Telnet & 8.1

12/13/2014 20:11 mongreldogg#1
Hello guys.
Never known i would ask such a stupid question again here :D

Thought working with GS 8.1 telnet would be easy. But have some problems - GS actually disconnect me after any attempt of sending any data after establishing a connection. And to be very honest, i have never had a deal with rappelz remote commands execution.

Just wondered if there are some examples of packet structures to autorize GS telnet and send commands? Or does it actually has any difficult structures?

And i also heard that telnet functionality is disabled in 8.1 GS, please tell me its a lie. If it is...
12/13/2014 22:17 TheSuperKiller#2
in fact it's a lie ; after almost one year using automated telnet commands 24\24 on my dedicated server , I never had any problems with it .
12/13/2014 22:27 marekrndr#3
TelNet in 8.1 is still there, you just need to add this line -

S console.port:4500
S console._password:4571a22a4c05c3c3
S console.allow_ip:*.*.*.*
12/13/2014 23:17 mongreldogg#4
yep already got it but thanks anyways.
please close
12/13/2014 23:47 malaysiawap#5
Here is my simple telnet command for the GS using PHPTelnet Class.

Ref for another documentation:
[Only registered and activated users can see links. Click Here To Register...]



installation

Download the PHPTelnet class and put it on your selected folder and copy the function below and put it into your index.php or your custom function.

Code:
function TelnetCommand($command){
require_once "PHPTelnet.php";

$telnet = new PHPTelnet();
// if the first argument to Connect is blank,
// PHPTelnet will connect to the local host via 127.0.0.1
$result = $telnet->Connect('127.0.0.1','','TELNETPASSWORD_HASH');
if ($result == 0) {
$telnet->DoCommand(''.$command.'', $result);
//$telnet->Disconnect();
}

}
how to use ?.

Code:
TelnetCommand('Telnet Command');
Example:

Code:
TelnetCommand('#add_state(2610,100, 360000, "username")');
Code:
TelnetCommand('#notice("Hello")');
01/05/2019 23:16 Toper12345#6
Heeeelp, I entered Telnet 127.0.0.1 44452, but then I am asked for a password, where to get this password?
01/06/2019 03:24 ThunderNikk#7
The password is "genius"

That's why the telnet console is so dangerous.

Everyone knows your password.
01/06/2019 18:55 thefear511#8
Quote:
Originally Posted by ThunderNikk View Post
The password is "genius"

That's why the telnet console is so dangerous.

Everyone knows your password.
lol someone actually hacked my server this way, he even decrypted the auth password and got access to SQL.
p.s: he's a Reverse Engineering student so that's how he decrypted the auth pass as he told me.
01/10/2019 13:40 c1ph3r#9
Quote:
Originally Posted by thefear511 View Post
lol someone actually hacked my server this way, he even decrypted the auth password and got access to SQL.
p.s: he's a Reverse Engineering student so that's how he decrypted the auth pass as he told me.
It's possible to change that pw:

Hashed:
S console._password:4571a22a4c05c3c3

Don't know if this is still working:
S console.password:YourPW
01/10/2019 18:18 SilentWisdom#10
In 9.4 the console password can not be set via opt to my testing, must be hexed.
01/10/2019 18:50 ThunderNikk#11
Maybe it is a new des hash?
01/10/2019 21:42 SilentWisdom#12
Quote:
Originally Posted by ThunderNikk View Post
Maybe it is a new des hash?
No the GS does not store a setting that recognizes the pass word.
01/10/2019 22:19 c1ph3r#13
It's console._safetypw now but looks like new hash format

But I could be wrong. Perhaps somebody could test it with the old hashes. I only checked captain herlock with a hex editor on my mobile and can't test at the moment. I was talking to InkDevil and he said it isn't working with the old hashes. But for me it doesn't sound logic if they use 2 different encrypting methods for passwords in the opt files.

I used google to search for the parameter and found a post by ghost. He allready mentioned that parameter but didn't say something about new encryption.

Perhaps somebody is able to test it with old encryption. Otherwise I will check tomorrow.
01/10/2019 22:26 SilentWisdom#14
Quote:
Originally Posted by c1ph3r View Post
It's console._safetypw now but looks like new hash format
Time to talk to Glandu2 then huh ha ha
01/11/2019 18:08 InkDevil#15
Quote:
Originally Posted by c1ph3r View Post
It's console._safetypw now but looks like new hash format

But I could be wrong. Perhaps somebody could test it with the old hashes. I only checked captain herlock with a hex editor on my mobile and can't test at the moment. I was talking to InkDevil and he said it isn't working with the old hashes. But for me it doesn't sound logic if they use 2 different encrypting methods for passwords in the opt files.

I used google to search for the parameter and found a post by ghost. He allready mentioned that parameter but didn't say something about new encryption.

Perhaps somebody is able to test it with old encryption. Otherwise I will check tomorrow.
Checked it now again in several ways.
If you use the old encryption and change via console._safetypw, you have changed the password, but it denies access when trying to use your hashed pw.

So I'd also think it's a separate encryption.