If you're going to provide a TL;DR for others, it's best to read to the end first... telnet was used as an early example, but the writer went on to explain how to target ssh too.
They have resources, though every technique in this paper is very simple. There are some incredibly talented people out there, and not all of them work for the NSA.