Telehack: View, play games and hack in the early days of the internet

Telehack is a free of a stylized arpanet/usenet, circa 1985-1990 era. It shows you how they communicated, how they worked, how they played games and how they hacked computers at that time.

telehack 1

Telehack is a complete simulation of an early arpanet/usernet network that existed in 1985-1990. It includes 26.600 hosts, thousands of era files, a από παιχνίδια περιπέτειας, ένα λειτουργικό διερμηνέα with program library, simulated well-known period users and more. There are also many connected users, since you can do (if you want)

Connectivity

You can connect to it either via telnet (as before), or because you live in a modern age through a browser.

If you choose via command prompt and telnet service, because you just want to live the whole experience of that time, and you are with an operating , you should first enable the telnet Service from “Windows Features”.

To do this go to Control Panel> Programs & Features> Enable or Disable Windows Features> and from there check “Telnet client program".

Telehack is also accessible via:

  • Telnet on ports 23 (the standard telnet port), 1337, 8080 and 31173
  • HTTPS on port 443 (the standard HTTPS port)
  • SSH on port 6668
  • FTP on port 21 (the standard ftp port) NOTE: The FTP server is compatible with RFC 959 and will probably not work with more modern FTP clients

Functionality

telehack 3

Telehack is case sensitive. Commands are often capitalized to distinguish them from the text environment. Note that you do not need to capitalize the commands.

Those who are familiar with the Command Prompt will not find it difficult to work with it. For the rest the basic commands and manipulations are:

    • Enter help = It gives you a complete list of the programs it has or the help of each program
    • Press space = If you are presented with a large list that does not end on one screen, press space to move quickly
    • ctrl – C = With this combination you stop what you are doing and exit the sub where are you running

For a detailed help regarding each program offered go here

Fun

telehack aquarium

You can really live as if you were on an arpanet / usernet network, browsing books, running programs or playing basic. But since most people will be interested in the games of that time, here's what you can do:

Starwars
Watch the first movie "Star Wars" in ascii format

Aquarium
Make your screen aquarium

Pong
The classic ping-pong game. You have a racket and you try to repel the ball.

Zork
An interactive fantasy game where with written commands to the hero of the game you try to explore the space and possibilities of the game. THE it's English. Don't forget to ask for help by typing help

Zrun
A really huge list of z-code games. The command to select a game is the zrun game

Registration, simulation and

telehack 2

If you want to feel the feeling of the 80s then we suggest you register with the command newuser. Your username must be between two and nine characters long, starting with a lowercase letter.

After registration, check if you have an email. Email back then was a far cry from the Gmail you're probably used to. It's all command line based with no GUI at all. You can see the whole about how they emailed in the 1980s in the following BBC special.

To check your first email, you must run the command mail. This will display the mail version and the revision date, which is 1983! To open an email, use it read and after the email number.

By registering you have access to the system folders. Enter the command ls to see what the current folder contains. You will distinguish the four executable files: rootkit, wardial, porthack and xmodem. These will be your first tools for breaking into other arpanet servers.

One thing you may be interested in is checking who is online and comparing the scores. To see other users, you can run the command finger, which will show you all kinds of interesting information, such as username and status, which port it is on, when it last logged in and what it does, as well as where it is in the world.

Hacking on the arpanet
You can connect to other computers on the arpanet. On the internet, you are used to navigating to any website or server you want, but this is not the case at arpanet. Instead, you can only access servers with those with whom you have direct access.

To access the host panel available to you, run the command netstat. The host list is different from the user list and appears to be based on geographic location or random par.

In modern times, visitor access is disabled by default as it is considered a security risk, but in the good old days, it was considered polite to have visitor accounts on your computer for anyone who wanted to use it. It's one of those funny little quirks of the days that went by long, long ago when security was not a major concern in people's minds.

There are a few things to keep in mind when connecting to a new host. You may see a phone number that can be used to call and connect to the network using xmodem. But the most important thing for you, and in the context of hacking - game, is / etc / motd, which if enabled displays which user has rooted the host. To be clear, the root user is another player. One of your goals in the game should be to get as many root accounts as possible.

Use the command run porthack.exe or just the porthack, to run a buffer overflow, an attack where the porthack program starts writing to the boundary memory after exceeding the data capacity of a buffer, thus trying to execute code that will add you as a user. When (and if) you manage to gain root access and hack the computer you can "steal" things from it.

Go ahead and conquer the Telehack universe!

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.
telehack, arpanet, usernet

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).