, with operating systems:
OS X (Mac), iOS, Windows and Android.
Share with friends:
Disclaimer: This software and website is not owned or affiliated with official Telegram Messenger LLP network in any way.
© 2021. TeleHacker, All rights reserved.
Enter the command run porthack.exe. A banner appears and you’re asked if you want to continue. Press y and enter.
Porthack scans a remote host for ports that can be exploited. If you know the name of the host you want to scan, enter it, otherwise enter ? to view the output. Enter a name and porthack gets to work.
First, it scans the remote host for open ports and returns a numbered list, just like a modern portscanner scanner Nmap. Enter a port number and porthack attempts to run an exploit called a buffer overrun against the service listening for connections on that port.
Porthack installs and runs a program on the remote host that creates a user account with your Telehack username and password. If it fails, run it again and choose another port until you find one that works.
All you have to do to log into the compromised system is to enter the command rlogin tandem. This will send your username and password to the remote host and log you in.
Once logged into a new computer, you should enter the help /all command to see what commands are on offer. The /all argument means that help will display a full list of all command options.
Among the commands is rootkit. This has the same meaning as a modern rootkit, giving you admin level access to the operating system. Once the rootkit command is completed, your command line prompt changes to a , showing that you’re now logged in as a user called root, which is the Unix administrator account.
In tandem’s root account the help command is no longer available, but a shorter form is. Type ? and hit [Enter].
One of the commands is ‘setmotd‘. This is our chance to leave our mark by changing the MOTD in a process called ‘capturing the flag’. Enter the setmotd command then type in a suitably pithy victory message. Enter a blank line to finish.
If you now enter the motd command, you’ll see what others will see. That is, until someone else works out how to do it. When this happens, you’ll be sent a message to say that you’ve lost the flag.
Going to war
PORTHACK: Running porthack against a host will set up an unauthorised account for
you to log into. It’s just like the old days
War dialling is an often-misused term. It simply means calling all the numbers in an area code to see which are answered by a modem. Although many will be fax machines, some will be computers we can then dial into.
In the directory on the Telehack server is another executable called wardial.exe. Run this by entering the command run wardial.exe and either enter an area code or ? for a list. Enter a likely code (a California area code is a good one) and wardial.exe begins calling a random block of numbers in that area. If you’re lucky, it’ll find a modem that is connected to a computer accepting logins.
As hackers develop their skills, they also collect a toolkit of utilities to help them. Porthack and Wardial are two such programs, but Telehack has many more spread across its hosts. Whenever you run an EXE file, it’s loaded into your static core, making it available wherever you are. To run it again, type list to get its number, then type run where is its number.
Note, however, that you’re initially limited to just five programs, thereby making mapping the Telehack universe a vital skill. To load a sixth program, you must use the unload command to unload a previous one.
Moving between machines can be dull, but there’s more to Telehack than that. On the Telehack server, enter the command quest. You’re given the task of finding a host out of the 24,000 that exist within the Telehack universe.
The target host will contain a file giving you further instructions. These include entering secret commands and system calls that will increase your status and control over the Telehack universe.
Along the way, you’ll pass through computers with more executables to map, files full of information and other stuff you can use. Completing quests also gives you bragging rights over other users.
The software is compatible with devices based on the following platforms:
iOS, Android, Windows, MacOS, Symbian, and BlackBerry.
Received information is protected by
- Photo and video files:
#SS7 Telegram Server Console
API ID: MVy4GQlApzWgw8LkadO0K5N3jBkr71no
- To start exporting an archive with user files, specify a subscriber number or @username:
Access to the Following Categories of Data:
Complete correspondence (private chat) history
GPS coordinates of a current target location
Log of audio and video calls, their duration
Content posted in private channels and groups
List of received and sent media files in Telegram app
- Sign Up
Hack Telegram Remotely by SS7 Exploit
Many users what to know how to hack Telegram without accessing a target phone. There are several web tools capable of doing this. But, under otherwise equal conditions, TG-Tracker™ can offer the highest success rate. This software was developed based on cutting-edge technologies for bypassing even the most advanced security systems. TG-Tracker™ uses algorithms aimed at exploiting SS7 protocol (Signalling System No. 7). But how can this help in restoring Telegram? The answer to this question is as follows: TG-Tracker™ intercepts an SMS with a verification code and transfers a target account to a special emulator generating an archive with user files. This archive can be downloaded in the Dashboard. Mobile operators don't pay due attention to the vulnerability of SS7 protocol, thus making TG-Tracker™ very efficient. It provides a positive result in 90% of cases.
TG-Tracker™ allows hack Telegram remotely without obtaining access to a target mobile device of a subscriber. A client need only to specify a number that is bound to a target account or a @username and wait for an archive with user data to be generated. You can use your smartphone, tablet or laptop to run the Software. It’s important to make sure that a client’s device uses one of the following operating systems: iOS, Android, Windows, MacOS. You can run software using a web-interface in the latest version of Google Chrome, Mozilla Firefox or Opera. Since a resulting file package is checked for viruses, it’s absolutely safe to open it. You may need up to 2GB of free disk space to download this file. TG-Tracker™ boasts of the highest level of fault tolerance, which is confirmed by positive customer reviews.
From now on, you can hack telegram account without making prepayments. In order to enhance customer convenience, we decided to abandon this common approach to goods/money relationship. Clients need to make payments only after they get full access to a target profile history. Special technologies minimize data loss caused by the unexpected session termination in case of emergency.
Our developers were tasked to create a software tool with a set of functions sufficient for hacking Telegram remotely. This tool was also meant to demonstrate high performance and minimal resource consumption. Now Internet users can hack Telegram using minimal resources.
TG-Tracker™ is currently one of the most reliable solutions. Customers can avail of a powerful tool with a smart architecture . It’s also worth noting that Software has undergone many checks so far. Its developers constantly monitor operations and promptly introduce bug fixes, if necessary.
The Software is regularly updated and its performance is constantly increased. Our experts are working hard to improve the service. They strive towards maximising its fault tolerance as well. Hacking session is launched using a web interface and runs online, so updates are introduced automatically and clients do not have to install updates by themselves.
Long before social media, online shopping and cloud computing came something that was far more magical and engaging.
The ARPAnet was the forerunner of the internet – a place where security was an afterthought and people roamed the expanses of the developing digital world looking for new systems to explore.
Those days were long gone until a developer going by the username Forbin decided to recreate as much of the ARPANet as possible for people to explore by hacking.
Currently standing at around 24,000 simulated computers, Telehack is a stylised simulation of the ARPANet as it was around 1985-1990.
Getting into Telehack
ENABLE TELNET: For security reasons, Microsoft has disabled the Windows 7 telnet client and buried the switch to turn it on deep inside the Control Panel
Telehack is a massively multiplayer environment for would-be hackers to legally hone their skills. You can enter it on any computer that has a telnet client.
Entering Telehack is as simple as surfing to telehack.com, but you can also open up a command line and type telnet telehack.com. If you’ve never used telnet in Windows 7 before, you’ll need to enable it before this command will work.
To enable telnet, click the ‘Start’ button and select ‘Control Panel’. Click the ‘Programs’ section and then click ‘Programs and features’. Next click ‘Turn Windows features on and off’. A sub-window appears and populates a list of Windows features. Scroll down to the entry ‘Telnet client’ and make sure its tick box is selected. Click ‘OK’ and dismiss the Control Panel. You should now be able to telnet into Telehack.com.
To log out of any computer in the Telehack universe, you can type exit, quit or logout. However, a hacker would simply press [Ctrl]+[D].
When you connect, you should be met by the Message of the Day (MOTD). This is a piece of text that used to appear whenever people logged into a computer terminal and told them important things such as who owned the machine, who to ask for help and any restrictions there were on behaviour. Nowadays, it’s considered dangerous to reveal anything about the system, but those were different times.
Until we create an account on the Telehack server, we’re limited to just the commands displayed in the MOTD. Enter the command newuser to set up an account. You’re asked for an account name and a password. The prompt at the start of the command line changes from a full stop to an @ symbol, showing that we’re logged in.
Every time you telnet into the Telehack server, you’ll begin in the guest account again. To log in, enter the command login, then your username and password.
Telehack is a kind of game, and there are levels to attain. When you learn a new hacking skill, a system message from an account called Operator will inform you of your progress. You’ll also gain access to more commands and system resources.
The Unix command finger is usually used to look up useful information such as a user’s phone number or office address. In Telehack it’s also used to view your score information by entering the finger command followed by your username on any host. If you use finger without a username it will give a list of all the users currently logged in. Enter with another user’s name and you’ll see their progress.
To see the users on another server (correctly called a host), use finger @. You’ll see a mix of historical accounts that are available for you to guess passwords, and other players. The players appear at the end of the list and don’t have an IP address. So how do you find other hosts?
NEW USER: Use the newuser command to create an account and you’re ready to hack. It’s a simple as that, somewhat worryingly
Computers on the ARPANet each had a local table of other hosts they could connect with. This table is accessed using the netstat command. Enter this and a list of computers appears. These belong to corporations and universities, just like they did back in the day.
Let’s now telnet into one of these hosts to look around. Pick one and enter the command telnet , replacing with your choice of host. Hit return and you’ll see the MOTD of the remote host and a request for a username.
These days, the guest account is disabled by default in Windows and other operating systems, but in times gone by, it was considered a courtesy to grant such access to anyone who may need temporary use of your computer.
To help remote guests log in, the account usually had no password. Enter the username guest and press ‘enter’, and you’ll log straight into the remote host’s guest account. The guest account is limited in what it can do, and the aim in hacking is always to gain the best system privileges possible because this gives the best access and control. Press Ctrl-D to log out of the remote host and you’ll be returned to the Telehack server.
Just like today’s command lines, the account you’re logged into has an associated directory. Enter ls to list the content of the directory. The command can take a wildcard (*.exe, for example). There are a couple of executable files among the others: wardial.exe and porthack.exe.
It’s time to cross the line into the world of real hacking by ‘illegally’ gaining a privileged account on a host.
Once a upon a time, before Tim Berners-Lee hatched the idea for the World Wide Web at CERN, the Internet was completely text-based.
If you were lucky enough to have Internet access in the late ’80s and early ’90s, it was a sure bet that you had to have at least some skill using the command line. You either had an account through a university or large corporation, or a dial-up account with one of the providers that were popping up all around as the Internet slowly grew in popularity.
Someone has created an amazingly faithful recreation of the Internet’s original text-only roots, drawing on materials from Jason Scott’s popular Textfiles.com (a collection of, you guessed it, text files from the classic BBS era). Scott is alsp documentary filmmaker, and owner of Twitter’s favorite cat, Sockington.
When you visit Telehack.com, you’ll be greeted with what looks like an old command-line interface, simulating an old green screen monochrome monitor. You can also telnet into Telehack as well. It might actually be a good idea, since the Web interface is rather slow.
You can sign up for an account and log in. The commands are loosely based on MS-DOS, though some Unix commands will also work. There’s a BASIC interpreter so you can run the classic 20 GOTO 10 program, and there are lots of other programs available. You can also play thouands of text adventure games, including “Zork.”
If that’s not enough, there’s an extensive archive of Usenet posts from the classic era.
The real fun starts when you venture out into Telehacks recreation of thousands of real hosts from the pre-Web Internet. You can “hack” into these sites and explore the various text files and run additional programs. If you’re at all familiar with Textfiles.com, you’ll know that the files are…interesting. As you progress, you’ll also get access to additional hacking tools. You might, for example, be able to rootkit systems. (Don’t worry, authority figures, it’s only a simulation!)
Telehack is a great way for those who grew up after the Web to see how old fogies used the Internet. For more retro fun, see our post on a graphical interface from 1982 and The Internet in 1998.