home *** CD-ROM | disk | FTP | other *** search
- P-Hack Documentation Page 1
- ---------------------------
- | P-Hack 1.0 Documentation. |
- ---------------------------
-
- Hello everyone, and thanks for trying P-Hack. I think that all you SERIOUS
- phreaks out there will find this as usefull and great as I think it is (but
- then I AM the author!). Because I designed this for the serious "hobbyist", I
- won't go into a long string of bullshit describing what an extender is - I'll
- assume everyone who will be using this has a pretty good deal of knowledge
- related to phreaking. I'll go through each section of the program, describing
- just what all those options you see on the screen mean, what keys you can
- press, etc. I hope you enjoy P-Hack, and get many dollars worth of use out of
- it (I'm SURE you will).
-
- Peter King
- 2/15/87
-
-
- NOTE: Starting the program for the first time
- ==============================================
- The first time you bring P-Hack up (by typing "PH", of course), you will be
- ask what type of monitor you have. P-Hack has nice colors if you have a color
- monitor - if not, install for B/W since on a monochrome system, colors tend
- to get translated to funny things like blinking-underline-boldface, etc. You
- only need to do this once - the configuration is written back to the .COM file
- itself and stored permanently. If for any reason you wish to "un-install" the
- program, typing "PH /U" will do it. Also, the first time you run the program,
- the file CARRIERS.PH will be created for you. This is the file which contains
- the numbers of all target computers to be used. The infamous list of telenet
- nodes compiled by Terminus is included INSIDE the .COM file, and when the
- CARRIERS.PH file is created these target numbers (over 350) will be written out
- to the file (which is just a standard text file). This should be MORE than
- enough for you, but facilities are provided from within the program to
- add/delete numbers from the list. THANKS TERMINUS!!
-
-
-
- When P-Hack is started
- ======================
- When started up, P-Hack reads in the data from EXT_LIB.PH, M_PARMS.PH, and
- CARRIERS.PH. You then get a nice little screen telling you that this is
- INDEED P-Hack by Peter King. Then P-Hack will put the modem On-Hook if it is
- Off-Hook. This accounts for the fact that when running a PC Board EVENT,
- PCB leaves the modem Off-Hook.
-
-
-
- P-Hack Documentation Page 2
-
- -------------------
- | Main Menu Options |
- -------------------
-
-
- Add/Edit/Delete Extender Definitions
- =====================================
- P-Hack keeps records in a file named "EXT_LIB.PH" which define different
- parameters for each extender you wish to hack. By parameters, I mean things
- like NAME, NUMBER, CODE LENGTH, etc. Because of this, you don't have to
- re-enter these things everytime you want to hack an extender. P-Hack can keep
- data for up to 50 extenders in the file (I think that's more than enough).
- When you enter this section of the program, you will be presented with a blank
- record that you can fill out to enter a new record into the file. You may
- use the PgUp/PgDn keys to see other records in the file, which you may edit
- at will using the arrow keys, etc. Editing is VERY intuitive - just move to
- the option you want to change with the arrows and start typing. If you look up
- in the "Help Window", it will describe exactly what goes here. The left/right
- arrows move around within fields. Not all keys work in all fields due to the
- particular data type that P-Hack is expecting (you can't type a letter in the
- "Code Length" field, etc). Also, you may not be able to move to every field in
- the record due to the "Code Type" you have entered. For example, if you have
- chosen "SEQuential codes", then you can't move to the "Code Mask" field
- since it doesn't even apply to this record anyway. Don't worry, P-Hack won't
- keep you from moving to any fields that need to be filled in. If you wish to
- delete a record, use the PgUp/PgDn keys to move to that record, and hit F9.
- You will be ask if you are SURE you want to delete it. If you want to add an
- extender, just move to the blank record which is the last one and type in your
- info. Then press F10 to add it - if you accidentaly left out some info. that
- is necessary, you will be informed and the record will not be added. When you
- are finished with all your adding/editing/deleting, press F1 to save the file
- and return to the menu. Each field in an extender record is described below:
-
-
- Name
- ============
- The name of the LD service (or really anything you want...just used
- for your reference).
-
- Number
- ============
- Obviously the number of the extender
-
- Code Length
- ============
- Length of codes used on this service
-
- P-Hack Documentation Page 3
-
- Code Type
- ============
- SPACE toggles between the different methods of code generation:
-
- RANDOM : Codes are generated completely randomly according to
- the code mask (if any).
- SEQuential : Completely sequential codes, starting with the value
- entered for "Start At" and incremented by the value
- you enter for "Increment".
- COMBO : This is a combination Random/Sequential mode. Codes
- are "sequential", but with a random increment. Codes
- start with "Start At" and the random increment is
- between 1 and the number you enter in the "Increment"
- Field.
- BLOCK : P-HACK takes the next X codes, where X is the number
- that you enter in the "Increment" field, and tries
- them randomly. This way, you're sure to have tried
- all the codes, but it does them in a random fashion.
- This "random block" type code generation continues
- until all X are tried, then moves on to the next X,
- etc.....
- BLOCK/STOP : Exactly the same as above, except that P-Hack stops
- hacking this extender after the FIRST block is
- completely through. This is nice for say hacking out
- 1000 sequential codes, but you don't have to do it
- sequentially. Again the block size is what you enter
- in the "Increment" field.
-
-
-
-
- Code Mask
- ============
- If you chose RANDOM, this is the template which determines how codes
- are generated. Any digits are taken as constants, anything else means
- "generate a random digit here". I think everyone is familiar with
- "Code Mask" now since I introduced it in AIO and it's in Code Thief as
- well.
-
- Start At
- =============
- If you choose SEQ,COMBO, BLOCK, or BLOCK/STOP, this is the code at
- which to start hacking.
-
- Increment
- =============
- Varies according to Code Type:
-
- RANDOM : no effect whatsoever.
- SEQuential : Value by which to increment the codes.
- COMBO : Increment is a random number between 1 and
- this value.
- BLOCK : Size of block to randomly hack.
- BLOCK/STOP : Same as above, but since this method stops after
- the first block, this is really the total number
- of codes that you want to hack.
-
- P-Hack Documentation Page 4
-
- NOTE: Say you want to hack XX0000 thru XX1000 - the block size would
- be 1001, not 1000 (don't forget to count the XX0000).
-
-
- Wait Time
- =============
- Total time to wait for carrier detect.
-
- Code File
- =============
- The file to which valid codes are logged. ".COD" is appended to this
- name.
-
- Busy Action
- =============
- SPACE toggles between 5 options of what do if a busy signal is
- detected :
-
-
- 1. IGNORE - Ignores all together.
- 2. CYCLE - Aborts current try and moves on.
- 3. RECORD CODE - records code to Code File.
- 4. RECORD/MARK - similar to above, but a "<*>" is placed next
- to the code in the file to indicate that the code may or
- may not be valid.
- 5. RETRY - Retries code up to 3 times, if it's still busy
- after 3 retries, moves on.
-
-
- S9 Values
- =============
- Value to set the S9 register to. This will thwart attempts by some
- LD services to "fool" hacker programs by putting carrier tones in
- thier recordings. If you use a higher value here, it should ignore
- these tones and recognize only real carriers. It just takes some
- trying to know what value to use for each particular service. The
- value given is in 10ths of a second - consult your modem manual for
- specifics on the S9 register.
-
- P-Hack Documentation Page 5
-
- Dialing Order
- ==============
- This is a totally new concept to code finders so read it carefully
- and be sure you understand it before you attempt to use P-Hack.
-
- The "Dialing Order" is the actual string that is placed after the "ATDT"
- and sent out to the modem. This allows you to change the inner
- workings of the program to adapt to almost any dialing environment.
- Here you enter the characters you want to go out to the modem and in
- what order. Where you want the Extender # dialed, press Ctrl-E, where
- you want the current Access Code, press Ctrl-A, and where you want to
- current Carrier #, press Ctrl-C. A typical string would be:
-
- "<Ctrl-E>,,,<Ctrl-A>,<Ctrl-C>"
- ^
- |
- `-----Of course I mean "press Ctrl-E" here, etc.
-
- which would be shown as:
-
- "E,,,A,C"
- ^ ^ ^
- | | |
- | | |
- /----|---+-+
- |
- |
- |-These would be in a different color to
- signify that they would be expanded.
-
- which would result in the following going out to the modem when
- a code was being tried:
-
- "ATDT<Extender Number>,,,<ThisCode>,<Carrier Number>"
-
-
-
- [------------------ Another Example ------------------]
- If you are hacking out codes on a PBX, the dialing order might be
-
- "<Ctrl-E>,,,9,<Ctrl-A>,<Ctrl-C>"
-
- which would be shown as:
-
-
- "E,,,9,A,C"
- ^ ^ ^
- | | |
- | | |
- +-----+-+-----Different Color.
-
-
- which would result in the following going out to the modem when
- a code was being tried:
-
- "ATDT<Extender (PBX) Number>,,,9,<ThisCode>,<Carrier Number>"
-
- P-Hack Documentation Page 6
-
- This is probably confusing so lets look at some SPECIFIC examples:
-
- ++ Sprint - 9500777
- ----------------
- Sprint requires you to dial in the following order :
-
- 1. Dial 9500777
- 2. Wait a few seconds (about 4 or 6)
- 3. Dial the Access Code
- 4. Wait just a second or two for good measure
- 5. Dial the target number
-
- So we would type the following in the "Dialing Order" field
- -----------------------------------------------------------
-
- "<Ctrl-E>,,,<Ctrl-A>,<Ctrl-C>"
- ^ ^ ^ ^ ^
- | | | | | Tells P-Hack to :
- | | | | |
- `----|-----|---|----|------> 1. Dial extender # (9500777)
- | | | |
- `-----|---|----|------> 2. Wait 6 seconds
- | | |
- `---|----|------> 3. Dial the Access Code
- | |
- `----|------> 4. Wait 2 seconds
- |
- `------> 5. Dial the Carrier (target) #
-
-
- ++ MCI Calling Card - 9501022
- -----------------------------
- This service requires you to dial in the following order:
-
- 1. Dial 9501022
- 2. Wait 6 seconds
- 3. Dial 0
- 4. Dial the target number
- 4. Wait 2 seconds for the tone
- 5. Dial the Access Code
-
- So we would type the following in the "Dialing Order" field
- -----------------------------------------------------------
-
- "<Ctrl-E>,,,0<Ctrl-C>,<Ctrl-A>"
- ^ ^ ^ ^ ^ ^
- | | | | | | Tells P-Hack to:
- | | | | | |
- `----|-|----|---|----|------>1. Dial extender # (9501022)
- | | | | |
- `-|----|---|----|------>2. Wait 6 seconds
- | | | |
- `----|---|----|------>3. Dial 0
- | | |
- `---|----|------>4. Dial the Carrier (target) #
- | |
- `----|------>5. Wait 2 seconds
- |
- `------>6. Dial the Access Code
-
- P-Hack Documentation Page 7
-
- By using the "Dialing Order", you can make P-Hack hack virtually ANY
- system that uses codes!! This includes extenders, PBX, and anything
- else you can think of. As you can see, anything but the three special
- Ctrl Characters (E,A,and C) is taken literally and actually inserted in
- the dialing string. UNLIMITED FLEXIBILITY - that's what it's all
- about!
-
-
-
- Add/Delete Carrier From List
- =============================
- Here you can add or delete numbers from the CARRIERS.PH file. Of course you
- could do this with any text editor, but you should do it from here since when
- adding P-Hack checks to make sure you are not duplicating a number that is
- already in the file. This is a very self-explaining section so I won't waste
- mine or your time describing it.
-
-
- Tag/UnTag Extenders For Hacking
- ================================
- For each extender record in the EXT_LIB.PH file, P-Hack maintains two "flags".
- These "flags" determine whether or not this extender is hacked at a certain
- time. The two flags are "Tag" and "AutoHack". All extenders with the "Tag"
- flag turned on will be hacked when the "Begin Hacking" option is chosen from
- the main menu. All extenders with the "AutoHack" tag turned on will be hacked
- when an AutoHack session is initiated (AutoHack is explained later). After
- choosing this option from the menu, you will be presented with a list of all
- the extenders in your EXT_LIB.PH file, and beside each will be the current
- status of the its flags. The symbol "*" beside an extender name means that
- the "Tag" flag is turned on, and the symbol "A" means that the "AutoHack"
- flag is turned on. You can have both, one, or none of the flags turned on at
- one time, and there is no limit to the number of extenders that can be hacked
- together (IE-you could turn on the flags for every extender in your file if
- you wanted to hack all of them). Use the arrows to move around in the listing.
- Pressing "T" will toggle the "Tag" flag for the extender that you are sitting
- on, and "A" will toggle the AutoHack flag. F1 saves your changes and returns
- to the Main Menu.
-
-
- Begin Hacking
- ==============
- Gee..wonder what that means?? Start hacking all the extenders with the "Tag"
- flag turned on. If there are less than 5 extenders "Tag"ed, then the
- extenders are hacked sequentialy, otherwise the extender to be hacked is chosen
- at random. The target number is of course chosen randomly. You are prompted
- for 2 things here:
-
- 1> A time at which to stop hacking (pressing RETURN here will cause
- P-Hack to just hack until ESC is pressed).
- 2> An optional number of minutes to delay between each attempt. Just
- leave this as 0 to hack without delaying between attempts.
-
- During hacking, you can press the SPACE bar to skip to the next attempt, "P" to
- skip and pause, and ESC to abort hacking. The data for the extender being
- hacked is displayed on the screen, as well as data for the entire hacking
- session (total attempts, total codes found, etc). Several things can happen
- during hacking:
-
- P-Hack Documentation Page 8
-
- 1. If a carrier is detected, the code is written out to the file
- specified by "Code File" in the extender record, and P-Hack
- skips to the next try.
- 2. If a busy signal is detected, the action taken depends on what
- you chose in the extender record (see above).
- 3. If "NO DIALTONE" or "NO DIAL TONE" is detected, the code is retried
- up to 3 times.
- 4. If "NO CARRIER" is detected, P-Hack skips to the next attempt.
- 5. If "ERROR" is detected, P-Hack skips to the next attempt.
- 6. If nothing happens during the time specified as "Wait Time", P-Hack
- just moves on to the next attempt.
-
-
- After hacking is over, the results for each extender (total tries, number of
- codes found, etc) are written to a text file "PH.LOG" which can be viewed
- from within P-Hack with a menu option or from DOS or whatever.
-
-
- Misc. Notes about the Hacking section
- --------------------------------------
- 1> If you are using the SEQuential or COMBO code type for an extender, the
- last code that was tried is saved back to the extender record in the
- "Start At" field, so you can pick back up where you left off the next time
- you begin to hack - if you are using BLOCK or BLOCK/STOP, the number at the
- "top" of the last block is saved back to the "Start At" field, so you can
- start back at approximately the same location you stopped at : I mean if
- you have Block Size = 1000, then you could theoretically have 999 codes
- repeated (since P-Hack does not save which codes in that block have been
- tried), but if you use a smaller block size, you won't get much repetition.
- 2> When you see "(BK = NNNN)" shown next to the BLOCK or BLOCK/STOP code types,
- that means the block size is NNNN, when you see "Random 1<X<NN" next to the
- COMBO code type, that means that the increment is a random number between
- 1 and NN, and when you see "Step = NN" beside the SEQuential code type,
- that obviously means that the increment step = NN.
- 3> P-Hack will probably NEVER abort EXACTLY at the time you give it to stop
- (if any) - it recognizes that it has passed that time and aborts after the
- current try is finished.
-
-
-
- View/Delete A Code File
- ========================
- You will be shown a list of all the files with the extention ".COD" that are
- in the current directory. You may then view or delete any of those. Pretty
- damn simple.
-
-
- View PH.LOG
- ============
- Use this to view the "PH.LOG" file I spoke of in the section "Begin Hacking".
-
-
- P-Hack Documentation Page 9
-
- Modify Modem Parameters
- ========================
- Here you can configure the InitString for you modem, tell P-Hack how to detect
- carrier, hang up, etc/etc/etc. The options should be very familiar to you, and
- looking up in the "Help Window" should answer any questions you have. P-Hack
- can detect carrier in two different ways - 1) It can read the pin on the RS-232
- port (in which case you should set your modem switches to NOT force CD), or it
- can 2) look for a string returned from the modem (like "CONNECT"). The pin
- read method is far superior, but both work just fine, so use the one most
- suited to your particular situation. Same goes for how to hang up - P-Hack
- can either 1) Drop DTR (in which case you should set your switches NOT to force
- DTR), or it can 2) Use the standard Escape Code technique (+++,,ATH0). Use
- whichever one you need to. I have also added an "Exit String" so you can
- reset any registers/options you need to when exiting P-Hack. BTW-The default
- values are those for the Hayes 2400, so if that's your modem, there is no need
- to mess with these.
-
-
-
- Program Info.
- ==============
- On this screen you will find some info. and bullshit about P-Hack and where I
- can be contacted if necessary.
-
-
- Exit
- =====
- Leave P-Hack. The line is put On-Hook and the "Exit String" is sent out.
-
-
-
-
- -----------------------------------------
- | AutoHack - What it is and how to use it |
- -----------------------------------------
- AutoHack is one of the most powerful features of P-Hack and certainly the most
- usefull if you're a SysOp. AutoHack is simply a way by which hacking can take
- place automatically from the DOS command line without any user intervention
- whatsoever. To initiate an autohack session, simply type
-
- "PH /AXX:XX:XX /DYY"
- ^^^^^^^^ ^^
- | |
- | |
- | |
- | |
- `-------|----> Where this is the time at which you wish to
- | stop hacking. This must be given in standard
- | 24hr format.
- |
- `----> This is OPTIONAL and allows you to give the number of
- minutes to delay between attempts if you want to.
- Note that if both parameters are given, they MUST be
- given in this order - time first, delay second.
-
- P-Hack Documentation Page 10
-
- For Example :
-
- PH /A05:00:00 Hacks until 5am. \ The extenders hacked are the ones
- |---> with the AutoHack tag turned on
- PH /A17:00:00 /D2 Hacks until 5pm, / (see Tag/UnTag above).
- delaying 2 mins.
- between attempts. ^ ^
- | IMPORTANT |
- | |
- `--==> READ THIS <==--'
-
-
- Note that you must supply ALL zeros in the string!! Otherwise you will just
- get a message saying that you have entered an invalid time and be kicked
- back out to the DOS prompt. After the AutoHack session is over, the file
- "PH.LOG" is written out (just like in a normal session) and control is
- returned to DOS (or the .BAT file which ran "PH /AXX:XX:XX"). This is GREAT
- for PC Board SysOps - imagine : set up an EVENT at 3am which contains
- "PH /A05:00:00" - the board would come down, hack codes for 2 hours, then
- bring itself back up - WITH NO EFFORT AT ALL ON YOUR PART!!!!!!
-
- NOTE: Basically anywhere you are in the program, ESC will take you back
- to the main menu.
-
- ================
- | Special Thanks |
- ================
- These are the people who helped me test P-Hack, and I am very grateful for
- their help and suggestions. Thanks a million, guys!!
-
- ----------------
- | Matt Burleigh |
- | Rick Inaboks |
- | Kurt Schelin |
- ----------------
-
-
-
- Well, that's about it - I hope you enjoy this program as much as I do every
- day! If you have any suggestions, leave me E-Mail on Burleigh's BBS, Serenity,
- The Escape Hatch, RipCo, or Slaughterhouse Five. I WELCOME suggestions - if
- they are resonable I will be happy to include them in the next revision. Keep
- in mind that I am a striving college student, so don't expect revisions every
- 2 weeks - I'll do it as soon as I can, but I won't leave you guys hanging.
- If there's a BUG, I'll fix it right away and get the new version up ASAP.
- I tried to make this .DOC as understandable as possible, but hell I'm a
- Chemistry major so communication may not be my strongest point - so if you have
- any questions don't hesitate to leave me mail on any of the systems mentioned
- above. I call each at least once a day (boy, my bill must be high, huh??).
-
-
- Cheers and be careful!!
-
- Pete
-
- P-Hack Documentation Page 11
-
- Footnotes - What your Modem Initialazation String should do
- ------------------------------------------------------------
- The Modem Init String that you give for your modem should accomplish the
- following (suggestions given are for standard Hayes):
-
- 1. Set "Wait for carrier after dial" to some ridiculously high value
- like 60 or even greater - P-Hack will handle the waiting and
- hanging up for you. (S7=60)
- 2. Enable result codes. (Q0)
- 3. Enable Long-Form result codes (STRINGS!!! NOT NUMBERS !!). (V1)
- 4. Set modem to return extended result codes if available
- (like BUSY, NO DIALTONE, VOICE, etc). (X4)
- 5. Inhibit Command Echo. (E0)
- 6. Turn speaker off or on depending on your preference.
- 7. If you are using ESCAPE CODE hangup, be sure to set the
- Escape Code Guard Time to 10. (S12=10)
-
- NOTE : The default strings for the Hayes 2400 also set the CD and DTR
- not to be forced, enabling you to use PIN carrier detection and
- DTR hangup.
-
- ANOTHER NOTE : You can check the ERRORLEVEL if running P-Hack from a
- .BAT file - ERRORLEVEL 1 means something went wrong,
- ERRORLEVEL 0 means everrything was A-OK.
-
-
- Explaination of Code Mask
- --------------------------
- Well, at the last minute I decided that I SHOULD put something in about what
- the "Code Mask" is, since perhaps some of you have not used AIO or THIEF. So
- here it is....The code mask allows you to set any number of digits in a RANDOM
- code to constants. For instance, if you were hacking 6 digit RANDOM codes, a
- code mask of "45xx8x." would result in codes like 456289,451188,450080, etc.
- Any character in the mask which is not a numeral is taken to mean "generate
- a random number here". Note that if you just wanted to set the first three
- digits of a six digit code to 632, a mask of "632" would work just fine.....
- there's no need to fill out the remaining spaces with periods or whatever.
- If no code mask is specified, all digits are generated randomly. This mask
- allows for a great deal of flexibility in hacking access codes.
-
- P-Hack Documentation Page 12
-
- Examples
- =========
- RANDOM 9 digit codes, with a "Code Mask" of
-
- '901xxxxx1'
- ^^^ ^ ^
- | | | What it means:
- | | |
- `---|--|------> "Always put '901' here".
- | |
- `--|------> "Generate 5 random digits".
- |
- `------> "Always put '1' here".
-
- could result in the following codes being produced:
-
- 901352351
- 901000001
- 901999991
- ^^^ ^ ^
- | | |
- | | |
- `---|--|-------> Constant - always '901'
- | |
- `--|-------> Random 5 digits
- |
- `-------> Constant - always '1'
- ------------------------------------------------------------------------------
- RANDOM 6 digit codes, with a "Code Mask" of
-
- '521'
- ^^^ What it means:
- |
- `-------------> "Always put '521' here".
-
- * NOTE * ---> The remainder up to
- "Code Length" is assumed to
- be random digits.
-
- could result in the following codes being produced:
-
- 521354 \ First 3 digits are constant
- 521000 |-------> at '521', last 3 are randomly
- 521999 / generated.
-
-
- Have Fun....Pete
-