492 lines
31 KiB
Plaintext
492 lines
31 KiB
Plaintext
![]() |
|
|||
|
=======================================================================
|
|||
|
|
|||
|
|
|||
|
C o d e T h i e f D e l u x e
|
|||
|
R e v i s i o n 3 . 5 D o c u m e n t a t i o n
|
|||
|
B y B r e w A s s o c i a t e s
|
|||
|
|
|||
|
A N O F F I C I A L P H O R T U N E 5 0 0 P R O D U C T
|
|||
|
|
|||
|
=======================================================================
|
|||
|
|
|||
|
-> Introduction To Code Thief Deluxe 3.5 <-
|
|||
|
|
|||
|
Well, here it finally is. Code Thief Deluxe 3.5. If you are new to
|
|||
|
Code Thief, this is the file to read. If you are already familiar with
|
|||
|
Code <20>Thief, <20>especially if you have Code Thief 3.0 <20>already, <20>you <20>can
|
|||
|
check <20>out just the new additions and updates to Code Thief <20>Deluxe <20>by
|
|||
|
reading DELUXE.DOC, included in your Code Thief Deluxe ZIPfile.
|
|||
|
|
|||
|
As an incentive to read the documentation, <20>I <20>have tried to lay out
|
|||
|
all <20>of the 'little things' <20>about the program and its behavior. <20>This
|
|||
|
will <20>help you understand more. <20>Also notice that Code Thief does <20>not
|
|||
|
make any direct screen writes. <20>All screen access is done through <20>the
|
|||
|
BIOS. <20>Its fast enough as it is, and shouldn't a hacker be able to run
|
|||
|
in <20>the BACKGROUND so you can do something else? <20>As I am writing this
|
|||
|
documentation I am in DesqView, with Code Thief running concurrently in
|
|||
|
another window.
|
|||
|
|
|||
|
-> Disclaimer <-
|
|||
|
|
|||
|
There <20>is <20>no disclaimer. <20>Code Thief was written with <20>the <20>intent
|
|||
|
purpose of committing the crime of 'theft of services'. <20>Of course you
|
|||
|
don't have to use it, <20>but then again, <20>do you have all of the money in
|
|||
|
the <20>world <20>at your disposal to pay for calling out of <20>state <20>bulletin
|
|||
|
boards plus the mainframes/mini computers that you are trying to hack?
|
|||
|
|
|||
|
-> From The Author <-
|
|||
|
|
|||
|
A LOT of work has gone into the Code Thief project, especially
|
|||
|
revision 2.x/3.x of the program. <20>If you support the program then be
|
|||
|
sure to upload it to any and all of your favorite boards. It's a great
|
|||
|
way <20>to increase your file points and ratio while helping <20>your <20>fellow
|
|||
|
long distance 'users'.
|
|||
|
|
|||
|
-> An Official Phortune 500 Product <-
|
|||
|
|
|||
|
My thanks to the Phortune 500 <20>Board of Directors, <20>and the Phortune
|
|||
|
500 membership. The Phortune 500 Board of Directors as of now consists
|
|||
|
of: <20><>Brew Associates (author of Code Thief), <20>Renegade Chemist, <20>Aahz,
|
|||
|
Quinton J. <20>Miranda, The Spiker, Striker, Red Knight, Major Havoc, <20>and
|
|||
|
Lord Lawless.
|
|||
|
|
|||
|
-> Starting The Program <-
|
|||
|
|
|||
|
To start the program normally, enter THIEF from DOS. You can also
|
|||
|
enter THIEF xx:xx from DOS (substitute a valid time for xx:xx) and Code
|
|||
|
Thief will automatically hack the flagged multiple extenders with
|
|||
|
multiple targets until the time specified, then drop back out to DOS.
|
|||
|
This is great for a BBS's batch file. For instance, you can have your
|
|||
|
BBS invoke a batch file at a certain time. This batch file could say
|
|||
|
something like THIEF 5:30. This will invoke multiple target/multiple
|
|||
|
extender hacking until 5:30 am. Note that all times are in 24 hour
|
|||
|
mode. Also, if no multiple targets are found the defaults are
|
|||
|
automatically used. This modification is on the request of an Opus BBS
|
|||
|
sysop. Hope it comes in handy.
|
|||
|
|
|||
|
IF THE PROGRAM IS STARTED NORMALLY
|
|||
|
|
|||
|
When you first start the program you will see the main option menu.
|
|||
|
At this and any menu you can use the up and down arrow keys to move the
|
|||
|
highlight over an option and press RETURN or the SPACEBAR to finally
|
|||
|
choose the option. I will try to move you through the running of the
|
|||
|
program to get it working on your machine so it is suggested that you
|
|||
|
print this documentation out and work the actual program as you read
|
|||
|
it.
|
|||
|
|
|||
|
-> Setting Your Modem Paramaters <-
|
|||
|
|
|||
|
The first thing you will probably want to do is set your modem
|
|||
|
paramaters. Use the up and down arrow keys to move the highlight over
|
|||
|
option "H" on the main option menu then hit CR or RETURN, or just hit
|
|||
|
"H" then CR or RETURN. You will be greeted with three more options.
|
|||
|
First choose "Modem Specifics". This is where you can set the
|
|||
|
paramaters for your particular modem. If a default doesn't match your
|
|||
|
configuration then use the up and down arrow keys to move the highlight
|
|||
|
over the option then hit RETURN or SPACE. The highlight will disappear
|
|||
|
and <20>you <20>can make an entry. <20>If it is a number or some <20>other <20>field,
|
|||
|
enter the new value to use. <20>If it is some kind of a toggle, <20>use your
|
|||
|
left <20>and right arrow keys until what you want comes into view. <20>Press
|
|||
|
RETURN when you are satisfied with your choice.
|
|||
|
|
|||
|
MODEM SPECIFICS
|
|||
|
|
|||
|
COM Port - This can be eighter COM1: COM2:, COM3: Or COM4:. <20>Use
|
|||
|
the left and right arrow keys to select Port 1, <20>Port
|
|||
|
2, Port 3, Port 4. Then hit RETURN.
|
|||
|
Baud <20>Rate - Enter the baud rate to open the <20>modem <20>at <20>whenever
|
|||
|
hacking <20>or <20>scanning is performed. <20>Your choices are
|
|||
|
300 <20>Baud, <20>1200 Baud, <20>and 2400 <20>Baud. <20>The left and
|
|||
|
right <20>arrow keys move you through the choices. <20><>Hit
|
|||
|
RETURN when you are satisfied.
|
|||
|
PBX Mode - Choices are Yes and No. The left and right arrow keys
|
|||
|
moves you <20>through the choices and RETURN selects. If
|
|||
|
you <20>are <20>in <20>a <20>building with a PBX then you have <20>to
|
|||
|
enter Yes for this option.
|
|||
|
PBX Digit - This <20>is the PBX digit. <20>When you are in a <20>building
|
|||
|
with <20>a PBX installed a certain digit has to be dialed
|
|||
|
to receive an outside line. <20>If PBX mode is No, <20>then
|
|||
|
N/A will appear for Not Applicable. <20>Trying to change
|
|||
|
this with PBX mode to No will cause it to beep at you.
|
|||
|
PBX Delay - This <20>is the number of seconds after entering the <20>PBX
|
|||
|
digit <20>to wait for the outside line. <20>N/A if PBX Mode
|
|||
|
is No.
|
|||
|
Local Dialing - Not everyone has Touchtone (tm) <20><>dialing <20>from <20>their
|
|||
|
home. If you don't change this to Pulse. Just select
|
|||
|
it with the highlight, <20>hit return, <20>then use the left
|
|||
|
or <20>right <20>arrow <20>key <20>to select the <20>new <20>option <20>and
|
|||
|
another return will make it permanent.
|
|||
|
Speaker On - Choose <20>Yes to keep the speaker on during hacking <20>and
|
|||
|
scanning or No to keep it off.
|
|||
|
Dial Tone Wait - This <20>is <20>the number of seconds the modem is <20>to <20>wait
|
|||
|
after picking up the line until starting to dial. <20>It
|
|||
|
does this through the Hayes (and compatibles) <20>command
|
|||
|
registers.
|
|||
|
Carrier Detect - This is the number of 1/10 seconds that a carrier must
|
|||
|
be present for the modem to detect it as valid. <20>This
|
|||
|
defeats some LD <20>service's <20>fake-carrier routines that
|
|||
|
send <20>a <20>fake <20>carrier <20>for a short <20>period <20>of <20>time.
|
|||
|
Remember <20>that <20>REAL carriers are <20>sent for <20>a <20>longer
|
|||
|
period <20>of time than fake carriers. <20>Experiment <20>with
|
|||
|
this one.
|
|||
|
Dialing Speed - This is the speed of the touchtone dialer. This is in
|
|||
|
1/100 of a second. <20>This number can range from 50-255
|
|||
|
(at least with the modem I use).
|
|||
|
User String - If there is something entered here then it is sent out
|
|||
|
to the modem. If you have an advanced modem, then set
|
|||
|
it to "ATX6" <20>to enable your extended result codes for
|
|||
|
such <20>things <20>as VOICE, <20>etc. <20>You can over-ride <20>the
|
|||
|
"Speaker <20>On" <20><>setting by making this "ATM1". <20><>That
|
|||
|
would be stupid, but it's just an example.
|
|||
|
|
|||
|
MODEM RESULT CODES
|
|||
|
|
|||
|
In this section you enter the result codes that your modem uses when
|
|||
|
in non-verbose mode. Note that the defaults should suffice. If you
|
|||
|
have <20>a <20>strange <20>modem configuration you can change <20>these. <20><>Numbers
|
|||
|
aren't the only thing allowed here, <20>you can enter symbols like ";" <20>or
|
|||
|
":", or etc. Someone had a strange "Hayes Compatible" modem and wanted
|
|||
|
this capability. I aim to please.
|
|||
|
|
|||
|
-> Edit Extender Configurations <-
|
|||
|
|
|||
|
The next thing you will want to do is create configurations for the
|
|||
|
different extenders you wish to hack. Choose "Edit Extender
|
|||
|
Configurations" <20><>after you exit back to the main options menu. <20>If no
|
|||
|
EXTENDER.DAT <20>file <20>exists, <20>one will be created for you with <20>a <20>dummy
|
|||
|
initial record (you will want to change this of course, <20>1-800-000-0000
|
|||
|
is <20>not <20>a valid extender). <20>If you haven't screwed anything up, <20><>you
|
|||
|
should <20>now see the first record of the sample EXTENDER.DAT I <20>included
|
|||
|
in the Code Thief archive file. <20>These are just some 800 <20>extenders to
|
|||
|
get you started. Note that you might want to change some delays, <20>etc,
|
|||
|
to work for you. As they are now they work for ME. Your case might be
|
|||
|
different. Experiment. <20>Hitting [A] will ADD AN EXTENDER to the file.
|
|||
|
Hitting <20>[E] <20>will <20>EDIT the current extender (there's <20>that <20>highlight
|
|||
|
again!). <20>Hitting <20>[D] <20>will <20>prompt you to confirm the <20>DELETE of the
|
|||
|
extender <20>record. <20><>Hitting [Q] will quit the <20>extender <20>editor. <20><>To
|
|||
|
understand <20>all <20>of the fields for the individual extender, <20><>let's <20>go
|
|||
|
through <20>the process of ADDING an extender. <20>You will notice that Code
|
|||
|
Thief is an extremely complex code hacker. But also note that there is
|
|||
|
so <20>much flexibility that you will be able to hack just about <20>anything
|
|||
|
that is out there, no matter what kind of format it is.
|
|||
|
|
|||
|
ADD AN EXTENDER
|
|||
|
|
|||
|
When you choose to ADD an extender you will be given the opportunity to
|
|||
|
enter <20>the <20>complete <20>configuration for the extender. <20><>The <20>first
|
|||
|
thing is the telephone number of the extender. <20>After that is a short
|
|||
|
note <20>used <20>to identify the extender. <20>Note <20>that <20>throughout <20>the
|
|||
|
program <20>in <20>various <20>sections extenders are refered to by <20>this <20>short
|
|||
|
note, so make sure it is something you can easily recall. <20>You can
|
|||
|
make <20>it the number of the extender if you wish. <20>Anything goes <20>here,
|
|||
|
but the program will beep at you if you try to leave it blank. Next is
|
|||
|
the length of the codes. <20>For METRO it is 6, <20>MCI calling cards it <20>is
|
|||
|
14, <20>etc. <20>No code lengths of <20>0 are allowed (it will beep). Next is
|
|||
|
the code template. <20>This idea is borrowed from Fuckin' <20>Hacker <20>from
|
|||
|
2af because I think it <20>is <20>a very powerfull feature. <20>If this is
|
|||
|
used it completely over-rides the code length, hacking mode, <20>starting
|
|||
|
code, and sequential increment in your configuration. Anyway, here you
|
|||
|
are to construct a "template" for your codes. For instance, entering
|
|||
|
"444XXX" will make every code 6 digits and starting in 444. Entering
|
|||
|
"0X1X2X" <20>will make set the first, <20>third, <20>and fifth numbers in every
|
|||
|
code <20>to 0,1, <20>and 2 respectively and the second, <20>fourth, <20><>and <20>sixth
|
|||
|
number in each code will be totally random. Commas are also allowed in
|
|||
|
the code template and will cause the modem to pause for 2 seconds. For
|
|||
|
instance, XXXX,9 will cause a random 4 number code to be sent, a pause
|
|||
|
for 2 seconds, then a 9 will be sent. This is good for hacking PBX's
|
|||
|
that require a code be sent then need a number for an outside line.
|
|||
|
Leave <20>the code template blank if you don't wish to use it. <20><>Next <20>you
|
|||
|
will <20>enter the code delay. <20>This is the number of seconds to <20>delay
|
|||
|
before sending the code. Then you will enter the target delay. <20>This
|
|||
|
is <20>the <20>number <20>of seconds to wait until entering the <20>target <20>number.
|
|||
|
Notice that also in the config is an option to put the code first or
|
|||
|
not. If the code is sent first then the Code Delay should be the
|
|||
|
number of seconds to wait after dialing the extender until the code is
|
|||
|
sent after the extender answers and provides a dial tone. If the code
|
|||
|
is not sent first then the target number will be sent first. The
|
|||
|
target delay should be the number of seconds to wait after dialing the
|
|||
|
extender until the target is sent at the extender's dialtone. Then the
|
|||
|
code delay is the number of seconds to wait until sending the code
|
|||
|
AFTER the target number is sent. The timeout is next. This is the
|
|||
|
number of seconds to wait for your TARGET number to answer. If it
|
|||
|
doesn't <20>answer <20>within <20>this time the code <20>is <20>considered <20>invalid.
|
|||
|
Basically, the target delay tells the modem how long to wait. When the
|
|||
|
modem times out it tells Code Thief, and Code Thief moves on. Now enter
|
|||
|
a default Target number. <20>This is a number that always answers with <20>a
|
|||
|
modem <20>(is <20>never busy). <20>Telenet is perfect for this (so <20>enter <20>your
|
|||
|
local <20>Telenet <20>number). <20><>Note that Code Thief can <20>also <20>use <20>random
|
|||
|
multiple <20>targets <20>- this is covered in the MULTIPLE TARGET <20>CONVERSION
|
|||
|
UTILITIES <20>that has been included as a Code Thief companion program <20>in
|
|||
|
your <20>Code <20>Thief <20>ARChive. <20>Read CONVERT.DOC <20>for <20>information <20>about
|
|||
|
targets and multiple <20>targets <20>at that. <20>Next is the hacking mode. Use
|
|||
|
your <20>left and right arrow keys to move through the selections and <20>hit
|
|||
|
RETURN when you are satisfied. <20>You can have Random codes, <20>Sequential
|
|||
|
codes, <20>or Both <20>- <20>sequential <20>codes <20>with a random increment. If you
|
|||
|
choose <20>Sequential or Both you are now prompted for the starting <20>code,
|
|||
|
otherwise this value is set to N/A. <20>Next <20>you enter the sequential
|
|||
|
increment only if Sequential hacking is chosen. <20>If sequential hacking
|
|||
|
is chosen then this is the number to increment <20>each code by. <20>If Both
|
|||
|
is <20>chosen, <20><>then this number is random in the range <20>of <20>1-100 <20><>when
|
|||
|
hacking. <20><>If <20>Both or Random hacking is your chosen method <20>then <20>the
|
|||
|
Sequential <20>Increment is N/A. Note that the sequential increment is an
|
|||
|
integer, therefore any value from 1 to 32767 is valid. If "Sequential"
|
|||
|
hacking or "Both" <20>hacking is chosen and the increment ever exceeds the
|
|||
|
code length, <20>only the length of the code up to the code length will be
|
|||
|
used. <20><>For example, <20>with a code length of 4 and an starting code <20>of
|
|||
|
9999, <20>if an increment of 1 is made your next code will be 1000. <20><>Now
|
|||
|
you <20>will be prompted as to if <20>the code should be entered first. <20>Use
|
|||
|
the left and right arrow keys to select Yes or No. <20>If you choose Yes,
|
|||
|
then <20>the code will be sent first. <20>Choose No and the target <20>will <20>be
|
|||
|
sent first. Next is the target prefix digit. <20>This is a number to add
|
|||
|
to the beginning of the target number. <20>For example, <20>for the MCI
|
|||
|
calling card service <20>you <20>enter the target first and prefix it with <20>a
|
|||
|
"0". ITT requires that the target be sent first and be prefixed by
|
|||
|
a <20>"1". <20><>Other <20>services require that the CODE is sent first and <20>the
|
|||
|
target <20>has NO prefix. Next is the multiple extender flag. <20>If
|
|||
|
Yes then the extender will <20>be <20>flagged immediately as one to be used
|
|||
|
when Multiple Extender hacking is chosen. If you choose No, <20>then this
|
|||
|
extender will be put on reserve. More on this comes later. Next is
|
|||
|
multiple port mode. <20><>Say the <20>extender number is 950-1000 <20>and the
|
|||
|
extender <20>has <20>multiple <20>port hunt groups from 950-1000 <20><>to <20>950-2000.
|
|||
|
Choosing Yes to multiple <20>port mode will prompt you for the ending hunt
|
|||
|
number (in <20>my example it's 2000). <20>Now Code Thief will randomly <20>pick
|
|||
|
950-1000 <20><>to <20>950-2000 <20>whenever it dials the extender. <20><>Ending <20>Hunt
|
|||
|
numbers <20>MUST be four digits <20>long <20>(that should be <20>self-explanatory).
|
|||
|
Note <20>that <20>if <20>your extender <20>is 1-800-555-0000 <20>and your Ending <20>Hunt
|
|||
|
Number is 0099 <20>Code Thief <20>won't <20>screw up by dialing 1-800-555-99 <20>or
|
|||
|
whatever number is chosen. It will properly dial 1-800-555-0099 (or 1-
|
|||
|
800-555-0050 or 1-800-555-0026, <20>etc, <20>etc, <20>etc). Next you will enter
|
|||
|
the filename to place valid codes in. <20>Valid codes are logged with the
|
|||
|
time and date for convienence. <20>All valid code <20>files <20>end with the
|
|||
|
".COD" extention. <20>When finished <20>entering all extender information
|
|||
|
it is saved to the EXTENDER.DAT file.
|
|||
|
|
|||
|
OTHER EXTENDER EDITOR COMMANDS
|
|||
|
|
|||
|
To <20>navigate through the configurations use the LEFT and RIGHT <20>arrow
|
|||
|
keys. <20><>To <20>flag <20>an extender for deletion enter "D". <20><>You <20>will <20>be
|
|||
|
prompted to enter "Y" <20>if you are sure or "N" if you are not. <20>Once
|
|||
|
an extender has been flagged for deletion it will be skipped over <20>when
|
|||
|
you <20>use <20>the left and right arrow keys. <20>Hit "Q" <20>to quit <20>this
|
|||
|
section. When you hit "Q" all extenders flagged for deletion are
|
|||
|
physically deleted. Another nice feature in this section is the
|
|||
|
ability to edit extenders. Hit "E" to choose edit. The highlight will
|
|||
|
appear. You can use the left, right, up, and down arrow keys to
|
|||
|
navigate the hightlight over the option you wish to change. Then hit
|
|||
|
RETURN or SPACE to enter a new value. When finished entering a new
|
|||
|
value (either by the keyboard or left and right arrow keys) <20>hit RETURN
|
|||
|
and <20>the <20>highlight will re-appear so that you may move it over <20>new
|
|||
|
things to edit. <20>When finished editing hit "Q" <20>when the highlight is
|
|||
|
present. Note that everything in the configuration is described in
|
|||
|
the <20>previous paragraph. <20>To choose a particular <20>extender <20>by <20>record
|
|||
|
number, <20>just enter the number. <20>You can't <20>see <20>extenders flagged for
|
|||
|
deletion (it will not go to them).
|
|||
|
|
|||
|
One <20>more thing on deletion extender configurations. <20>If in the course
|
|||
|
of <20>using this section you delete ALL of your extender <20>configurations,
|
|||
|
the program will not have any configurations left to go to and it <20>will
|
|||
|
automatically <20>quit this section deleting the entire EXTENDER.DAT file.
|
|||
|
When <20>choosing <20>this section again, <20>a <20>new EXTENDER.DAT with <20>a <20>dummy
|
|||
|
record will be created.
|
|||
|
|
|||
|
-> Edit The Multiple Target File <-
|
|||
|
|
|||
|
Navigate back to the main menu. Choose "Edit The Multiple Target
|
|||
|
File". You will then be shown the current multiple target file. Now
|
|||
|
you can either hit "1" to add to it, "2" to delete entries from it or
|
|||
|
"3" to quit. Everything here is self-explanatory. A multiple target
|
|||
|
file is provided with the program. It is kept in ASCII file format for
|
|||
|
easy editing with your word processor, <20>if you wish. <20>Use the MULTIPLE
|
|||
|
TARGET CONVERSION UTILITIES in your Code Thief ARChive to get quick and
|
|||
|
painless <20>updates of your multiple target MTARG.DAT file off Telenet or
|
|||
|
even <20><>Tymnet <20>at <20>regular <20>intervals. <20><>Code <20>Thief <20>is <20>a <20><>complete
|
|||
|
professional system that will solve all your hacking needs.
|
|||
|
|
|||
|
-> Flag Extenders For Hacking Mode <-
|
|||
|
|
|||
|
Exit <20>to the main menu and choose "Flag Extenders For Hacking Mode".
|
|||
|
This is the option to choose to change the flags on extenders. If it
|
|||
|
is flagged then it will be one of the extenders used when multiple
|
|||
|
extender hacking is chosen. The extenders will be shown, <20>eight to a
|
|||
|
page. A "+" in front of the extender means it will be included when
|
|||
|
multiple extender hacking is chosen, otherwise it will not. This
|
|||
|
option is included because some people don't want to hack all of the
|
|||
|
extenders they have configurations for. Editing an extender and
|
|||
|
changing the multiple extender flag does the same thing, but this is
|
|||
|
easier. If there are more than eight extenders then they will take up
|
|||
|
more than one page. You can flip through the pages by choosing "Jump
|
|||
|
To Next Page" and "Jump To Previous Page". Hitting RETURN or SPACE
|
|||
|
when the highlight is over an extener toggles the flag.
|
|||
|
|
|||
|
-> Deluxe Exchange Scanner <-
|
|||
|
|
|||
|
Navigate <20>back <20>to the main menu and choose "Deluxe <20>Exchange
|
|||
|
Scanner". <20><>The <20>Code Thief Deluxe exchange scanner is a <20>full <20>screen
|
|||
|
exchange <20>scanner that can scan multiple exchanges from a database that
|
|||
|
you <20>can <20>configure. <20>When you choose this option if no exchanges <20>are
|
|||
|
defined, a dummy first record will be created for you. <20>Now hit [R] to
|
|||
|
replace this record and enter an exchange to scan, <20>the starting number
|
|||
|
in the exchange, then the ending number. To flag the exchange just hit
|
|||
|
[+] <20>next. <20>Unflagging is done by hitting [-]. <20>Note that to scan you
|
|||
|
must <20>have at lease one flagged exchange. <20>You can't scan nothing <20>can
|
|||
|
you? <20><><EFBFBD>The <20>exchange <20>editor <20>is <20>a <20>lot <20>like <20>the <20>"Edit <20><>Extender
|
|||
|
Configurations" section. To jump to a particular exchange, <20>just enter
|
|||
|
the <20>number. <20>To move through the exchanges record by record <20>use <20>the
|
|||
|
left and right arrow keys coresponding to the direction in the file you
|
|||
|
wish <20>to <20>move. <20>Use [A] to add an exchange. <20>Use [D] <20>to <20>delete <20>an
|
|||
|
exchange <20>from the database. <20>Use the [SPACEBAR] to toggle weather <20>or
|
|||
|
not a particular exchange is in the toll free 1-800 area. <20>Hitting [Q]
|
|||
|
will quit the exchange scanner section, <20>but to start scanning hit <20>[G]
|
|||
|
for <20>Go. <20>You will be asked the timeout (number of seconds a <20>computer
|
|||
|
should <20>answer <20>in). <20><>Then <20>Code Thief will check <20>to <20>see <20>how <20>many
|
|||
|
exchanges are flagged. When scanning and Code Thief reaches the ending
|
|||
|
number <20>in <20>an <20>exchange, <20>the exchange will be unflagged. <20><>When <20>all
|
|||
|
flagged <20>exchanges <20>are changed to unflagged (all <20>exchanges <20>are <20>done
|
|||
|
being <20>scanned in the limits you specified in the configuration) <20><>Code
|
|||
|
Thief will quit the exchange scanner.
|
|||
|
|
|||
|
THE ACTUAL EXCHANGE SCANNER
|
|||
|
|
|||
|
This <20>is <20>a <20>full screen exchange scanner ala the movie <20>WarGames <20>(the
|
|||
|
movie <20>sucked <20>by the way) <20>and it will show each of the <20>numbers
|
|||
|
dialed. <20><>Numbers where computers are detected are shown BLINKING. If
|
|||
|
the modem does not detect <20>a dial tone when trying to dial (receives
|
|||
|
the no <20>dial <20>tone result code) it retrys the line. After 5 retries it
|
|||
|
exits the exchange scanner. If the modem sends a BUSY result code that
|
|||
|
is <20>logged <20>to the CARRIERS.TXT <20>disk <20>file along with <20>numbers <20>that
|
|||
|
produced a CONNECT result code of any baud. It will specifically log
|
|||
|
it as <20>a BUSY number or a number that the modem CONNECTed to. <20>You can
|
|||
|
then <20>consult <20>the log and dial these numbers back manually if you wish
|
|||
|
to ensure that the numbers listed as busy aren't important. When the
|
|||
|
screen fills up, Code Thief goes back to the beginning.
|
|||
|
|
|||
|
-> View/Delete Code Files <-
|
|||
|
|
|||
|
When you choose this option from the main option menu the disk will
|
|||
|
be searched for files with a .COD extention. If there are any they
|
|||
|
will be displayed. If there are no files with a .COD extention that
|
|||
|
will be displayed also. You have the option of viewing one of these
|
|||
|
files or deleting one. If you view one it will be one screen at a time
|
|||
|
so nothing scrolls past you. Note that the time and date the code was
|
|||
|
found is logged for your convienence.
|
|||
|
|
|||
|
-> View/Delete Carrier File <-
|
|||
|
|
|||
|
This option is also on the main option menu. All carriers found
|
|||
|
when using the exchange scanner are logged to a file called
|
|||
|
CARRIERS.TXT, as well as BUSY numbers if the modem sends a BUSY result
|
|||
|
code. When viewing the file it will be showed one screen at a time so
|
|||
|
nothing scrolls past you. You can also delete the file. Note that the
|
|||
|
time and date the number was found is logged for your convienence.
|
|||
|
|
|||
|
-> Start Hacking <-
|
|||
|
|
|||
|
After you choose this option you will be prompted as to weather you
|
|||
|
want to do Single Extender/Single Target Hacking, Single
|
|||
|
Extender/Multiple Target Hacking, Multiple Extender/Single Target
|
|||
|
Hacking, Or Multiple Extender/Multiple Target Hacking. <20>If you choose
|
|||
|
multiple target hacking of any kind the targets will be read into
|
|||
|
memory before hacking begins to cut down greatly on disk access time.
|
|||
|
If single extender hacking is chosen you will be prompted for the
|
|||
|
extender to hack. Use the arrow keys to highlight the extender you
|
|||
|
want then press RETURN or SPACE. If there is more than one page of
|
|||
|
extenders then highlight "Jump To Previous Page" and "Jump To Next
|
|||
|
Page" to navigate around the list.
|
|||
|
|
|||
|
WHEN HACKING BEGINS
|
|||
|
|
|||
|
You will be shown the complete statistics for every extender. Also
|
|||
|
shown <20>is the number of codes found, <20>the last code found as <20>well <20>as
|
|||
|
the number of codes found for that extender plus other statistics
|
|||
|
for the current hacking run for each extender. The number of extenders
|
|||
|
you <20>can have at any time is limited only to disk space, <20>of <20>course.
|
|||
|
Multiple <20>targets are limited to 500. <20>This is, <20>I <20>think, <20>more than
|
|||
|
enough. If you chose to quit hacking at a certain time, that time will
|
|||
|
be displayed on the screen as a reminder. <20>Hit ESCape to quit <20>hacking
|
|||
|
at any time. If you forgot to configure your modem and it is connected
|
|||
|
to <20>COM2 <20><>(the default is COM1) <20>then Code <20>Thief <20>will <20>automatically
|
|||
|
recognize that <20>something is wrong and exit the exchange scanner. <20>You
|
|||
|
can <20>also <20>hit the SPACEBAR to skip to the next <20>code. <20>If you have <20>a
|
|||
|
picky modem like mine, only use the ESCape key or the SPACEbar when the
|
|||
|
modem is not sending any DTMF to the line. <20>But if you DO screw up the
|
|||
|
modem Code Thief will know and will make the attempt to recover.
|
|||
|
|
|||
|
POSIBILITIES DURING HACKING
|
|||
|
|
|||
|
Many things can happen during hacking. For instance, if the modem
|
|||
|
connects the code and extender is logged to it's respective disk file.
|
|||
|
If the modem sends an ERROR result code the current attempt is retryed
|
|||
|
again. If NO DIAL TONE is detected by the modem the current attempt is
|
|||
|
retryed. <20><>If NO CARRIER or VOICE is detected by the modem the program
|
|||
|
moves on. <20>The maximum number of retrys that can ever be done in a
|
|||
|
row <20>is five. <20>Oh, <20>if the modem sends a RINGING result code that <20>is
|
|||
|
also <20>shown <20>to the user while the modem waits to timeout or <20>connect.
|
|||
|
Ringing <20>does <20>nothing <20>but just display "Ringing...". <20>If <20>the <20>modem
|
|||
|
receives a busy signal it goes on to another attempt. I origionally
|
|||
|
planned <20>on <20>making <20>it <20>retry <20>the code but <20>I <20>remembered <20>that <20>some
|
|||
|
extenders <20>send <20>a re-order which is a fast busy signal that <20>can <20>be
|
|||
|
detected by the modem and send a BUSY result code.
|
|||
|
|
|||
|
-> Closing Notes <-
|
|||
|
|
|||
|
I hope you understood this new documentation. Im not really a good
|
|||
|
writer, <20>so if you have any questions leave me a note on any board I
|
|||
|
happen to be on <20>and <20>I <20>will <20>try to answer it. <20>I hope you like Code
|
|||
|
Thief and find it usefull as I put a LOT of hours and hard work into it
|
|||
|
until I was satisfied. If anything goes wrong with the program on your
|
|||
|
machine, or anything else in general then leave me a note. I will try
|
|||
|
to diagnose the problem and stamp it out.
|
|||
|
|
|||
|
COMMUNICATIONS ADDRESSES AND INTERRUPTS
|
|||
|
|
|||
|
Here <20>are the communications address and interrupts that Code <20>Thief
|
|||
|
uses to access the communications ports. <20>COM1: and COM2: <20>are correct
|
|||
|
for <20>100% <20><>of the applications. <20>COM3: <20>and COM4: <20>as defined by <20>the
|
|||
|
program will be correct 99% of the time. If you have a COM3: modem and
|
|||
|
Code Thief set at Port 3 doesn't work with it then change your modem to
|
|||
|
COM1: <20><>or COM2: <20>if possible. <20>If you really need YOUR communications
|
|||
|
addresses and interrupts for COM3: <20>and COM4: <20>leave me a note with the
|
|||
|
correct <20>information on any board I am on and I will try to get <20>you <20>a
|
|||
|
new <20>THIEF.COM <20>and <20>THIEF.000. <20><>But <20>note <20>that <20>the <20>addresses <20>and
|
|||
|
interrupts <20>used for COM3: and COM4: are going to be correct more times
|
|||
|
than not.
|
|||
|
|
|||
|
Address Interrupt Address Interrupt
|
|||
|
------- --------- ------- ---------
|
|||
|
COM1: 3F8 IRQ4 COM3: 3E8 IRQ4
|
|||
|
COM2: 2F8 IRQ3 COM4: 2E8 IRQ3
|
|||
|
|
|||
|
|
|||
|
F i l e s S u p p l i e d W i t h C o d e T h i e f 3 . 5
|
|||
|
|
|||
|
Make <20>sure that these are the files you received in your ZIPfile <20>of
|
|||
|
Code Thief revision 3.5. If these are not the files then what you got
|
|||
|
is <20>something that someone else re-ZIPed and forgot <20>to <20>include
|
|||
|
something in. I ask that you only distribute the origional ZIPfile
|
|||
|
because people have confused themselves in the past.
|
|||
|
|
|||
|
THIEF35.DOC - Code Thief Deluxe v3.5 documentation
|
|||
|
DELUXE.DOC - What's new since Code Thief 3.0?
|
|||
|
THIEF.COM - Code Thief 3.5 - The actual program
|
|||
|
THIEF.000 - Primary <20>Code <20>Thief <20>overlay. <20><>Must be <20>in <20>the <20>same
|
|||
|
directory <20>as <20>THIEF.COM and you must be logged to <20>that
|
|||
|
directory
|
|||
|
MTARG.DAT - Code <20>Thief <20>multiple target file - use Multiple <20>Target
|
|||
|
Conversion Utilities to make your own also
|
|||
|
EXTENDER.DAT - Sample 1-800 extender file to get you started
|
|||
|
|
|||
|
MULTIPLE TARGET CONVERSION UTILITIES
|
|||
|
A CODE THIEF 3.5 COMPANION PROGRAM
|
|||
|
(be sure to read CONVERT.DOC to understand this)
|
|||
|
|
|||
|
CONVERT.COM - Multiple Target Conversion Utilities - The program
|
|||
|
CONVERT.DOC - Multiple Target Conversion Utilities - The documentation
|
|||
|
TELENET.LST - Sample file off Telenet to get you started
|
|||
|
TYMNET.LST - Sample file off Tymnet to get you started
|
|||
|
TYMFIX.COM - You must run TYMFIX to make TYMNET.LST into <20>TYMNET.FIX.
|
|||
|
Only TYMNET.FIX <20>will <20>work <20>with <20>the <20>Multiple <20>Target
|
|||
|
Conversion <20>Utilities. <20><>Also use TYMFIX.COM to fix the
|
|||
|
listings you ascii-download off Tymnet.
|
|||
|
|