home *** CD-ROM | disk | FTP | other *** search
-
- T h e C o d e T h i e f
- R e v i s i o n 2 . 2 D o c u m e n t a t i o n
- B y B r e w A s s o c i a t e s
-
- -> Welcome To Code Thief 2.2 <-
-
- It is exactly 2 days since Code Thief 2.1 has been released, and
- already 2.2 is out? Yes. I modified something in 2.1 and didn't check
- on previous work and thus, during hacking your display got screwed up
- if you selected multiple-port hacking or hacked any other way than
- random. Sorry. To make up for it I have added a NEW feature. This is
- the ability to hack FROM DOS. That's right. Enter "THIEF 1:00" from
- the DOS command line and Code Thief will hack with multiple targets and
- multiple extenders (if found) until 1:00 am. This is great for putting
- it in a BBS's batch file (or something like a Fido or Opus external
- event if you run a board like that). When the time specified on the
- command line comes Code Thief will exit to DOS right back into the
- batch file. Now wasn't that neet?
-
- -> Welcome To Code Thief 2.1 <-
-
- Well, since I released Code Thief 2.0 a few minor bugs have popped
- up and have been fixed (they were really stupid ones too) and also a
- number of suggestions have been incorporated into the program. One of
- these is the ability to have a user defined initialization string.
- This allows you to send anything you want to the modem (IE ATX6 for
- advanced modems so that it recognizes the extended result codes). This
- means that the MODEM.DAT file has been changed, so delete it and start
- over or it will only screw things up. Repeat: DELETE YOUR OLD
- MODEM.DAT FILE. Then re-do your configuration. This should only take
- about a minute. Also, someone told me that their modem sent ";" and
- ":" as a result code. Wierd. I modified the program to accept those
- too as a result code. I also fixed the double boarder windows and made
- them a single boarder window. The old window frames started to get on
- my nerves. Most likely this will be the last release of Code Thief
- unless something comes up in another program that would threaten my
- work to be obsolete. I doubt any bugs will craw out of this, as I have
- been running extensive hack-tests on the program.
-
- -> Welcome To Code Thief 2.0 <-
-
- Welcome to CODE THIEF revision 2.0! It's been quite some time since
- a version of the Code Thief has been released and I am quite sure that
- this one will please everyone. Code Thief has been TOTALLY redone and
- now has a completely different user interface as well as BETTER hacking
- and scanning capabilities! This is, again, a TOTAL re-write of the
- documentation because the program has been re-written. Some of the
- code from version 1.95 has been used but note that 95% of the program
- is totally new. Read this documentation or you will not know what you
- are doing. If you remember Code Thief version 1.95 then revision 2.0
- will seem like a totally different program.
-
- -> From The Author <-
-
- A LOT of work has gone into the Code Thief project, especially
- revision 2.x of the program. If you support the program then be sure
- to leave a message to me, Brew Associates, about it with any questions
- or comments you might have.
-
- -> Starting The Program <-
-
- To start the program normally, enter THIEF from DOS. You can also
- enter THIEF xx:xx from DOS (substitute a valid time for xx:xx) and Code
- Thief will automatically hack the flagged multiple extenders with
- multiple targets until the time specified, then drop back out to DOS.
- This is great for a BBS's batch file. For instance, you can have your
- BBS invoke a batch file at a certain time. This batch file could say
- something like THIEF 5:30. This will invoke multiple target/multiple
- extender hacking until 5:30 am. Note that all times are in 24 hour
- mode. Also, if no multiple targets are found the defaults are
- automatically used. This modification is on the request of an Opus BBS
- sysop. Hope it comes in handy.
-
- IF THE PROGRAM IS STARTED NORMALLY
-
- When you first start the program you will see the main option menu.
- At this and any menu you can use the up and down arrow keys to move the
- highlight over an option and press RETURN or the SPACEBAR to finally
- choose the option. I will try to move you through the running of the
- program to get it working on your machine so it is suggested that you
- print this documentation out and work the actual program as you read
- it.
-
- -> Setting Your Modem Paramaters <-
-
- The first thing you will probably want to do is set your modem
- paramaters. Use the up and down arrow keys to move the highlight over
- option "H" on the main option menu then hit CR or RETURN, or just hit
- "H" then CR or RETURN. You will be greated with three more options.
- First choose "Modem Specifics". This is where you can set the
- paramaters for your particular modem. If a default doesn't match your
- configuration then use the up and down arrow keys to move the highlight
- over the option then hit RETURN or SPACE. The highlight will disappear
- and the origional value will also. Now you can key in a new value,
- remembering to hit RETURN after you are finished.
-
- MODEM SPECIFICS
-
- COM Port - This can be either 1 or 2 for COM1 and COM2.
- Baud Rate - Enter the baud rate to open the modem at whenever
- hacking or scanning is performed.
- PBX Mode - Enter "Y" or "N" for this. If you are in a building
- with a PBX then you have to enter "Y" for this option.
- PBX Digit - This is the PBX digit. When you are in a building
- with a PBX installed a certain digit has to be dialed
- to receive an outside line. This will only be sent if
- PBX mode is set to "Y"es in the previous above.
- PBX Delay - This is the number of seconds after entering the PBX
- digit to wait for the outside line.
- Hangup Mode - You can enter "D" or "E" here. Entering "D" means
- that DTR will be forced false to cause the modem to
- hang-up. If your modem DIP switches are not set
- properly DTR will not work. Then you should choose
- "E" so that the modem hangs up using the escape
- sequence. Whenever the modem connects to a remote
- computer the program will now hang up by sending "+++"
- to the modem until it responds, then sending "ATH0".
- It's tested and works great for me. It should for you
- also.
- Speaker On - Hit "Y" to keep the speaker on during hacking and
- scanning or "N" to keep it off.
- Dial Tone Wait - This is the number of seconds the modem is to wait
- after picking up the line until starting to dial.
- Carrier Detect - This is the number of 1/10 seconds that a carrier must
- be present for the modem to detect it as valid. This
- defeats some LD service's fake-carrier routines that
- send a fake carrier for a short period of time.
- Remember that REAL carriers are sent for a longer
- period of time than fake carriers.
- Dialing Speed - This is the speed of the touchtone dialer. This is
- in 1/100 of a second. This number can range from 50-
- 255.
- User String - If there is something entered here then it is sent out
- to the modem. If you have an advanced modem, then set
- it to "ATX6" to enable your extended result codes for
- such things as VOICE, etc. You can over-ride the
- "Speaker On" setting by making this "ATM1". That
- would be stupid, but it's just an example.
-
- MODEM RESULT CODES
-
- In this section you enter the result codes that your modem uses when
- in non-verbose mode. Note that the defaults should suffice. If you
- have a strange modem configuration you can change these.
-
- -> Edit Extender Configurations <-
-
- The next thing you will want to do is create configurations for the
- different extenders you wish to hack. Choose "Edit Extender
- Configurations" after you exit back to the main options menu. You will
- be prompted with another menu. Choose "Add An Extender". Now you will
- be given the opportunity to enter the complete configuration for the
- extender. The first thing is the telephone number of the extender.
- After that is a short note used to identify the extender. Note that
- throughout the program in various sections extenders are refered to by
- this short note, so make sure it is something you can easily recall.
- You can make it the number of the extender if you wish. Anything goes
- here. Don't leave it blank or it will become confusing as hell. Next
- is the length of the codes. For METRO it is 6, MCI calling cards it is
- 14, etc... Next is the code template. This idea is borrowed from
- another program because I think it is a very powerfull feature. If
- this is used it completely over-rides the code length, hacking mode,
- starting code, and sequential increment in your configuration. Anyway,
- here you are to construct a "template" for your codes. For instance,
- entering "444XXX" will make every code 6 digits and starting in 444.
- Entering "0X1X2X" will make set the first, third, and fifth numbers in
- every code to 0,1, and 2 respectively and the second, fourth, and sixth
- number in each code will be totally random. Commas are also allowed in
- the code template and will cause the modem to pause for 2 seconds. For
- instance, XXXX,9 will cause a random 4 number code to be sent, a pause
- for 2 seconds, then a 9 will be sent. This is good for hacking PBX's
- that require a code be sent then need a number for an outside line.
- Next you will enter the code delay. This is the number of seconds to
- delay before sending the code. Then you will enter the target delay.
- This is the number of seconds to wait until entering the target number.
- Notice that also in the config is an option to put the code first or
- not. If the code is sent first then the Code Delay should be the
- number of seconds to wait after dialing the extender until the code is
- sent after the extender answers and provides a dial tone. If the code
- is not sent first then the target number will be sent first. The
- target delay should be the number of seconds to wait after dialing the
- extender until the target is sent at the extender's dialtone. Then the
- code delay is the number of seconds to wait until sending the code
- AFTER the target number is sent. The timeout is next. This is the
- number of seconds to wait for your TARGET number to answer. If it
- doesn't answer within this time the code is considered invalid. Next
- is the hacking mode. Enter "R", "S" or "B" here. "R" means totally
- random codes. "S" means sequential codes. "B" means both - sequential
- codes with a random increment. Next you enter the starting code. You
- do not need to enter this if random hacking is chosen. With random
- hacking each digit of the code is picked totally randomly. Next you
- enter the sequential increment. Is sequential hacking is chosen then
- this is the number to increment each code by. Now you will be prompted
- as to if the code should be entered first. Hit "Y" for yes. If you
- hit "N" then the target will be sent first. Next is the target prefix
- digit. This is a number to add to the beginning of the target number.
- For example, for the MCI calling card service you enter the target
- first and prefix it with a "0". ITT requires that the target be sent
- first and be prefixed by a "1". Other services require that the CODE
- is sent first and the target has NO prefix. Next is the multiple
- extender flag. If you hit "Y" then the extender will be flagged
- immediately as one to be used when Multiple Extender hacking is chosen.
- If you hit "N", then this extender will be put on reserve. More on
- this comes later. Next is multiple port mode. Say the extender number
- is 950-1000 and the extender has multiple port hunt groups from 950-
- 1000 to 950-2000. If you wish to randomly choose the port to dial out
- to enter "Y" here then enter the ending port when prompted. Now it
- will randomly dial numbers with an extention in the range of 1000-2000
- in the 950 prefix. If you hit "N" for multiple port mode, hit CR to
- skip over the entry of the ending hunt number. Next you will enter the
- filename to place valid codes in. Valid codes are logged with the time
- and date for convienence. All valid code files end with the ".COD"
- extention. When finished entering this information it is saved to
- disk. All extenders are saved in the EXTENDER.DAT file.
-
- Choosing "Edit Extenders" instead of "Add An Extender" brings you to
- a different screen. If no extenders are defined you are told so. You
- will be shown the complete information that has been entered for the
- first extender. To navigate through the configurations use the LEFT
- and RIGHT arrow keys. To flag an extender for deletion enter "D". You
- will be prompted to enter "Y" if you are sure or "N" if you are not.
- Once an extender has been flagged for deletion it will be skipped over
- when you use the left and right arrow keys. Hit "Q" to quit this
- section. When you hit "Q" all extenders flagged for deletion are
- physically deleted. Another nice feature in this section is the
- ability to edit extenders. Hit "E" to choose edit. The highlight will
- appear. You cal use the left, right, up, and down arrow keys to
- navigate the hightlight over the option you wish to change. Then hit
- RETURN or SPACE to enter a new value. When finished entering a new
- value hit RETURN and the highlight will re-appear so that you may move
- it over new things to edit. When finished editing hit "Q" when the
- highlight is present. Note that everything in the configuration is
- described in the previous paragraph.
-
- -> Edit The Multiple Target File <-
-
- Navigate back to the main menu. Choose "Edit The Multiple Target
- File". You will then be shown the current multiple target file. Now
- you can either hit "1" to add to it, "2" to delete entries from it or
- "3" to quit. Everything here is self-explanatory. A multiple target
- file is provided with the program. Credit for it goes to Terminus. It
- is kept in ASCII file format for easy editing with your word processor,
- if you wish.
-
- -> Build Multiple Extender Library <-
-
- Exit to the main menu and choose "Build Multiple Extender Library".
- This is the option to choose to change the flags on extenders. If it
- is flagged then it will be one of the extenders used when multiple
- extender hacking is chosen. The extenders will be showed, eight to a
- page. A "+" in front of the extender means it will be included when
- multiple extender hacking is chosen, otherwise it will not. This
- option is included because some people don't want to hack all of the
- extenders they have configurations for. Editing an extender and
- changing the multiple extender flag does the same thing, but this is
- easier. If there are more than eight extenders then they will take up
- more than one page. You can flip through the pages by choosing "Jump
- To Next Page" and "Jump To Previous Page". Hitting RETURN or SPACE
- when the highlight is over an extener toggles the flag.
-
- -> Use The Exchange Scanner <-
-
- Navigate back to the main menu and choose "Use The Exchange
- Scanner". This is basically the same exchange scanner implemented in
- version 1.95 with a couple of changes. You will be prompted with the
- exchange to hack, the starting number in the exchange, then the ending
- number. If the ending number is not larger than the starting number it
- will not be accepted. This is a full screen exchange scanner, and it
- will show each of the numbers dialed. Numbers where computers are
- detected are shown BLINKING. If the modem does not detect a dial tone
- when trying to dial (receives the no dial tone result code) it retrys
- the line. After 5 retries it exits the exchange scanner. If the modem
- sends a BUSY result code that is logged to the CARRIERS.TXT disk file
- along with numbers that produced a CONNECT result code of any baud. It
- will specifically log it as a BUSY number or a number that the modem
- CONNECTed to. You can then consult the log and dial these numbers back
- manually if you wish to ensure that the numbers listed as busy aren't
- important. There is a delay of two seconds from the time that the next
- number is printed to the screen until the modem actually picks up the
- line to dial. This is no problem and is done to ensure the reset of
- the hardware.
-
- -> View/Delete Code Files <-
-
- When you choose this option from the main option menu the disk will
- be searched for files with a .COD extention. If there are any they
- will be displayed. If there are no files with a .COD extention that
- will be displayed also. You have the option of viewing one of these
- files or deleting one. If you view one it will be one screen at a time
- so nothing scrolls past you. Note that the time and date the code was
- found is logged for your convienence.
-
- -> View/Delete Carrier File <-
-
- This option is also on the main option menu. All carriers found
- when using the exchange scanner are logged to a file called
- CARRIERS.TXT, as well as BUSY numbers if the modem sends a BUSY result
- code. When viewing the file it will be showed one screen at a time so
- nothing scrolls past you. You can also delete the file. Note that the
- time and date the number was found is logged for your convienence.
-
- -> Start Hacking <-
-
- After you choose this option you will be prompted as to weather you
- want to do Single Extender/Single Target Hacking, Single
- Extender/Multiple Target Hacking, Multiple Extender/Single Target
- Hacking, Or Multiple Extender, Multiple Target Hacking. If you choose
- multiple target hacking of any kind the targets will be read into
- memory before hacking begins to cut down greatly on disk access time.
- If single extender hacking is chosen you will be prompted for the
- extender to hack. Use the arrow keys to highlight the extender you
- want then press RETURN or SPACE. If there is more than one page of
- extenders then highlight "Jump To Previous Page" and "Jump To Next
- Page" to navigate around the list.
-
- WHEN HACKING BEGINS
-
- With version 2.x the hacker has been greatly enhanced. You will be
- shown the complete statistics for every extender. Also shown is the
- number of codes found, the last code found as well as the number of
- codes found for that extender plus other statistics for the current
- hacking run for each extender. The number of extenders you can have at
- any time is limited only to disk space, of course. Multiple targets
- are limited to 500. This is, I think, more than enough. Hit ESCape to
- quit hacking at any time. If you forgot to configure your modem and it
- is connected to COM2 (the default is COM1) then just hit ESCape to exit
- hacking and re-configure the modem. The program won't hang waiting for
- input and the ESCape quits at any time. In previous versions it quit
- only after the current attempt.
-
- POSIBILITIES DURING HACKING
-
- Many things can happen during hacking. For instance, if the modem
- connects the code and extender is logged to it's respective disk file.
- If the modem sends an ERROR result code the current attempt is retryed
- again. If NO DIAL TONE is detected by the modem the current attempt is
- retryed. If NO CARRIER or VOICE is detected by modem the program moves
- on. The maximum number of retrys that can ever be done in a row is
- five. Oh, if the modem sends a RINGING result code that is also shown
- to the user while the modem waits to timeout or connect. Ringing does
- nothing but just display "Ringing...". If the modem receives a busy
- signal it goes on to another attempt. I origionally planned on making
- it retry the code but I remembered that some extenders send a re-order
- which is a fast busy signal that can be detected by the modem and send
- a BUSY result code.
-
- -> Closing Notes <-
-
- I hope you understood this new documentation. Im not really a good
- writer, so if you have any questions leave me a note on The Private
- Connection or any other board I am on and I will try to answer it. I
- hope you like version 2.1 as I put a LOT of hours and hard work into it
- until I was satisfied. If anything goes wrong with the program on your
- machine, or anything else in general then leave me a note. I will try
- to diagnose the problem and stamp it out.
-
-
- F i l e s S u p p l i e d W i t h C o d e T h i e f 2 . 2
-
- Make sure that these are the files you received in your ARChive of
- Code Thief revision 2.2. If these are not the files then what you got
- is something that someone else re-archived and forgot to include
- something in. I ask that you only distribute the origional archive
- because people have confused themselves in the past.
-
- THIEF.COM - The Code Thief rev. 2.2 Program
- THIEF21.DOC - The Documentation To Code Thief rev. 2.2
- URGENT.MSG - Things You Need To Know Immediately
- EXTENDER.DAT - Sample Extender Configurations To Get You Started
- MTARG.DAT - 369 Number Multiple Target File (Telenet Dialups)
-
- Full credit is given to Terminus for the MTARG.DAT file which was
- origionally used in the CodeBuster hacker for the IBM with Hayes and
- compatible modems. The current version of CodeBuster as of mid-January
- 1987 is 8.20.
-
-