home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
The Original Shareware 1.1
/
The Original Shareware (WeMake CDs)(Volume 1.1)(CDs, Inc)(1993).iso
/
23
/
codeth.zip
/
THIEF22.DOC
< prev
next >
Wrap
Text File
|
1987-06-11
|
24KB
|
378 lines
T h e C o d e T h i e f
R e v i s i o n 2 . 2 D o c u m e n t a t i o n
B y B r e w A s s o c i a t e s
-> Welcome To Code Thief 2.2 <-
It is exactly 2 days since Code Thief 2.1 has been released, and
already 2.2 is out? Yes. I modified something in 2.1 and didn't check
on previous work and thus, during hacking your display got screwed up
if you selected multiple-port hacking or hacked any other way than
random. Sorry. To make up for it I have added a NEW feature. This is
the ability to hack FROM DOS. That's right. Enter "THIEF 1:00" from
the DOS command line and Code Thief will hack with multiple targets and
multiple extenders (if found) until 1:00 am. This is great for putting
it in a BBS's batch file (or something like a Fido or Opus external
event if you run a board like that). When the time specified on the
command line comes Code Thief will exit to DOS right back into the
batch file. Now wasn't that neet?
-> Welcome To Code Thief 2.1 <-
Well, since I released Code Thief 2.0 a few minor bugs have popped
up and have been fixed (they were really stupid ones too) and also a
number of suggestions have been incorporated into the program. One of
these is the ability to have a user defined initialization string.
This allows you to send anything you want to the modem (IE ATX6 for
advanced modems so that it recognizes the extended result codes). This
means that the MODEM.DAT file has been changed, so delete it and start
over or it will only screw things up. Repeat: DELETE YOUR OLD
MODEM.DAT FILE. Then re-do your configuration. This should only take
about a minute. Also, someone told me that their modem sent ";" and
":" as a result code. Wierd. I modified the program to accept those
too as a result code. I also fixed the double boarder windows and made
them a single boarder window. The old window frames started to get on
my nerves. Most likely this will be the last release of Code Thief
unless something comes up in another program that would threaten my
work to be obsolete. I doubt any bugs will craw out of this, as I have
been running extensive hack-tests on the program.
-> Welcome To Code Thief 2.0 <-
Welcome to CODE THIEF revision 2.0! It's been quite some time since
a version of the Code Thief has been released and I am quite sure that
this one will please everyone. Code Thief has been TOTALLY redone and
now has a completely different user interface as well as BETTER hacking
and scanning capabilities! This is, again, a TOTAL re-write of the
documentation because the program has been re-written. Some of the
code from version 1.95 has been used but note that 95% of the program
is totally new. Read this documentation or you will not know what you
are doing. If you remember Code Thief version 1.95 then revision 2.0
will seem like a totally different program.
-> From The Author <-
A LOT of work has gone into the Code Thief project, especially
revision 2.x of the program. If you support the program then be sure
to leave a message to me, Brew Associates, about it with any questions
or comments you might have.
-> Starting The Program <-
To start the program normally, enter THIEF from DOS. You can also
enter THIEF xx:xx from DOS (substitute a valid time for xx:xx) and Code
Thief will automatically hack the flagged multiple extenders with
multiple targets until the time specified, then drop back out to DOS.
This is great for a BBS's batch file. For instance, you can have your
BBS invoke a batch file at a certain time. This batch file could say
something like THIEF 5:30. This will invoke multiple target/multiple
extender hacking until 5:30 am. Note that all times are in 24 hour
mode. Also, if no multiple targets are found the defaults are
automatically used. This modification is on the request of an Opus BBS
sysop. Hope it comes in handy.
IF THE PROGRAM IS STARTED NORMALLY
When you first start the program you will see the main option menu.
At this and any menu you can use the up and down arrow keys to move the
highlight over an option and press RETURN or the SPACEBAR to finally
choose the option. I will try to move you through the running of the
program to get it working on your machine so it is suggested that you
print this documentation out and work the actual program as you read
it.
-> Setting Your Modem Paramaters <-
The first thing you will probably want to do is set your modem
paramaters. Use the up and down arrow keys to move the highlight over
option "H" on the main option menu then hit CR or RETURN, or just hit
"H" then CR or RETURN. You will be greated with three more options.
First choose "Modem Specifics". This is where you can set the
paramaters for your particular modem. If a default doesn't match your
configuration then use the up and down arrow keys to move the highlight
over the option then hit RETURN or SPACE. The highlight will disappear
and the origional value will also. Now you can key in a new value,
remembering to hit RETURN after you are finished.
MODEM SPECIFICS
COM Port - This can be either 1 or 2 for COM1 and COM2.
Baud Rate - Enter the baud rate to open the modem at whenever
hacking or scanning is performed.
PBX Mode - Enter "Y" or "N" for this. If you are in a building
with a PBX then you have to enter "Y" for this option.
PBX Digit - This is the PBX digit. When you are in a building
with a PBX installed a certain digit has to be dialed
to receive an outside line. This will only be sent if
PBX mode is set to "Y"es in the previous above.
PBX Delay - This is the number of seconds after entering the PBX
digit to wait for the outside line.
Hangup Mode - You can enter "D" or "E" here. Entering "D" means
that DTR will be forced false to cause the modem to
hang-up. If your modem DIP switches are not set
properly DTR will not work. Then you should choose
"E" so that the modem hangs up using the escape
sequence. Whenever the modem connects to a remote
computer the program will now hang up by sending "+++"
to the modem until it responds, then sending "ATH0".
It's tested and works great for me. It should for you
also.
Speaker On - Hit "Y" to keep the speaker on during hacking and
scanning or "N" to keep it off.
Dial Tone Wait - This is the number of seconds the modem is to wait
after picking up the line until starting to dial.
Carrier Detect - This is the number of 1/10 seconds that a carrier must
be present for the modem to detect it as valid. This
defeats some LD service's fake-carrier routines that
send a fake carrier for a short period of time.
Remember that REAL carriers are sent for a longer
period of time than fake carriers.
Dialing Speed - This is the speed of the touchtone dialer. This is
in 1/100 of a second. This number can range from 50-
255.
User String - If there is something entered here then it is sent out
to the modem. If you have an advanced modem, then set
it to "ATX6" to enable your extended result codes for
such things as VOICE, etc. You can over-ride the
"Speaker On" setting by making this "ATM1". That
would be stupid, but it's just an example.
MODEM RESULT CODES
In this section you enter the result codes that your modem uses when
in non-verbose mode. Note that the defaults should suffice. If you
have a strange modem configuration you can change these.
-> Edit Extender Configurations <-
The next thing you will want to do is create configurations for the
different extenders you wish to hack. Choose "Edit Extender
Configurations" after you exit back to the main options menu. You will
be prompted with another menu. Choose "Add An Extender". Now you will
be given the opportunity to enter the complete configuration for the
extender. The first thing is the telephone number of the extender.
After that is a short note used to identify the extender. Note that
throughout the program in various sections extenders are refered to by
this short note, so make sure it is something you can easily recall.
You can make it the number of the extender if you wish. Anything goes
here. Don't leave it blank or it will become confusing as hell. Next
is the length of the codes. For METRO it is 6, MCI calling cards it is
14, etc... Next is the code template. This idea is borrowed from
another program because I think it is a very powerfull feature. If
this is used it completely over-rides the code length, hacking mode,
starting code, and sequential increment in your configuration. Anyway,
here you are to construct a "template" for your codes. For instance,
entering "444XXX" will make every code 6 digits and starting in 444.
Entering "0X1X2X" will make set the first, third, and fifth numbers in
every code to 0,1, and 2 respectively and the second, fourth, and sixth
number in each code will be totally random. Commas are also allowed in
the code template and will cause the modem to pause for 2 seconds. For
instance, XXXX,9 will cause a random 4 number code to be sent, a pause
for 2 seconds, then a 9 will be sent. This is good for hacking PBX's
that require a code be sent then need a number for an outside line.
Next you will enter the code delay. This is the number of seconds to
delay before sending the code. Then you will enter the target delay.
This is the number of seconds to wait until entering the target number.
Notice that also in the config is an option to put the code first or
not. If the code is sent first then the Code Delay should be the
number of seconds to wait after dialing the extender until the code is
sent after the extender answers and provides a dial tone. If the code
is not sent first then the target number will be sent first. The
target delay should be the number of seconds to wait after dialing the
extender until the target is sent at the extender's dialtone. Then the
code delay is the number of seconds to wait until sending the code
AFTER the target number is sent. The timeout is next. This is the
number of seconds to wait for your TARGET number to answer. If it
doesn't answer within this time the code is considered invalid. Next
is the hacking mode. Enter "R", "S" or "B" here. "R" means totally
random codes. "S" means sequential codes. "B" means both - sequential
codes with a random increment. Next you enter the starting code. You
do not need to enter this if random hacking is chosen. With random
hacking each digit of the code is picked totally randomly. Next you
enter the sequential increment. Is sequential hacking is chosen then
this is the number to increment each code by. Now you will be prompted
as to if the code should be entered first. Hit "Y" for yes. If you
hit "N" then the target will be sent first. Next is the target prefix
digit. This is a number to add to the beginning of the target number.
For example, for the MCI calling card service you enter the target
first and prefix it with a "0". ITT requires that the target be sent
first and be prefixed by a "1". Other services require that the CODE
is sent first and the target has NO prefix. Next is the multiple
extender flag. If you hit "Y" then the extender will be flagged
immediately as one to be used when Multiple Extender hacking is chosen.
If you hit "N", then this extender will be put on reserve. More on
this comes later. Next is multiple port mode. Say the extender number
is 950-1000 and the extender has multiple port hunt groups from 950-
1000 to 950-2000. If you wish to randomly choose the port to dial out
to enter "Y" here then enter the ending port when prompted. Now it
will randomly dial numbers with an extention in the range of 1000-2000
in the 950 prefix. If you hit "N" for multiple port mode, hit CR to
skip over the entry of the ending hunt number. Next you will enter the
filename to place valid codes in. Valid codes are logged with the time
and date for convienence. All valid code files end with the ".COD"
extention. When finished entering this information it is saved to
disk. All extenders are saved in the EXTENDER.DAT file.
Choosing "Edit Extenders" instead of "Add An Extender" brings you to
a different screen. If no extenders are defined you are told so. You
will be shown the complete information that has been entered for the
first extender. To navigate through the configurations use the LEFT
and RIGHT arrow keys. To flag an extender for deletion enter "D". You
will be prompted to enter "Y" if you are sure or "N" if you are not.
Once an extender has been flagged for deletion it will be skipped over
when you use the left and right arrow keys. Hit "Q" to quit this
section. When you hit "Q" all extenders flagged for deletion are
physically deleted. Another nice feature in this section is the
ability to edit extenders. Hit "E" to choose edit. The highlight will
appear. You cal use the left, right, up, and down arrow keys to
navigate the hightlight over the option you wish to change. Then hit
RETURN or SPACE to enter a new value. When finished entering a new
value hit RETURN and the highlight will re-appear so that you may move
it over new things to edit. When finished editing hit "Q" when the
highlight is present. Note that everything in the configuration is
described in the previous paragraph.
-> Edit The Multiple Target File <-
Navigate back to the main menu. Choose "Edit The Multiple Target
File". You will then be shown the current multiple target file. Now
you can either hit "1" to add to it, "2" to delete entries from it or
"3" to quit. Everything here is self-explanatory. A multiple target
file is provided with the program. Credit for it goes to Terminus. It
is kept in ASCII file format for easy editing with your word processor,
if you wish.
-> Build Multiple Extender Library <-
Exit to the main menu and choose "Build Multiple Extender Library".
This is the option to choose to change the flags on extenders. If it
is flagged then it will be one of the extenders used when multiple
extender hacking is chosen. The extenders will be showed, eight to a
page. A "+" in front of the extender means it will be included when
multiple extender hacking is chosen, otherwise it will not. This
option is included because some people don't want to hack all of the
extenders they have configurations for. Editing an extender and
changing the multiple extender flag does the same thing, but this is
easier. If there are more than eight extenders then they will take up
more than one page. You can flip through the pages by choosing "Jump
To Next Page" and "Jump To Previous Page". Hitting RETURN or SPACE
when the highlight is over an extener toggles the flag.
-> Use The Exchange Scanner <-
Navigate back to the main menu and choose "Use The Exchange
Scanner". This is basically the same exchange scanner implemented in
version 1.95 with a couple of changes. You will be prompted with the
exchange to hack, the starting number in the exchange, then the ending
number. If the ending number is not larger than the starting number it
will not be accepted. This is a full screen exchange scanner, and it
will show each of the numbers dialed. Numbers where computers are
detected are shown BLINKING. If the modem does not detect a dial tone
when trying to dial (receives the no dial tone result code) it retrys
the line. After 5 retries it exits the exchange scanner. If the modem
sends a BUSY result code that is logged to the CARRIERS.TXT disk file
along with numbers that produced a CONNECT result code of any baud. It
will specifically log it as a BUSY number or a number that the modem
CONNECTed to. You can then consult the log and dial these numbers back
manually if you wish to ensure that the numbers listed as busy aren't
important. There is a delay of two seconds from the time that the next
number is printed to the screen until the modem actually picks up the
line to dial. This is no problem and is done to ensure the reset of
the hardware.
-> View/Delete Code Files <-
When you choose this option from the main option menu the disk will
be searched for files with a .COD extention. If there are any they
will be displayed. If there are no files with a .COD extention that
will be displayed also. You have the option of viewing one of these
files or deleting one. If you view one it will be one screen at a time
so nothing scrolls past you. Note that the time and date the code was
found is logged for your convienence.
-> View/Delete Carrier File <-
This option is also on the main option menu. All carriers found
when using the exchange scanner are logged to a file called
CARRIERS.TXT, as well as BUSY numbers if the modem sends a BUSY result
code. When viewing the file it will be showed one screen at a time so
nothing scrolls past you. You can also delete the file. Note that the
time and date the number was found is logged for your convienence.
-> Start Hacking <-
After you choose this option you will be prompted as to weather you
want to do Single Extender/Single Target Hacking, Single
Extender/Multiple Target Hacking, Multiple Extender/Single Target
Hacking, Or Multiple Extender, Multiple Target Hacking. If you choose
multiple target hacking of any kind the targets will be read into
memory before hacking begins to cut down greatly on disk access time.
If single extender hacking is chosen you will be prompted for the
extender to hack. Use the arrow keys to highlight the extender you
want then press RETURN or SPACE. If there is more than one page of
extenders then highlight "Jump To Previous Page" and "Jump To Next
Page" to navigate around the list.
WHEN HACKING BEGINS
With version 2.x the hacker has been greatly enhanced. You will be
shown the complete statistics for every extender. Also shown is the
number of codes found, the last code found as well as the number of
codes found for that extender plus other statistics for the current
hacking run for each extender. The number of extenders you can have at
any time is limited only to disk space, of course. Multiple targets
are limited to 500. This is, I think, more than enough. Hit ESCape to
quit hacking at any time. If you forgot to configure your modem and it
is connected to COM2 (the default is COM1) then just hit ESCape to exit
hacking and re-configure the modem. The program won't hang waiting for
input and the ESCape quits at any time. In previous versions it quit
only after the current attempt.
POSIBILITIES DURING HACKING
Many things can happen during hacking. For instance, if the modem
connects the code and extender is logged to it's respective disk file.
If the modem sends an ERROR result code the current attempt is retryed
again. If NO DIAL TONE is detected by the modem the current attempt is
retryed. If NO CARRIER or VOICE is detected by modem the program moves
on. The maximum number of retrys that can ever be done in a row is
five. Oh, if the modem sends a RINGING result code that is also shown
to the user while the modem waits to timeout or connect. Ringing does
nothing but just display "Ringing...". If the modem receives a busy
signal it goes on to another attempt. I origionally planned on making
it retry the code but I remembered that some extenders send a re-order
which is a fast busy signal that can be detected by the modem and send
a BUSY result code.
-> Closing Notes <-
I hope you understood this new documentation. Im not really a good
writer, so if you have any questions leave me a note on The Private
Connection or any other board I am on and I will try to answer it. I
hope you like version 2.1 as I put a LOT of hours and hard work into it
until I was satisfied. If anything goes wrong with the program on your
machine, or anything else in general then leave me a note. I will try
to diagnose the problem and stamp it out.
F i l e s S u p p l i e d W i t h C o d e T h i e f 2 . 2
Make sure that these are the files you received in your ARChive of
Code Thief revision 2.2. If these are not the files then what you got
is something that someone else re-archived and forgot to include
something in. I ask that you only distribute the origional archive
because people have confused themselves in the past.
THIEF.COM - The Code Thief rev. 2.2 Program
THIEF21.DOC - The Documentation To Code Thief rev. 2.2
URGENT.MSG - Things You Need To Know Immediately
EXTENDER.DAT - Sample Extender Configurations To Get You Started
MTARG.DAT - 369 Number Multiple Target File (Telenet Dialups)
Full credit is given to Terminus for the MTARG.DAT file which was
origionally used in the CodeBuster hacker for the IBM with Hayes and
compatible modems. The current version of CodeBuster as of mid-January
1987 is 8.20.