402 lines
22 KiB
Plaintext
402 lines
22 KiB
Plaintext
![]() |
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|
|||
|
PC Pursuit Thief Version 1.0
|
|||
|
By Brew Associates
|
|||
|
An Official Phortune 500 Product
|
|||
|
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|
|||
|
|
|||
|
INTRODUCTION
|
|||
|
|
|||
|
Greetings, <20>again. As with any new program or software package it
|
|||
|
is always a pain to have to go through and read the documentation, <20>and
|
|||
|
this will be no exception (that was a joke). Anyway, these docs should
|
|||
|
be <20>a little more detailed in nature due to the fact that I am <20>writing
|
|||
|
this <20>up on processor #1 <20>on the TMCS network and have PC Pursuit Thief
|
|||
|
running <20>on processor #2. <20>Finally, <20>true <20>distributed <20>multi-tasking!
|
|||
|
Enough of that.
|
|||
|
|
|||
|
PC <20>Pursuit <20>Thief <20>ushers <20>in <20>a <20>new <20>era <20>of <20>hacking <20>utility.
|
|||
|
Currently <20>we have Code Thief, <20>Fuckin' <20>Hacker and others for extender
|
|||
|
hacking, <20>and before PC Pursuit Thief we only had a program called Phry
|
|||
|
Code Pro written by the Exciter. <20>Well, <20>being that competition proves
|
|||
|
advantageous <20>to <20>the <20>community (of course the Code Thief vs. <20>Fuckin'
|
|||
|
Hacker "feature wars" can attest to that), PC Pursuit Thief was born to
|
|||
|
break somewhat of a monopoly. <20>And besides, <20>Phry Code Pro plans on an
|
|||
|
extender hacker in future versions, <20>according to the documentation for
|
|||
|
version 4.0, so to each his own.
|
|||
|
|
|||
|
STARTING PC PURSUIT THIEF
|
|||
|
|
|||
|
There <20>are two ways of starting PC Pursuit Thief from <20>DOS. <20><>The
|
|||
|
first is by just typing PCPTHIEF<return>. If you see it in yourself to
|
|||
|
type "PCPTHIEF<return>" <20>instead of typing "PCPTHIEF" <20>and then hitting
|
|||
|
the <20>return key, <20>you have my permission to put your head through <20>your
|
|||
|
monitor.
|
|||
|
|
|||
|
The <20>second <20>method is by adding some command line <20>paramaters <20>to
|
|||
|
tell PC Pursuit Thief to start hacking in automatic mode at a <20>specific
|
|||
|
time, and then to stop at a specific time, or after a certain number of
|
|||
|
valid PC Pursuit ID's and passwords are found:
|
|||
|
|
|||
|
C>PCPTHIEF 1:00 2:00
|
|||
|
|
|||
|
The above command entered at the command line will have PC Pursuit
|
|||
|
Thief wait until 1:00 <20>am to hack (all times are in 24 hour format) and
|
|||
|
then hack until 2:00 <20>am, or until 1 valid code is found. <20>What? <20>You
|
|||
|
don't want to stop after 1 valid code, <20>but think you can snag 2 before
|
|||
|
2:00? Well, enter this at the command line:
|
|||
|
|
|||
|
C>PCPTHIEF 1:00 2:00 2
|
|||
|
|
|||
|
The <20>2 above is an optional paramater that tells PC Pursuit <20>Thief
|
|||
|
to quit after 2 valid codes (or before 2:00 <20>am, of course) - <20>whatever
|
|||
|
comes first. If you want to strictly quit at 2:00 no matter how many
|
|||
|
codes are found, enter something like:
|
|||
|
|
|||
|
C>PCPTHIEF 1:00 2:00 9999
|
|||
|
|
|||
|
Of course you're not going to get 9999 codes in 1 hour, and that's
|
|||
|
the <20>point. <20><>Remember <20>that this number MUST be an integer, <20><>so <20>the
|
|||
|
highest it can go is 32767, <20>so "PCPTHIEF 1:00 2:00 <20>32767" <20>would have
|
|||
|
the <20>same effect as "PCPTHIEF 1:00 <20>2:00 <20>9999" <20>because if you're <20>not
|
|||
|
going <20>to get 9999 <20>codes in an hour you certainty aren't going to <20>get
|
|||
|
32767.
|
|||
|
|
|||
|
By the way, <20>everything in automatic mode is for FLAGGED templates
|
|||
|
only. <20><>If there are no flagged templates, <20>then once it starts up <20>at
|
|||
|
1:00 it will drop right back to the operating system after it tells you
|
|||
|
that there are none flagged (if you are there of course). <20>You get the
|
|||
|
DOS <20>prompt after PC Pursuit Thief quits, <20>or if you started PC Pursuit
|
|||
|
Thief from a batch file, then the batch file resumes processing.
|
|||
|
|
|||
|
IF PC PURSUIT THIEF IS RUN IN NORMAL MODE
|
|||
|
|
|||
|
Ok, <20><>here's the title screen (yes, <20>I'm looking at it now on <20>the
|
|||
|
other monitor). <20>I added a little disclaimer, <20>being that this utility
|
|||
|
has the sole function of going after one company only (GTE). <20>Again, I
|
|||
|
stress that the use or misuse of this program is totally up to you. If
|
|||
|
you get caught, <20>that's your responsibility, etc, etc. When I wrote it,
|
|||
|
I myself didn't break any laws, but then again is there a legal theaory
|
|||
|
for "kenetic energy", or... forget it.
|
|||
|
|
|||
|
Hit any key to get rid of the title/disclaimer screen. Now you'll
|
|||
|
see <20>my own little "added touch" <20>to the title as the window bounces in
|
|||
|
and <20>out/rotates (depending on how you view it) <20>and puts <20>the <20>program
|
|||
|
title in it.
|
|||
|
|
|||
|
THE MENU
|
|||
|
|
|||
|
Here <20>we go. <20>Kind of looks like Code Thief, <20>doesn't it? <20>Well,
|
|||
|
although <20>it only took me three days (with sleep deprevation) <20>to write
|
|||
|
PC <20>Pursuit Thief, <20>no code from Code Thief was used. <20>I <20>started from
|
|||
|
scratch <20>on everything. <20>Oh, <20>and we're in Turbo Pascal 5.0 <20>now, <20><>so
|
|||
|
things are going to be a little bit faster (I especially like what they
|
|||
|
did to the screen display speed).
|
|||
|
|
|||
|
We'll <20>go <20>over all of the things off the main menu one by <20>one...
|
|||
|
as a matter of fact, <20>it would be best if this documentation is printed
|
|||
|
out FIRST, <20>then you follow the following sections along as the program
|
|||
|
executes.
|
|||
|
|
|||
|
>modem/city configuration
|
|||
|
|
|||
|
Select <20>this. <20><>Just use the up and down arrow keys to <20>move <20>the
|
|||
|
highlight <20>bar <20>and space or return to choose the option of <20>D) <20><>Modem
|
|||
|
Configuration. You could also hit "D" <20>then return or space as a quick
|
|||
|
way of getting the highlight bar there.
|
|||
|
|
|||
|
Ok, <20><>here <20>we have all of the neat things that PC <20>Pursuit <20>Thief
|
|||
|
needs <20>to <20>know <20>about talking to the outside world, <20><>and <20>Telenet <20>in
|
|||
|
particular. <20><>In <20>this <20>section the up and down arrow <20>keys <20>move <20>the
|
|||
|
highlight, <20><>and return or space chooses the option. <20>The letters <20>"A"
|
|||
|
through <20>"J" <20>will take you right to an option with the highlight <20>bar,
|
|||
|
but <20>note that it still takes the pressing of return or space to select
|
|||
|
it.
|
|||
|
|
|||
|
First <20>thing we want to do is tell PC Pursuit Thief <20>what <20>ComPort
|
|||
|
our modem is connected to at. <20>Well, <20>if you have just a COM1: <20><>modem
|
|||
|
then <20>leave <20>it <20>alone, <20>because as you can see the <20>default <20>is <20>COM1:
|
|||
|
(ComPort 1). <20>If your modem is on COM2: <20>or COM3: <20>or COM4: <20>then <20>hit
|
|||
|
space <20>or <20>return when Communications Port is highlighted and then <20>use
|
|||
|
the left and right arrow keys to select your ComPort. <20>Hit return when
|
|||
|
you have the correct one showing on your screen.
|
|||
|
|
|||
|
Now we need the enter the baud rate. Note that the baud rate will
|
|||
|
be <20>the <20>baud rate of the Telenet Number that we will enter <20>in <20>option
|
|||
|
"E", <20><>so keep this in mind and don't screw it up. <20>If your baud <20>rate
|
|||
|
doesn't match the baud rate of the modem that answers when you dial the
|
|||
|
number as choosen in option "E", then you screwed up. The baud rate is
|
|||
|
choosen <20>just <20>like <20>ComPort. <20>Hit space or return when Baud <20>Rate <20>is
|
|||
|
highlighted, <20><>then use the left and right arrow keys to cycle <20>through
|
|||
|
the available baud rates. <20>Use return when your selection is what <20>you
|
|||
|
want (and don't screw up, by the way).
|
|||
|
|
|||
|
The <20>modem <20>setup string is used for just that -- <20>to set <20>up <20>the
|
|||
|
modem. <20><>This <20>entry in your configuration has two special <20>characters
|
|||
|
that have special meanings and are interpreted by PC Pursuit Thief <20>and
|
|||
|
not <20>sent <20>as <20>entered to the modem. <20>They are the "|" <20><>and <20>the <20>"~"
|
|||
|
characters. <20>The "|" signifies ascii character 13 (return) and the "~"
|
|||
|
signifies <20>a 1/4 <20>second pause. <20>Note that in the default a <20>V1 <20><>code
|
|||
|
(verbose <20>on) <20><>is specified. <20>Make sure that your modem is always <20>in
|
|||
|
VERBOSE <20>mode and to keep this V1 <20>here to make sure it is <20>initialized
|
|||
|
into verbose mode.
|
|||
|
|
|||
|
Dial command is the command we will use to dial the modem. <20><>When
|
|||
|
PC <20>Pursuit <20>Thief needs to dial Telenet it will send the following <20>to
|
|||
|
the <20>modem: <20><dialcommand><telenet_number><RETURN>.
|
|||
|
|
|||
|
Connect Response is what the modem sends to signal that we are now
|
|||
|
connected <20>to <20>a <20>remote computer (Telenet). <20><>This <20>all <20>defaults <20>to
|
|||
|
"CONNECT" <20><>with verbose response codes, <20>as defaulted to in <20>C) <20><>Dial
|
|||
|
Command. You shouldn't need to change any of this, <20>it works fine (for
|
|||
|
me) as is.
|
|||
|
|
|||
|
We already went over what Telenet Number is, <20>so just enter it <20>in
|
|||
|
and hit return when you're done.
|
|||
|
|
|||
|
Terminal type. <20>Just leave this at the default of "D1". <20>This is
|
|||
|
what to respond to Telenet with when it prompts for "TERMINAL=". <20><>You
|
|||
|
shouldn't need to change this, <20>I added this because something inspired
|
|||
|
me.
|
|||
|
|
|||
|
Telenet <20>City. <20>PC Pursuit Thief checks the validity of <20>password
|
|||
|
and <20>user id guesses by trying to use them to log into a city. <20><>Enter
|
|||
|
here <20>the default city to try to log into. <20>This should be one with <20>a
|
|||
|
lot of outdial modems available, or is the least congested.
|
|||
|
|
|||
|
City Baud Rate. <20>This option is here because there may be more of
|
|||
|
some groups of modems (by baud rate) <20>in the city you specified. <20>This
|
|||
|
value is changed between 300 Baud, 1200 Baud, and 2400 Baud by pressing
|
|||
|
return <20>or space when I is highlighted and then choosing with the <20>left
|
|||
|
and <20>right <20>arrow keys, <20>then pressing return to <20>make <20>your <20>selection
|
|||
|
permanent.
|
|||
|
|
|||
|
Highlight J) Quit This Section and hit space or return to exit the
|
|||
|
modem <20>Configuration and save your newly entered values (if you changed
|
|||
|
anything... well, <20>you should have changed at least the Telenet number,
|
|||
|
I <20>doubt you'll find Telenet at 000-0000 <20>(the default value) <20>in <20>your
|
|||
|
exchange. <20><>Note <20>that <20>the <20>ESCape <20>key <20>also <20>quits <20>the <20>Modem/City
|
|||
|
configuration section when the highlight is being displayed.
|
|||
|
|
|||
|
>id/password template definition
|
|||
|
|
|||
|
This is option B) <20>off the main menu, <20>so highlight it and <20>choose
|
|||
|
it. <20>Here is where you can change ID and Password templates <20>(remember
|
|||
|
CODE <20>TEMPLATES?). <20>For our purposes the SAMPLE RECORD is ok now <20>(and
|
|||
|
we'll hack on it in a minute) but just a word on what all those strange
|
|||
|
looking Template characters mean:
|
|||
|
|
|||
|
0 - The number 0
|
|||
|
! - All numbers from 0 to 1
|
|||
|
@ - All numbers from 0 to 2
|
|||
|
# - All numbers from 0 to 3
|
|||
|
$ - All numbers from 0 to 4
|
|||
|
% - All numbers from 0 to 5
|
|||
|
^ - All numbers from 0 to 6
|
|||
|
& - All numbers from 0 to 7
|
|||
|
* - All numbers from 0 to 8
|
|||
|
( - All numbers from 0 to 9
|
|||
|
) - All letters from A to Z
|
|||
|
- - All letters from A to Z and all numbers from 0 to 9
|
|||
|
|
|||
|
The <20>reason <20>for these strange template characters is <20>because <20>it
|
|||
|
coresponds to the number that is below the character (unshifted) on the
|
|||
|
keyboard. For instance, % is all numbers 0 to 5. And the key is:
|
|||
|
|
|||
|
+---+
|
|||
|
| % | <- You get this when you press SHIFT.
|
|||
|
| 5 |
|
|||
|
+---+
|
|||
|
|
|||
|
It <20>should be this way on your keyboard as well (it is for all <20>of
|
|||
|
mine).
|
|||
|
|
|||
|
Short <20>note is just something to identify the template with. <20><>If
|
|||
|
you <20>choose the C) <20>Flag/Unflag IDs By Short Note option off <20>the <20>main
|
|||
|
menu you will flag/unflag by looking only at the short notes.
|
|||
|
|
|||
|
(a)dd - hit "A" to append to the template collection and add your own
|
|||
|
|
|||
|
(e)dit <20>- hit "E" <20>to edit the current template. <20>Just use the up <20>and
|
|||
|
down <20>arrow <20>keys to move and hit return or space to edit <20>what <20>you're
|
|||
|
currently pointing to. <20>For the Flagged option, to change it you point
|
|||
|
to <20>it <20>and then hit space or return, <20>then you use the left and <20>right
|
|||
|
arrow <20>keys <20>to <20>change <20>it. <20>Then you hit return <20>again <20>to <20>get <20>the
|
|||
|
highlight <20>back. <20><>When the highlight is displayed you <20>can <20>hit <20>your
|
|||
|
ESCape key to exit editing mode.
|
|||
|
|
|||
|
(d)elete <20>- <20>hit <20>"D" <20>to delete the current template. <20><>You <20>will <20>be
|
|||
|
prompted <20>as to weather you are sure or not. <20>If you choose "Y", <20>then
|
|||
|
the current template is deleted and the template file is "fixed up" <20>to
|
|||
|
reflect <20>the <20>changes. <20>Note that if there is only one record <20>in <20>the
|
|||
|
template file that "D" will have no effect.
|
|||
|
|
|||
|
(f)lag - hit "F" to toggle the flag on the template you are now looking
|
|||
|
at. <20><>This is just a quick way to flag templates when looking <20>at <20>the
|
|||
|
entire <20>template. <20><>To flag templates by short note choose <20>option <20>C)
|
|||
|
Flag/Unflag ID's By Short Note off the main menu.
|
|||
|
|
|||
|
When you're at the "Number or Cmd ->" <20>prompt you can also use the
|
|||
|
left <20>and right arrow keys to page through the template file. <20>If <20>you
|
|||
|
press the right arrow key at the end of the file you will be brought to
|
|||
|
the beginning, <20>and if you press the left arrow key at the beginning of
|
|||
|
the <20>file <20>you <20>will be brought to the end. <20>To jump to <20>an <20>immediate
|
|||
|
record <20>number, <20><>just enter that record number at the prompt <20>and <20>hit
|
|||
|
return. If that record exists you will jump to it.
|
|||
|
|
|||
|
The ESCape key gets you out of the ID/Password Template Definition
|
|||
|
section.
|
|||
|
|
|||
|
>flag/unflag ids by short note
|
|||
|
|
|||
|
This section is pretty self-explanatory. You highlight entries on
|
|||
|
the <20>current <20>page and hit return or space to toggle the flag on <20>them.
|
|||
|
Each <20>page holds 10 <20>records from the template file and you can use the
|
|||
|
Jump <20>To Next Page or Jump To Previous Page to get around in the <20>file.
|
|||
|
If <20>you choose Jump To Next Page or Jump To Previous Page and there <20>is
|
|||
|
no next or previous page then nothing will happen. You can choose Quit
|
|||
|
Flagging mode to get out of this and get rid of the window, or just hit
|
|||
|
ESCape at any time.
|
|||
|
|
|||
|
>view valid password file
|
|||
|
|
|||
|
All <20><>valid <20><>passwords <20>that <20>PC <20>Pursuit <20>Thief <20>finds <20><>go <20><>to
|
|||
|
PCPVALID.LST. <20>This is how you can display the file without exiting PC
|
|||
|
Pursuit Thief. <20>If the file is not found, then it will tell you. <20>You
|
|||
|
can <20>press "D" <20>to delete the file and quit viewing at any time. <20><>Use
|
|||
|
ESCape to quit viewing the file without deleting it, <20>and the <20>SPACEbar
|
|||
|
to continue viewing the file at pauses.
|
|||
|
|
|||
|
>package credits
|
|||
|
|
|||
|
This <20>pops up a window that explains about PC Pursuit Thief, <20><>and
|
|||
|
other neat stuff. <20>Hit ESCape to get rid of it, <20>or hit "B" <20>to see <20>a
|
|||
|
list <20>of some good boards to call. <20>If you are a sysop and <20>want <20>your
|
|||
|
board on this list for any future releases, <20>then drop me a line. <20>The
|
|||
|
ESCape key gets rid of the list of boards, then hit ESCape again to get
|
|||
|
back to the main screen of PC Pursuit Thief.
|
|||
|
|
|||
|
>commence hacking procedure
|
|||
|
|
|||
|
Finally, <20>this is it... <20>where we actually do the actual <20>hacking,
|
|||
|
actually. <20>Choose it and we'll hack the SAMPLE RECORD (make sure <20>it's
|
|||
|
flagged first... <20>choose C) Flag/Unflag IDs By Short Note and make sure
|
|||
|
it's flagged - if not, flag it).
|
|||
|
|
|||
|
Two <20>screens <20>pop <20>up in front of you. <20>The upper screen <20>is <20>the
|
|||
|
"Information <20>Window" <20><>- <20>information about what PC Pursuit <20>Thief <20>is
|
|||
|
doing, <20>etc. The lower screen is the "Communications Window"... <20>input
|
|||
|
and output to and from the modem.
|
|||
|
|
|||
|
The <20>first <20>thing <20>that <20>will happen is it will ask <20>you <20>for <20>the
|
|||
|
starting time to begin hacking at (you will be shown the current system
|
|||
|
time for reference). Enter any times in 24 hour format. For instance,
|
|||
|
23:00 <20><>is 11pm. <20>If you want to start hacking immediately, <20>then <20>hit
|
|||
|
return, thus entering nothing.
|
|||
|
|
|||
|
Next <20>it will ask you for the time to stop the hacking. <20>This <20>is
|
|||
|
also in 24 <20>hour format, of course. <20>If you want to keep hacking until
|
|||
|
the <20>ESCape <20>key is pressed then just hit return here, <20><>thus <20>entering
|
|||
|
nothing. <20><>If you choose a quit time then you are given the option <20>of
|
|||
|
dropping <20>to <20>the <20>operating <20>system (DOS) <20>after this <20>time <20>has <20>been
|
|||
|
reached. <20><><EFBFBD>If <20>you <20>are <20>hacking <20>from <20>the <20>command <20>line <20>then <20>you
|
|||
|
automatically are dropped to DOS after this time.
|
|||
|
|
|||
|
Next <20>it <20>will want to know how many valids to quit <20>after. <20><>The
|
|||
|
default is one. <20>This is because all you may ever want or need is just
|
|||
|
one valid PC Pursuit code. Hit return if you agree with 1.
|
|||
|
|
|||
|
Now hacking begins. <20>If you told PC Pursuit Thief to wait until a
|
|||
|
certain <20>time then the program will pause and wait for that time. <20>You
|
|||
|
will be shown the current time and the time it is waiting for. To quit
|
|||
|
all-together <20>you can hit the ESCape key at any time here and this will
|
|||
|
take you back to the main program menu.
|
|||
|
|
|||
|
Now <20>it <20>will <20>scan for flagged entries and tell you how <20>many <20>it
|
|||
|
found. <20><>If there are no entries flagged then it will tell you, <20><>then
|
|||
|
abort <20>back to the menu screen. <20>The initialization of the modem <20>with
|
|||
|
your modem setup string <20>comes next. <20><>After that it will dial Telenet
|
|||
|
and wait for the string <20>you specified for PC Pursuit Thief to wait for
|
|||
|
(usually "CONNECT") that signals that PC Pursuit Thief is now connected
|
|||
|
to <20>Telenet. <20>If PC Pursuit Thief gets NO CARRIER (because all Telenet
|
|||
|
hunt group modem numbers were busy, <20>possibly -- <20>or some other reason)
|
|||
|
then it will re-dial automatically.
|
|||
|
|
|||
|
After <20>a couple of seconds PC Pursuit thief will send <CR><CR> <20>if
|
|||
|
you're on at 300 <20>or 1200 baud or @<CR> <20>if you are on at 2400 <20>baud to
|
|||
|
Telenet. <20><>Then Telenet will "wake up" <20>and log you in and prompt <20>for
|
|||
|
"TERMINAL=" <20><>which <20>will cause PC Pursuit Thief to <20>respond <20>with <20>the
|
|||
|
Terminal Type you entered in the modem configuration (usually "D1" <20>for
|
|||
|
dumb <20>terminal... <20>this is fastest because I think the other term types
|
|||
|
actually have nulls in them on Telenet).
|
|||
|
|
|||
|
Hacking <20>begins at the "@" <20>prompt, <20>of course. <20>PC Pursuit Thief
|
|||
|
will <20>guess a ID and Password based on the current template and try <20>to
|
|||
|
log into the city you selected in <20>the modem/city configuration section
|
|||
|
with <20>the baud rate have choosen. <20>Note that Telenet doesn't echo <20>the
|
|||
|
password part, <20>so PC Pursuit Thief does this for you -- so you can see
|
|||
|
what the guess is. Now here's how PC Pursuit Thief works. <20>If it gets
|
|||
|
a <20>CONNECT <20>to <20>the <20>city, <20>then it will log the <20>ID <20>and <20>password <20>to
|
|||
|
PCPVALID.LST and hang up on Telenet. The screen values will be updated
|
|||
|
in the Information Window to reflect the found ID and password that was
|
|||
|
valid <20>in the count. <20>If it gets INVALID from Telenet then the ID <20>and
|
|||
|
Password pair was invalid -- <20>and PC Pursuit Thief moves on to <20>another
|
|||
|
guess. <20><>If the @ prompt comes back after PC Pursuit Thief <20>tells <20>you
|
|||
|
that something was in the improper format, <20>then PC Pursuit Thief makes
|
|||
|
another attempt.
|
|||
|
|
|||
|
If <20>the ID and Password pair was valid and you have <20>just <20>reached
|
|||
|
the maximum number of valids that you want, <20>then PC Pursuit Thief will
|
|||
|
quit <20>hacking (and quit to DOS if you started hacking from the <20>command
|
|||
|
line). <20><>PC Pursuit Thief will also quit hacking if you entered a stop
|
|||
|
time <20>and <20>it <20>is <20>now <20>past that time. <20>If you <20>choose <20>Quit <20>To <20>DOS
|
|||
|
(automatically <20>choosen <20>if <20>hacking from the command <20>line) <20><>then <20>PC
|
|||
|
Pursuit <20>Thief will now quit to the operating system and throw you <20>the
|
|||
|
DOS prompt or resume batch file processing (this could be a timed event
|
|||
|
from your bulletin board system, for example).
|
|||
|
|
|||
|
Remember, <20><>while <20>hacking <20>is <20>happening <20>you <20>can <20>look <20>at <20>the
|
|||
|
"Information <20>Window" <20><>to see what the current template <20>is <20>(it <20>will
|
|||
|
choose a template randomly out of the templates that are flagged). <20>If
|
|||
|
Telenet <20>ever hangs up on PC Pursuit Thief, <20>then PC Pursuit Thief will
|
|||
|
call <20>back, <20>log back in again, <20>and resume hacking. <20>Nothing could be
|
|||
|
easier.
|
|||
|
|
|||
|
CONCLUSION
|
|||
|
|
|||
|
That's about it. <20>Everything else is now up to you, as to how you
|
|||
|
configure <20>your <20>templates, <20>etc. <20>Like all Thief utilities <20>I <20>didn't
|
|||
|
include information on the service (PC Pursuit) for a reason... <20>if you
|
|||
|
don't <20>know what it is or how to use it then you have no reason to hack
|
|||
|
on it. <20>If you do know what it is, <20>you can find the information on it
|
|||
|
quickly and easily enough.
|
|||
|
|
|||
|
Hacking <20>PC Pursuit, <20>as I have heard, <20>is a lot harder than <20>just
|
|||
|
extender hacking. <20>But it is safer. <20>PC Pursuit Thief might take <20>all
|
|||
|
night to find a code... then again, no other program could do better or
|
|||
|
worse. <20><>You <20>take <20>all responsibility for your use <20>and/or <20>abuse <20>of
|
|||
|
Telenet. <20><>PC <20>Pursuit <20>Thief was tested on the author's <20>end <20>with <20>a
|
|||
|
"Telenet <20>Simulator" <20><>running on another processor, <20>as well <20>as <20>with
|
|||
|
extensive outside party beta testing. The author does not use or abuse
|
|||
|
the Telenet packet switching data network.
|
|||
|
|
|||
|
Enjoy, and if you know where to reach me, well, <20>you know where to
|
|||
|
reach me . . .
|
|||
|
|
|||
|
FILES FOUND IN PCPTHF10.ZIP ZIPFILE
|
|||
|
|
|||
|
PCPTHIEF.EXE - Executable Binary Code Of PC Pursuit Thief Version 1.0
|
|||
|
PCPTHIEF.DOC - This Documentation To PC Pursuit Thief Version 1.0
|
|||
|
README.NOW - Quick Introduction By Brew Associates
|
|||
|
|
|||
|
please, when uploading this package include all of the files
|
|||
|
as specified in the list above
|
|||
|
|
|||
|
=======================================================================
|
|||
|
(r) Released 1989 === PC Pursuit Thief == Official Phortune 500 Product
|
|||
|
=======================================================================
|
|||
|
|