home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Shareware Overload
/
ShartewareOverload.cdr
/
games
/
thief30.zip
/
THIEF30.DOC
< prev
next >
Wrap
Text File
|
1989-05-02
|
30KB
|
465 lines
=======================================================================
T h e C o d e T h i e f
R e v i s i o n 3 . 0 D o c u m e n t a t i o n
B y B r e w A s s o c i a t e s
A N O F F I C I A L P H O R T U N E 5 0 0 P R O D U C T
----------
PROFESSIONAL, HIGH QUALITY SOFTWARE AT A PHREAKER'S PRICE: FREE
=======================================================================
-> Introduction To Code Thief 3.0 <-
Welcome to Code Thief 3.0! It has been over a year since the last
2.x version was released (which was 2.2), and revision 3.0 now provides
a significant update to the program. If you are already familiar with
Code Thief, you will be able to use the program right away, as all of
the old features are there, as well as the familiar layout. What you
will notice however is that things look more tighter and generally more
professional. If something stumps you, it would be wise to read this
revision 3.0 documentation, because some keyboard changes have taken
place in the extender editor and modem configuration sections. New
users should read the docs anyway, as with any new product.
As an incentive to read the documentation, I have tried to lay out
all of the 'little things' about the program and its behavior. This
will help you understand more. Also notice that Code Thief does not
make any direct screen writes. All screen access is done through the
BIOS. Its fast enough as it is, and shouldn't a hacker be able to run
in the BACKGROUND so you can do something else? As I am writing this
documentation I am in DesqView, with Code Thief 3.0 running
concurrently in another window.
-> From The Author <-
A LOT of work has gone into the Code Thief project, especially
revision 2.x/3.x of the program. If you support the program then be
sure to leave a message to me, Brew Associates, about it with any
questions or comments you might have.
-> An Official Phortune 500 Product <-
My thanks to the Phortune 500 Board of Directors, and the Phortune
500 membership. The Phortune 500 Board of Directors as of now consists
of: Brew Associates (author of Code Thief), Renegade Chemist, Aahz,
Quinton J. Miranda, The Spiker, Striker, Red Knight, Lord Lawless.
-> Starting The Program <-
To start the program normally, enter THIEF from DOS. You can also
enter THIEF xx:xx from DOS (substitute a valid time for xx:xx) and Code
Thief will automatically hack the flagged multiple extenders with
multiple targets until the time specified, then drop back out to DOS.
This is great for a BBS's batch file. For instance, you can have your
BBS invoke a batch file at a certain time. This batch file could say
something like THIEF 5:30. This will invoke multiple target/multiple
extender hacking until 5:30 am. Note that all times are in 24 hour
mode. Also, if no multiple targets are found the defaults are
automatically used. This modification is on the request of an Opus BBS
sysop. Hope it comes in handy.
IF THE PROGRAM IS STARTED NORMALLY
When you first start the program you will see the main option menu.
At this and any menu you can use the up and down arrow keys to move the
highlight over an option and press RETURN or the SPACEBAR to finally
choose the option. I will try to move you through the running of the
program to get it working on your machine so it is suggested that you
print this documentation out and work the actual program as you read
it.
-> Setting Your Modem Paramaters <-
The first thing you will probably want to do is set your modem
paramaters. Use the up and down arrow keys to move the highlight over
option "H" on the main option menu then hit CR or RETURN, or just hit
"H" then CR or RETURN. You will be greeted with three more options.
First choose "Modem Specifics". This is where you can set the
paramaters for your particular modem. If a default doesn't match your
configuration then use the up and down arrow keys to move the highlight
over the option then hit RETURN or SPACE. The highlight will disappear
and you can make an entry. If it is a number or some other field,
enter the new value to use. If it is some kind of a toggle, use your
left and right arrow keys until what you want comes into view. Press
RETURN when you are satisfied with your choice.
MODEM SPECIFICS
COM Port - This can be eighter COM1: COM2:, COM3: Or COM4:. Use
the left and right arrow keys to select Port 1, Port
2, Port 3, Port 4. Then hit RETURN.
Baud Rate - Enter the baud rate to open the modem at whenever
hacking or scanning is performed. Your choices are
300 Baud, 1200 Baud, and 2400 Baud. The left and
right arrow keys move you through the choices. Hit
RETURN when you are satisfied.
PBX Mode - Choices are Yes and No. The left and right arrow keys
moves you through the choices and RETURN selects. If
you are in a building with a PBX then you have to
enter Yes for this option.
PBX Digit - This is the PBX digit. When you are in a building
with a PBX installed a certain digit has to be dialed
to receive an outside line. If PBX mode is No, then
N/A will appear for Not Applicable. Trying to change
this with PBX mode to No will cause it to beep at you.
PBX Delay - This is the number of seconds after entering the PBX
digit to wait for the outside line. N/A if PBX Mode
is No.
Hangup Mode - You can select DTR or Escape Code here. Use the left
and right arrow keys and ENTER as before. Entering
DTR means that DTR will be forced false to cause the
modem to hang-up. If your modem DIP switches are not
set properly DTR will not work. Then you should
choose Escape Code so that the modem hangs up using
the escape sequence. Whenever the modem connects to a
remote computer the program will now hang up by
sending "+++" to the modem until it responds, then
sending "ATH0". It's tested and works great for me.
It should for you also.
Speaker On - Choose Yes to keep the speaker on during hacking and
scanning or No to keep it off.
Dial Tone Wait - This is the number of seconds the modem is to wait
after picking up the line until starting to dial. It
does this through the Hayes (and compatibles) command
registers.
Carrier Detect - This is the number of 1/10 seconds that a carrier must
be present for the modem to detect it as valid. This
defeats some LD service's fake-carrier routines that
send a fake carrier for a short period of time.
Remember that REAL carriers are sent for a longer
period of time than fake carriers. Experiment with
this one.
Dialing Speed - This is the speed of the touchtone dialer. This is in
1/100 of a second. This number can range from 50-255
(at least with the modem I use).
User String - If there is something entered here then it is sent out
to the modem. If you have an advanced modem, then set
it to "ATX6" to enable your extended result codes for
such things as VOICE, etc. You can over-ride the
"Speaker On" setting by making this "ATM1". That
would be stupid, but it's just an example.
MODEM RESULT CODES
In this section you enter the result codes that your modem uses when
in non-verbose mode. Note that the defaults should suffice. If you
have a strange modem configuration you can change these. Numbers
aren't the only thing allowed here, you can enter symbols like ";" or
":", or etc. Someone had a strange "Hayes Compatible" modem and wanted
this capability. I aim to please.
-> Edit Extender Configurations <-
The next thing you will want to do is create configurations for the
different extenders you wish to hack. Choose "Edit Extender
Configurations" after you exit back to the main options menu. If no
EXTENDER.DAT file exists, one will be created for you with a dummy
initial record (you will want to change this of course, 1-800-000-0000
is not a valid extender). If you haven't screwed anything up, you
should now see the first record of the sample EXTENDER.DAT I included
in the Code Thief archive file. These are just some 800 extenders to
get you started. Note that you might want to change some delays, etc,
to work for you. As they are now they work for ME. Your case might be
different. Experiment. Hitting [A] will ADD AN EXTENDER to the file.
Hitting [E] will EDIT the current extender (there's that highlight
again!). Hitting [D] will prompt you to confirm the DELETE of the
extender record. Hitting [Q] will quit the extender editor. To
understand all of the fields for the individual extender, let's go
through the process of ADDING an extender. You will notice that Code
Thief is an extremely complex code hacker. But also note that there is
so much flexibility that you will be able to hack just about anything
that is out there, no matter what kind of format it is.
ADD AN EXTENDER
When you choose to ADD an extender you will be given the opportunity to
enter the complete configuration for the extender. The first
thing is the telephone number of the extender. After that is a short
note used to identify the extender. Note that throughout the
program in various sections extenders are refered to by this short
note, so make sure it is something you can easily recall. You can
make it the number of the extender if you wish. Anything goes here,
but the program will beep at you if you try to leave it blank. Next is
the length of the codes. For METRO it is 6, MCI calling cards it is
14, etc. No code lengths of 0 are allowed (it will beep). Next is
the code template. This idea is borrowed from Fuckin' Hacker from
2af because I think it is a very powerfull feature. If this is
used it completely over-rides the code length, hacking mode, starting
code, and sequential increment in your configuration. Anyway, here you
are to construct a "template" for your codes. For instance, entering
"444XXX" will make every code 6 digits and starting in 444. Entering
"0X1X2X" will make set the first, third, and fifth numbers in every
code to 0,1, and 2 respectively and the second, fourth, and sixth
number in each code will be totally random. Commas are also allowed in
the code template and will cause the modem to pause for 2 seconds. For
instance, XXXX,9 will cause a random 4 number code to be sent, a pause
for 2 seconds, then a 9 will be sent. This is good for hacking PBX's
that require a code be sent then need a number for an outside line.
Leave the code template blank if you don't wish to use it. Next you
will enter the code delay. This is the number of seconds to delay
before sending the code. Then you will enter the target delay. This
is the number of seconds to wait until entering the target number.
Notice that also in the config is an option to put the code first or
not. If the code is sent first then the Code Delay should be the
number of seconds to wait after dialing the extender until the code is
sent after the extender answers and provides a dial tone. If the code
is not sent first then the target number will be sent first. The
target delay should be the number of seconds to wait after dialing the
extender until the target is sent at the extender's dialtone. Then the
code delay is the number of seconds to wait until sending the code
AFTER the target number is sent. The timeout is next. This is the
number of seconds to wait for your TARGET number to answer. If it
doesn't answer within this time the code is considered invalid.
Basically, the target delay tells the modem how long to wait. When the
modem times out it tells Code Thief, and Code Thief moves on. Now enter
a default Target number. This is a number that always answers with a
modem (is never busy). Telenet is perfect for this (so enter your
local Telenet number). Note that Code Thief can also use random
multiple targets - this is covered in the MULTIPLE TARGET CONVERSION
UTILITIES that has been included as a Code Thief companion program in
your Code Thief ARChive. Read CONVERT.DOC for information about
targets and multiple targets at that. Next is the hacking mode. Use
your left and right arrow keys to move through the selections and hit
RETURN when you are satisfied. You can have Random codes, Sequential
codes, or Both - sequential codes with a random increment. If you
choose Sequential or Both you are now prompted for the starting code,
otherwise this value is set to N/A. Next you enter the sequential
increment only if Sequential hacking is chosen. If sequential hacking
is chosen then this is the number to increment each code by. If Both
is chosen, then this number is random in the range of 1-100 when
hacking. If Both or Random hacking is your chosen method then the
Sequential Increment is N/A. Note that the sequential increment is an
integer, therefore any value from 1 to 32767 is valid. If "Sequential"
hacking or "Both" hacking is chosen and the increment ever exceeds the
code length, only the length of the code up to the code length will be
used. For example, with a code length of 4 and an starting code of
9999, if an increment of 1 is made your next code will be 1000. Now
you will be prompted as to if the code should be entered first. Use
the left and right arrow keys to select Yes or No. If you choose Yes,
then the code will be sent first. Choose No and the target will be
sent first. Next is the target prefix digit. This is a number to add
to the beginning of the target number. For example, for the MCI
calling card service you enter the target first and prefix it with a
"0". ITT requires that the target be sent first and be prefixed by
a "1". Other services require that the CODE is sent first and the
target has NO prefix. Next is the multiple extender flag. If
Yes then the extender will be flagged immediately as one to be used
when Multiple Extender hacking is chosen. If you choose No, then this
extender will be put on reserve. More on this comes later. Next is
multiple port mode. Say the extender number is 950-1000 and the
extender has multiple port hunt groups from 950-1000 to 950-2000.
Choosing Yes to multiple port mode will prompt you for the ending hunt
number (in my example it's 2000). Now Code Thief will randomly pick
950-1000 to 950-2000 whenever it dials the extender. Ending Hunt
numbers MUST be four digits long (that should be self-explanatory).
Note that if your extender is 1-800-555-0000 and your Ending Hunt
Number is 0099 Code Thief won't screw up by dialing 1-800-555-99 or
whatever number is chosen. It will properly dial 1-800-555-0099 (or 1-
800-555-0050 or 1-800-555-0026, etc, etc, etc). Next you will enter
the filename to place valid codes in. Valid codes are logged with the
time and date for convienence. All valid code files end with the
".COD" extention. When finished entering all extender information
it is saved to the EXTENDER.DAT file.
OTHER EXTENDER EDITOR COMMANDS
To navigate through the configurations use the LEFT and RIGHT arrow
keys. To flag an extender for deletion enter "D". You will be
prompted to enter "Y" if you are sure or "N" if you are not. Once
an extender has been flagged for deletion it will be skipped over when
you use the left and right arrow keys. Hit "Q" to quit this
section. When you hit "Q" all extenders flagged for deletion are
physically deleted. Another nice feature in this section is the
ability to edit extenders. Hit "E" to choose edit. The highlight will
appear. You can use the left, right, up, and down arrow keys to
navigate the hightlight over the option you wish to change. Then hit
RETURN or SPACE to enter a new value. When finished entering a new
value (either by the keyboard or left and right arrow keys) hit RETURN
and the highlight will re-appear so that you may move it over new
things to edit. When finished editing hit "Q" when the highlight is
present. Note that everything in the configuration is described in
the previous paragraph. To choose a particular extender by record
number, just enter the number. You can't see extenders flagged for
deletion (it will not go to them).
One more thing on deletion extender configurations. If in the course
of using this section you delete ALL of your extender configurations,
the program will not have any configurations left to go to and it will
automatically quit this section deleting the entire EXTENDER.DAT file.
When choosing this section again, a new EXTENDER.DAT with a dummy
record will be created.
-> Edit The Multiple Target File <-
Navigate back to the main menu. Choose "Edit The Multiple Target
File". You will then be shown the current multiple target file. Now
you can either hit "1" to add to it, "2" to delete entries from it or
"3" to quit. Everything here is self-explanatory. A multiple target
file is provided with the program. It is kept in ASCII file format for
easy editing with your word processor, if you wish. Use the MULTIPLE
TARGET CONVERSION UTILITIES in your Code Thief ARChive to get quick and
painless updates of your multiple target MTARG.DAT file off Telenet at
regular intervals. Code Thief is a complete professional system that
will solve all your hacking needs.
-> Flag Extenders For Hacking Mode <-
Exit to the main menu and choose "Flag Extenders For Hacking Mode".
This is the option to choose to change the flags on extenders. If it
is flagged then it will be one of the extenders used when multiple
extender hacking is chosen. The extenders will be shown, eight to a
page. A "+" in front of the extender means it will be included when
multiple extender hacking is chosen, otherwise it will not. This
option is included because some people don't want to hack all of the
extenders they have configurations for. Editing an extender and
changing the multiple extender flag does the same thing, but this is
easier. If there are more than eight extenders then they will take up
more than one page. You can flip through the pages by choosing "Jump
To Next Page" and "Jump To Previous Page". Hitting RETURN or SPACE
when the highlight is over an extener toggles the flag.
-> Use The Exchange Scanner <-
Navigate back to the main menu and choose "Use The Exchange
Scanner". You will be prompted with the exchange to hack, the
starting number in the exchange, then the ending number. If the ending
number is not larger than the starting number it will not be accepted.
This is a full screen exchange scanner ala the movie WarGames (the
movie sucked by the way) and it will show each of the numbers
dialed. Numbers where computers are detected are shown BLINKING. If
the modem does not detect a dial tone when trying to dial (receives
the no dial tone result code) it retrys the line. After 5 retries it
exits the exchange scanner. If the modem sends a BUSY result code that
is logged to the CARRIERS.TXT disk file along with numbers that
produced a CONNECT result code of any baud. It will specifically log
it as a BUSY number or a number that the modem CONNECTed to. You can
then consult the log and dial these numbers back manually if you wish
to ensure that the numbers listed as busy aren't important. There is
a delay of two seconds from the time that the next number is printed
to the screen until the modem actually picks up the line to dial. This
is no problem and is done to ensure the reset of the hardware. When
the screen fills up, Code Thief goes back to the beginning.
-> View/Delete Code Files <-
When you choose this option from the main option menu the disk will
be searched for files with a .COD extention. If there are any they
will be displayed. If there are no files with a .COD extention that
will be displayed also. You have the option of viewing one of these
files or deleting one. If you view one it will be one screen at a time
so nothing scrolls past you. Note that the time and date the code was
found is logged for your convienence.
-> View/Delete Carrier File <-
This option is also on the main option menu. All carriers found
when using the exchange scanner are logged to a file called
CARRIERS.TXT, as well as BUSY numbers if the modem sends a BUSY result
code. When viewing the file it will be showed one screen at a time so
nothing scrolls past you. You can also delete the file. Note that the
time and date the number was found is logged for your convienence.
-> Start Hacking <-
After you choose this option you will be prompted as to weather you
want to do Single Extender/Single Target Hacking, Single
Extender/Multiple Target Hacking, Multiple Extender/Single Target
Hacking, Or Multiple Extender/Multiple Target Hacking. If you choose
multiple target hacking of any kind the targets will be read into
memory before hacking begins to cut down greatly on disk access time.
If single extender hacking is chosen you will be prompted for the
extender to hack. Use the arrow keys to highlight the extender you
want then press RETURN or SPACE. If there is more than one page of
extenders then highlight "Jump To Previous Page" and "Jump To Next
Page" to navigate around the list.
WHEN HACKING BEGINS
With version 2.x the hacker was greatly enhanced. You will be
shown the complete statistics for every extender. Also shown is the
number of codes found, the last code found as well as the number of
codes found for that extender plus other statistics for the current
hacking run for each extender. The number of extenders you can have at
any time is limited only to disk space, of course. Multiple targets
are limited to 500. This is, I think, more than enough. If you chose
to quit hacking at any time, that time will be displayed on the screen
as a reminder. Hit ESCape to quit hacking at any time. If you forgot
to configure your modem and it is connected to COM2 (the default is
COM1) then just hit ESCape to exit hacking and re-configure the modem.
The program won't hang waiting for input and the ESCape quits at any
time. You can also hit the SPACEBAR to skip to the next code. If you
have a picky modem like mine, only use the ESCape key or the SPACEbar
when the modem is not sending any DTMF to the line.
POSIBILITIES DURING HACKING
Many things can happen during hacking. For instance, if the modem
connects the code and extender is logged to it's respective disk file.
If the modem sends an ERROR result code the current attempt is retryed
again. If NO DIAL TONE is detected by the modem the current attempt is
retryed. If NO CARRIER or VOICE is detected by the modem the program
moves on. The maximum number of retrys that can ever be done in a
row is five. Oh, if the modem sends a RINGING result code that is
also shown to the user while the modem waits to timeout or connect.
Ringing does nothing but just display "Ringing...". If the modem
receives a busy signal it goes on to another attempt. I origionally
planned on making it retry the code but I remembered that some
extenders send a re-order which is a fast busy signal that can be
detected by the modem and send a BUSY result code.
-> Closing Notes <-
I hope you understood this new documentation. Im not really a good
writer, so if you have any questions leave me a note on any board I
happen to be on and I will try to answer it. I hope you like Code
Thief and find it usefull as I put a LOT of hours and hard work into it
until I was satisfied. If anything goes wrong with the program on your
machine, or anything else in general then leave me a note. I will try
to diagnose the problem and stamp it out.
COMMUNICATIONS ADDRESSES AND INTERRUPTS
Here are the communications address and interrupts that Code Thief
uses to access the communications ports. COM1: and COM2: are correct
for 100% of the applications. COM3: and COM4: as defined by the
program will be correct 99% of the time. If you have a COM3: modem and
Code Thief set at Port 3 doesn't work with it then change your modem to
COM1: or COM2: if possible. If you really need YOUR communications
addresses and interrupts for COM3: and COM4: leave me a note with the
correct information on any board I am on and I will try to get you a
new THIEF.COM. But note that the addresses and interrupts used for
COM3: and COM4: are going to be correct more times than not.
Address Interrupt Address Interrupt
------- --------- ------- ---------
COM1: 3F8 IRQ4 COM3: 3E8 IRQ4
COM2: 2F8 IRQ3 COM4: 2E8 IRQ3
F i l e s S u p p l i e d W i t h C o d e T h i e f 3 . 0
Make sure that these are the files you received in your ARChive of
Code Thief revision 3.0. If these are not the files then what you got
is something that someone else re-ARChived and forgot to include
something in. I ask that you only distribute the origional archive
because people have confused themselves in the past.
THIEF30.DOC - Code Thief 3.0 documentation - You are reading it now
THIEF.COM - Code Thief 3.0 - The actual program
MTARG.DAT - Code Thief multiple target file - use Multiple Target
Conversion Utilities to make your own also
EXTENDER.DAT - Sample 1-800 extender file to get you started
MULTIPLE TARGET CONVERSION UTILITIES
A CODE THIEF 3.0 COMPANION PROGRAM
(be sure to read CONVERT.DOC to understand this)
CONVERT.COM - Multiple Target Conversion Utilities - The program
CONVERT.DOC - Multiple Target Conversion Utilities - The documentation
TELENET.LST - Sample file off Telenet to get you started