textfiles/hacking/shawn-file-check

404 lines
20 KiB
Plaintext
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

The muther fuckin awesome Telix Hacker (TH, duh) for IBM and
IBMish type komputers. If you run Telix, then you can
use this. If not, you wasted some filez pointz.
Shawn-da-Lay Boy Productions (tm) (c) 1989, 1990, 2001...
In cooporation with the Macro 2 division of
Insanity Softwarez Inc.
Opening shit: Version 1.10
Inspired by Phry Code Pro, fellow travelers, and cause I wanted to
see the shit on my screen. And cause I wanted to show the awesome
power of Telix scripts. (Waste of time to tell phuckin pirates
to register Telix). Good for Telenet, PooPnet, or any other
komputer that you wanna hack on. I don't approve BBS hacking so,
SYSOPs, don't blame me if some fucking kid uses it against
your system. I claim no responsibility for the use, abuse, or
effects that this Telix script will generate.
Feel free to modify this to make it work the way you want. Hell,
that's why you got the Bob damned source. But, don't expect me
to fix problems exposed by your changes. If you don't program,
then leave the friggin source alone. Problems and suggestions can
be forwared to me on any of the awesome BBSes that I grace my
presence with. I may not accept your ideas, but I wanna hear
them, dude. Of course if you don't know who I am, this could
present problems, but I hope that the kind SYSOPs will pass on
any relavent comments or Email. Since I actively modem, I am
sure word of serious problems will reach me. However, a few
kind words are always appreciated like, "Fuck, Rad spaggetti code
dude." You aren't still reading this paragraph, are you? I dozed
off about 3 sentences back.
Following this shit, the shit is divided into 4 sections.
general, config, control, and other.
General Shit:
Ok, first you gotta compile the salt source. See your Telix dox
if you don't know how to do that. (like enter CS THxxx at the DOS
prompt, the xxx is the version number of your source, the file
with the extension of .SLT, got it?)
Second, edit the TH.CFG (Telix Hacker config file). And change
things you want changed. See TH config file description for
gorey details. (don't you hate when they do that??)
Third create the Telix Hacker control file (pointed to in the
config file or manually entered, if in manual mode). See
TH control file specifications.
Forth, fire up Telix and invoke the script. Then take a nap, watch
about 10 hours of TV or maybe take a weeks vacation, cause this
is gonna take a while. Of course, if you specify good patterns
(aka plates) then you might get a valid account faster, but it
is probably going to take a muther fucking LONG time. But at
least you can see what is happening and will know you're not
spinning your wheels.
Config shit:
This file specifies shit about how the hacker is to operate. It
has several record types which I will describe shortly. All
Keywords must be delimited by a blank, an equal sign, and another
blank. Like "AUTO = OFF". Keywords may be specified in any order,
just one keyword per record. If a keyword is speficied several times
the last specification will be the one in effect. The config file
must be called TH.CFG and be in your active directory (phuckin MS-DOS
shit).
keyword Silly description
* This signifies a comment record. All text after that will be
ignored. It must be followed by a blank. It can start a
record or be used to comment a config record.
AUTO This tells the hacker to operate automatically. Huh? What
this means is: If AUTO = OFF, then the hacker will ask you
for a control file name and use the one specified in the
TH.CFG file has the default. If AUTO = ON, then the hacker
will just start hacking with the CONTROL filed specified
in the config file. AUTO = ON is useful if you are using a
timed event to fire it up at 3:00 AM when you ain't around
to reply to the prompt. If this record is ommited, OFF is
assumed.
CONTROL This is used to specify the hacker control file that you
wanna use. The control file controls the actually hacking
shit to use. (see control file description later on).
Example "CONTROL = TELENET.HAK". If ommited, the hacker
will look for a file called TH.HAK. If the file isn't found
the hacker will format your C drive. Just kidding, you'll get
a wonderful message asking if you got yer head up your ass
or something equally stupid.
CR This is required. It specifies the two characters that will
designate carriage return. Leave it has CR = ^M. If you change
it, besure that it is two characters.
LF This is required. It specifies the two characters that will
designate line feed. Leave it has LF = ^J. If you change
it, besure that it is two characters.
| CTRL This is required. It specifies the character that will
| designate a control-key combo. If CTRL = ^ is specified and
| you have ^A in a send string, then CTRL-A will be sent.
Here's a sample TH.CFG file:
* Sample Telix hacker config file.
AUTO = ON * Just start hacking
CONTROL = SAMPLE.HAK * hacking samples today...
CR = ^M * carriage return
LF = ^J * line feed
| CTRL = ^ * Control key combo
Control shit:
This file specifies the actual hacking that is to occur. It's
format is the same has the config file, but with different keywords.
The TEST, LOG, CODEZ, DIAL, COUNT, PLATEn, SEEDLn, SEEDHn, DELAY, FORCE,
LOOP, SHOW, PASSFILE, MASTERFILE, SKIP, NOGOOD, and GOOD records may be
specified any amount of times, with the last one taking affect. This
does not apply to the SEND, WAIT, and HACK records, cause their
relative order and multiple use control the way the hacker runs.
keyword Silly description
* This signifies a comment record.
TEST This tells the hacker weather to really dial and hack or not.
If ommited, TEST = NO is assumed. To see how your control file
will work use TEST = YES and the stuff will be displayed on
the screen.
LOG This should normally have a value of NO, ie, "LOG = NO".
Anyother value will cause the hacker to log every attempt
to a file. Like "LOG = TRIES.DAT" will create this file
and write every attempted hack string to it. If ommited,
LOG = NO, is assumed.
CODEZ This specifies the file where good codes should be kept!!!
If ommited CODEZ = TH.FND is assumed. If a file already exists,
then it will be added to, if yer lucky enough to crack a
code, that is...
DIAL This wonderful record tells the awesome hacker what phone
number to dial. It's format is the same as what you
enter in your dialing directory. If ommited, the hacker
won't do shit. Example: DIAL = 10 , hack my 10'th dialing
directory entry. Or: DIAL = M9765555 , for a phone number
not in your directory. The hacker will dial the number
forever, until a connection is made and redial the number
every time the connection is dropped.
FORCE This optional record tells the hacker how many attempts to
make before hanging up and forcing redial. If omitted,
FORCE = 0 is assumed which means keep hacking and only redial
if the connection is lost.
COUNT This is an optional record, If controls how many attempts to
make. Example, COUNT = 10000 says try 10,000 times. If ommited,
keep trying forever, or until the hacker is manually stopped,
which ever comes first.
STOP This tells the hacker to stop after a valid code is found.
YES, means stop and NO means keep on hacking. Ie, STOP = YES
will cause the hacker to stop and hangup the phone. If ommited
STOP = YES is assumed.
SHOW This tells the hack to display the hack string each time a new
code is about to be tried. Use SHOW = YES to display each
hack string before it is sent. Note that it will be displayed
in column 41 of the current line to keep it seperate from the
active terminal session text (hopefully). If ommited, SHOW =
NO is assumed.
PLATEn This specifies a plate for hacking. You can have 0 thru 9
of them. What's a PLATE you say? Well it's how you tell
the hacker what characters to try. It is composed of
special characters that have the following meanings:
# = any number, 0 through 9.
& = any upper case letter, A through Z.
@ = both numbers and upper case letters, 0 through Z.
% = any lower case letter, a through z.
$ = both upper and lower case letters, A through z.
* = all three, 0 through z.. that's 62 possible values.
Example: PLATE0 = &&&###@@@ for specifing a plate of 3 upper
case letters, followed by three numbers, followed by three
upper case alphanumerics (0 through Z). Got it? Good!
Anyother characters are passed along has is. Ie, PLATE0 =
PCP###@@@ would generate a hack string of PCP followed
by 3 numbers, and then 3 alphamerics. Plates can only be
up to nine characters long.
SEEDLn These may be ommited, but if used must correspond to the
plate of the same number. It's used to tell the hacker
where you want the hacking to start. If omitted, lowest
values are used to start. This is useful for restarting
a hacking session. Example: If PLATE0 = &&&###@@@ and
SEEDL0 = CCC555@@@ then the hacker will not use A or B in
in the first three letters and will not use numbers less
that 5 in the three numbers. @@@ still means use all alpha-
merics, Note that numbers come before letters in alphameric
fields so if CCC was speficied for the alphameric field, then
no numbers would be used along with neither A nor B. Clear
has mud, eh? If you have specific letters in the plate then
the corresponding positions in the seed are ignored.
There is no error checking done to see if your seed agrees
with it's plate. So the hacker will run, but the results
may not be what you want. TEST = YES is good for seeing the
effect your seed has.
SEEDHn Just like SEEDLn, but specifies high limits. If PLATE0 =
&&&###@@@ and SEEDH0 = YYY888@@@ then the hacker will not
use Z in the first 3 positions or 9 in the second three.
GOOD This record contains a string that the hacker should expect
to receive when a valid code has been hacked. It should be
the last record in the file, duh. Example, GOOD = WELCOME*.
The "*" is used to end the string. It can contain no more
than 40 characters.
NOGOOD This optional record is used when you don't know what the
GOOD string should be. This means that if anything is
received that is not the NOGOOD string, the hacker should
assume that a valid code has been cracked and write out
the valid code. Either the last GOOD or NOGOOD record in
the control file will be the one in effect.
PASSFILE This is an optional record that will specify a file that
contains a list of strings to use for hacking. Example,
PASSFILE = PASS.DAT would mean read the PASS.DAT file for
strings to use for hacking. Note, for the strings to really
be used, you must have the uppercase word "PASSFILE" in a
HACK record, ie, HACK = PASSFILE*.
MASTERFILE This is a optional record that is used to tell the hacker
weither or not to switch to the master password file (called
THPASS.LST) after all the records in the PASSFILE have been
processed. To cause the switch, MASTERFILE = YES, must be
coded. If ommited, MASTERFILE = NO, is assumed.
SKIP This is used to tell the hacker howmany records in the
PASSFILE and MASTERFILE to skip over. Example, if SKIP =
100, is coded, then the first 100 records in PASSFILE will
be skipped. If the PASSFILE only had 50 records then it
will be skipped along with the first 50 records in TH.PASS
(if MASTERFILE= YES was coded).
DELAY This is the number of seconds to wait for the GOOD/NOGOOD
string. If ommited, DELAY = 6 is assumed.
SEND You may have has many of these has you need, up to 10. They just
specify a string to be sent once the connection is established.
Example SEND = N ... each SEND record encountered will be
sent just has specifed. Useful for the inital shit a system
may ask you before the signon. Note if you want a carriage
return sent you must include that, like SEND = N^M . (^M is
telixese for carriage return.) The string cannot exceed 40
characters The SEND string is terminated by an "*". Example:
"SEND = C C00512^M* send the string and carriage return"
sends 9 bytes, the 8 byte string "C C00512" and the carriage
return.
WAIT Like SEND you can have all of these you want, up to 10. It
specifies text that you expect to receive and will cause the
hacker to wait for it, for up to 5 minutes. If time expires,
the hacker will quit with an error msg. Example: WAIT = NAME:* ,
wait for a NAME: prompt. If you specify a number, then
the hacker will wait that many tenths of a second. Example,
WAIT = 10 , means wait 1 second. For text values, no more
than 40 characters may be specified. Like SEND the string
is terminated by an "*".
HACK This tells the hacker to start hacking. Example:
HACK = PLATE0,PLATE1 PLATE2* any non PLATE values are
assumed to be literals and are sent has typed. If multiple
plates are specifed, then the first one goes through all
possible values before the second one is incremented.
You can have multiple hack records. If so you would probably
seperate them with a WAIT record. The first hack record is
rotated through all possible values, before the next one is
incremented. If a plate is specified in more than one
hack record, it is incremented independantly of the others.
Currently, you can have up to 10 HACK records. Each hack
value (the stuff after the = and before the *) cannot
exceed 60 characters in either the raw form or after the
plate(s) have been substituted. Note, that you can specify
both PLATEn and PASSFILE in a HACK record, if you want.
However, the PASSFILE keyword should only be used once, in
one HACK record only. There is nothing to stop you from
using PASSFILE in mutiple HACK records, but why would you?
Also be careful with the length of the strings in your
PASSFILE so that they don't overflow the HACK string after
the PASSFILE string has been inserted in the HACK string.
LOOP This optional record has no value. It's purpose is to tell
the hacker that a loop needs to be done from the next SEND,
WAIT, HACK record until the last SEND, WAIT, or HACK record.
If omitted, then the program will loop from first HACK record
thru the last SEND, WAIT or HACK record. Or if you have only
one HACK record, then the program will loop that one.
Here's a sample control file:
* sample hacker control file, dudez.....
TEST = YES * Show me the modem program.
LOG = NO * they said leave it this way...
CODEZ = SAMPLE.ACT * valid accounts and PWs here please, please..
DIAL = 1 * USE MY FIRST ENTRY...
FORCE = 0 * just keep hacking
COUNT = 35 * TRY 35 TIMES, I AIN'T GOT ALL DAY..
STOP = YES * just get me one code...
PLATE0 = #&&&&&&# * HACK a number, six letters, and a number
PLATE1 = & * ONE LETTER
PLATE5 = ### * HACK 3 NUMBERS
PLATE7 = @@ * HACK 2 ALPHAMERICS
* EDL0 = 5YYBBBB# * DON'T some stuff (commented out SEEDL0
* EDH0 = #YYYYYY# * DON'T TRY Z'S (commented out SEEDH0
GOOD = AT* look for an AT to say we are in!!!
DELAY = 2 *wait 2 seconds
*
* The following records control the modem. (modem program?? eh??).
SEND = @* SEND an @ sign
WAIT = 5* WAIT 5 TENTHS OF A SECOND
SEND = D^M^J* SEND D, a CARRIAGE RETURN, and a LINE FEED.
WAIT = :* WAIT for the : prompt
LOOP *actually this is not needed here has I have only 1 HACK record
HACK = ID=YOMAMA,PASS=PLATE0PLATE7^M^J*hack the fucker
The "*" is used terminate the string in the SEND, WAIT, GOOD, NOGOOD,
and HACK records so that they may contain embedded blanks. None of
the other record type may contain embedded blanks. Ie, the COUNT,
DIAL, PLATEn, TEST, LOG, CODEZ, DELAY, LOOP, SEEDLn, SEEDHn,
SHOW, PASSFILE, MASTERFILE, SKIP, and FORCE values are all
delimited by a blank.
Other shit:
Ok, if you have been trying to read this shit and figure out if
this is useful or not, let me just say that hacking takes so
much time, that you have to be smart about your attack. In other
words, trying to hack a plate like six numbers would represent
one million combinations. Even at an incrediable rate of 1 second
per hack attempt, it's a long time. Well, its about 11.25 days,
so it ain't forever, but in reality, it's much longer, like 9 weeks.
Of course you could get lucky and crack one, say, after a week.
But even that seems a tad too long for my tastes. Yours too. So,
phuck, what are you gonna do? Well, you have to know something
about your target. Like if you think the password is 2 letters and
a 6 digit number, then try SS313### as a plate or things like
that. 3 numbers represents 1,000 tries that at 9 seconds per hack
attempt (a reasonable number) would take 2.5 hours. If your are
guessing six digit numbers, I would run it with at least 3 digits
specified or even 4 if I was watching. Of course at 9600 you might
get the time down to 1 second per attempt, but if the system
drops carrier every three attempts, then 6 seconds is about as
good as it gets.
Well, that was a lot of shit, wasn't it? Hopefully after you try
it a bit, the descriptions will make more cents...
This fucking code would have been a lot easier if the damn thing
supported arrays... Oh well kuldge away!!!!!
Note that all of the "|"s in column one of this text specify changes
to the previous versions of this text.
Another Telix script has been inclued, called MERGE.SLT. It it used
to merge two sorted password files into one file. After you compile
it and invoke it, you will be asked for the names of the input files
and the name of the output file. There is no error checking done,
so if you specify the same file has input and output, then funny
things will probably happen.
Finally, I have spent my time makeing the telix hacker work correctly
when the control and config shit is correctly entered. I have not
tested (much, anyway) what happens when things are specified wrong,
like if you specified a High seed value of 0 for an alphabetic
field in the plate. So if you have problems please brefily state
what's not working and include the CONTROL file that you are trying
to hack with.
Currently the following BBSes are blessed by the Telix Hacker:
The Electric Pub 415-236-4380 3/12/24 24Hrs 90 Megs of leechabilty.
Stainless Steel 415-937-2351 3/12/24 24Hrs Mucho Megs & messages.
Subgenius 415-798-6262 3/12/24 24Hrs of "Bob" and Beer.
Shawn-da-Lay!!!!!!!!!