💾 Archived View for spam.works › mirrors › textfiles › hacking › shawn-file-check captured on 2023-11-14 at 09:58:02.

View Raw

More Information

⬅️ Previous capture (2023-06-14)

-=-=-=-=-=-=-

        The muther fuckin awesome Telix Hacker (TH, duh) for IBM and
             IBMish type komputers. If you run Telix, then you can
             use this. If not, you wasted some filez pointz.

      Shawn-da-Lay Boy Productions (tm) (c) 1989, 1990, 2001...
            In cooporation with the Macro 2 division of
                     Insanity Softwarez Inc.


                Opening shit: Version 1.10

     Inspired by Phry Code Pro, fellow travelers, and cause I wanted to
     see the shit on my screen.  And cause I wanted to show the awesome
     power of Telix scripts. (Waste of time to tell phuckin pirates
     to register Telix). Good for Telenet, PooPnet, or any other
     komputer that you wanna hack on. I don't approve BBS hacking so,
     SYSOPs, don't blame me if some fucking kid uses it against
     your system.  I claim no responsibility for the use, abuse, or
     effects that this Telix script will generate.

    Feel free to modify this to make it work the way you want. Hell,
    that's why you got the Bob damned source. But, don't expect me
    to fix problems exposed by your changes.  If you don't program,
    then leave the friggin source alone. Problems and suggestions can
    be forwared to me on any of the awesome BBSes that I grace my
    presence with.  I may not accept your ideas, but I wanna hear
    them, dude.  Of course if you don't know who I am, this could
    present problems, but I hope that the kind SYSOPs will pass on
    any relavent comments or Email.  Since I actively modem, I am
    sure word of serious problems will reach me.  However, a few
    kind words are always appreciated like, "Fuck, Rad spaggetti code
    dude."  You aren't still reading this paragraph, are you? I dozed
    off about 3 sentences back.

    Following this shit, the shit is divided into 4 sections.
    general, config, control, and other.



                   General Shit:

    Ok, first you gotta compile the salt source.  See your Telix dox
    if you don't know how to do that. (like enter CS THxxx at the DOS
    prompt, the xxx is the version number of your source, the file
    with the extension of .SLT, got it?)

    Second, edit the TH.CFG (Telix Hacker config file). And change
    things you want changed.  See TH config file description for
    gorey details. (don't you hate when they do that??)

    Third create the Telix Hacker control file (pointed to in the
    config file or manually entered, if in manual mode).  See
    TH control file specifications.

   Forth, fire up Telix and invoke the script. Then take a nap, watch
   about 10 hours of TV or maybe take a weeks vacation, cause this
   is gonna take a while. Of course, if you specify good patterns
   (aka plates) then you might get a valid account faster, but it
   is probably going to take a muther fucking LONG time.  But at
   least you can see what is happening and will know you're not
   spinning your wheels.




                 Config shit:

   This file specifies shit about how the hacker is to operate. It
   has several record types which I will describe shortly. All
   Keywords must be delimited by a blank, an equal sign, and another
   blank. Like "AUTO = OFF".  Keywords may be specified in any order,
   just one keyword per record.  If a keyword is speficied several times
   the last specification will be the one in effect.  The config file
   must be called TH.CFG and be in your active directory (phuckin MS-DOS
   shit).

 keyword               Silly description

   *      This signifies a comment record. All text after that will be
          ignored. It must be followed by a blank.  It can start a
          record or be used to comment a config record.

  AUTO    This tells the hacker to operate automatically. Huh? What
          this means is: If AUTO = OFF, then the hacker will ask you
          for a control file name and use the one specified in the
          TH.CFG file has the default. If AUTO = ON, then the hacker
          will just start hacking with the CONTROL filed specified
          in the config file. AUTO = ON is useful if you are using a
          timed event to fire it up at 3:00 AM when you ain't around
          to reply to the prompt. If this record is ommited, OFF is
          assumed.

  CONTROL This is used to specify the hacker control file that you
          wanna use. The control file controls the actually hacking
          shit to use. (see control file description later on).
          Example "CONTROL = TELENET.HAK". If ommited, the hacker
          will look for a file called TH.HAK. If the file isn't found
          the hacker will format your C drive. Just kidding, you'll get
          a wonderful message asking if you got yer head up your ass
          or something equally stupid.

  CR      This is required. It specifies the two characters that will
          designate carriage return. Leave it has CR = ^M. If you change
          it, besure that it is two characters.

  LF      This is required. It specifies the two characters that will
          designate line feed. Leave it has LF = ^J. If you change
          it, besure that it is two characters.

| CTRL    This is required. It specifies the character that will
|         designate a control-key combo. If CTRL = ^ is specified and
|         you have ^A in a send string, then CTRL-A will be sent.

     Here's a sample TH.CFG file:

  * Sample Telix hacker config file.
  AUTO = ON             * Just start hacking
  CONTROL = SAMPLE.HAK  * hacking samples today...
  CR = ^M               * carriage return
  LF = ^J               * line feed
| CTRL = ^              * Control key combo



                 Control shit:

   This file specifies the actual hacking that is to occur. It's
   format is the same has the config file, but with different keywords.

   The TEST, LOG, CODEZ, DIAL, COUNT, PLATEn, SEEDLn, SEEDHn, DELAY, FORCE,
   LOOP, SHOW, PASSFILE, MASTERFILE, SKIP, NOGOOD, and GOOD records may be
   specified any amount of times, with the last one taking affect.  This
   does not apply to the SEND, WAIT, and HACK records, cause their
   relative order and multiple use control the way the hacker runs.

 keyword               Silly description

   *      This signifies a comment record.

  TEST    This tells the hacker weather to really dial and hack or not.
          If ommited, TEST = NO is assumed. To see how your control file
          will work use TEST = YES and the stuff will be displayed on
          the screen.

  LOG     This should normally have a value of NO, ie, "LOG = NO".
          Anyother value will cause the hacker to log every attempt
          to a file. Like "LOG = TRIES.DAT" will create this file
          and write every attempted hack string to it. If ommited,
          LOG = NO, is assumed.

  CODEZ   This specifies the file where good codes should be kept!!!
          If ommited CODEZ = TH.FND is assumed. If a file already exists,
          then it will be added to, if yer lucky enough to crack a
          code, that is...

  DIAL    This wonderful record tells the awesome hacker what phone
          number to dial. It's format is the same as what you
          enter in your dialing directory. If ommited, the hacker
          won't do shit. Example: DIAL = 10 , hack my 10'th dialing
          directory entry. Or: DIAL = M9765555 , for a phone number
          not in your directory.  The hacker will dial the number
          forever, until a connection is made and redial the number
          every time the connection is dropped.

  FORCE   This optional record tells the hacker how many attempts to
          make before hanging up and forcing redial. If omitted,
          FORCE = 0 is assumed which means keep hacking and only redial
          if the connection is lost.

  COUNT   This is an optional record, If controls how many attempts to
          make. Example, COUNT = 10000 says try 10,000 times. If ommited,
          keep trying forever, or until the hacker is manually stopped,
          which ever comes first.

  STOP    This tells the hacker to stop after a valid code is found.
          YES, means stop and NO means keep on hacking. Ie, STOP = YES
          will cause the hacker to stop and hangup the phone. If ommited
          STOP = YES is assumed.

  SHOW    This tells the hack to display the hack string each time a new
          code is about to be tried. Use SHOW = YES to display each
          hack string before it is sent.  Note that it will be displayed
          in column 41 of the current line to keep it seperate from the
          active terminal session text (hopefully). If ommited, SHOW =
          NO is assumed.

  PLATEn  This specifies a plate for hacking. You can have 0 thru 9
          of them. What's a  PLATE you say? Well it's how you tell
          the hacker what characters to try.  It is composed of
          special characters that have the following meanings:
          # = any number, 0 through 9.
          & = any upper case letter, A through Z.
          @ = both numbers and upper case letters, 0 through Z.
          % = any lower case letter, a through z.
          $ = both upper and lower case letters, A through z.
          * = all three, 0 through z.. that's 62 possible values.
          Example: PLATE0 = &&&###@@@ for specifing a plate of 3 upper
          case letters, followed by three numbers, followed by three
          upper case alphanumerics (0 through Z). Got it? Good!
          Anyother characters are passed along has is. Ie, PLATE0 =
          PCP###@@@ would generate a hack string of PCP followed
          by 3 numbers, and then 3 alphamerics. Plates can only be
          up to nine characters long.

  SEEDLn  These may be ommited, but if used must correspond to the
          plate of the same number. It's used to tell the hacker
          where you want the hacking to start. If omitted, lowest
          values are used to start. This is useful for restarting
          a hacking session.  Example: If PLATE0 = &&&###@@@ and
          SEEDL0 = CCC555@@@ then the hacker will not use A or B in
          in the first three letters and will not use numbers less
          that 5 in the three numbers. @@@ still means use all alpha-
          merics, Note that numbers come before letters in alphameric
          fields so if CCC was speficied for the alphameric field, then
          no numbers would be used along with neither A nor B.  Clear
          has mud, eh? If you have specific letters in the plate then
          the corresponding positions in the seed are ignored.
          There is no error checking done to see if your seed agrees
          with it's plate. So the hacker will run, but the results
          may not be what you want. TEST = YES is good for seeing the
          effect your seed has.

  SEEDHn  Just like SEEDLn, but specifies high limits. If PLATE0 =
          &&&###@@@ and SEEDH0 = YYY888@@@ then the hacker will not
          use Z in the first 3 positions or 9 in the second three.

  GOOD    This record contains a string that the hacker should expect
          to receive when a valid code has been hacked.  It should be
          the last record in the file, duh. Example, GOOD = WELCOME*.
          The "*" is used to end the string. It can contain no more
          than 40 characters.

  NOGOOD  This optional record is used when you don't know what the
          GOOD string should be.  This means that if anything is
          received that is not the NOGOOD string, the hacker should
          assume that a valid code has been cracked and write out
          the valid code.  Either the last GOOD or NOGOOD record in
          the control file will be the one in effect.


  PASSFILE  This is an optional record that will specify a file that
          contains a list of strings to use for hacking.  Example,
          PASSFILE = PASS.DAT would mean read the PASS.DAT file for
          strings to use for hacking.  Note, for the strings to really
          be used, you must have the uppercase word "PASSFILE" in a
          HACK record, ie, HACK = PASSFILE*.

  MASTERFILE This is a optional record that is used to tell the hacker
          weither or not to switch to the master password file (called
          THPASS.LST) after all the records in the PASSFILE have been
          processed. To cause the switch, MASTERFILE = YES, must be
          coded. If ommited, MASTERFILE = NO, is assumed.

  SKIP    This is used to tell the hacker howmany records in the
          PASSFILE and MASTERFILE to skip over.  Example, if SKIP =
          100, is coded, then the first 100 records in PASSFILE will
          be skipped. If the PASSFILE only had 50 records then it
          will be skipped along with the first 50 records in TH.PASS
          (if MASTERFILE= YES was coded).

  DELAY   This is the number of seconds to wait for the GOOD/NOGOOD
          string. If ommited, DELAY = 6 is assumed.

  SEND    You may have has many of these has you need, up to 10. They just
          specify a string to be sent once the connection is established.
          Example SEND = N  ... each SEND record encountered will be
          sent just has specifed. Useful for the inital shit a system
          may ask you before the signon. Note if you want a carriage
          return sent you must include that, like SEND = N^M . (^M is
          telixese for carriage return.) The string cannot exceed 40
          characters The SEND string is terminated by an "*". Example:
          "SEND = C C00512^M* send the string and carriage return"
          sends 9 bytes, the 8 byte string "C C00512" and the carriage
          return.

  WAIT    Like SEND you can have all of these you want, up to 10. It
          specifies text that you expect to receive and will cause the
          hacker to wait for it, for up to 5 minutes. If time expires,
          the hacker will quit with an error msg. Example: WAIT = NAME:* ,
          wait for a NAME: prompt.  If you specify a number, then
          the hacker will wait that many tenths of a second. Example,
          WAIT = 10 , means wait 1 second. For text values, no more
          than 40 characters may be specified. Like SEND the string
          is terminated by an "*".

  HACK    This tells the hacker to start hacking. Example:
          HACK = PLATE0,PLATE1 PLATE2* any non PLATE values are
          assumed to be literals and are sent has typed. If multiple
          plates are specifed, then the first one goes through all
          possible values before the second one is incremented.
          You can have multiple hack records. If so you would probably
          seperate them with a WAIT record. The first hack record is
          rotated through all possible values, before the next one is
          incremented.  If a plate is specified in more than one
          hack record, it is incremented independantly of the others.
          Currently, you can have up to 10 HACK records. Each hack
          value (the stuff after the = and before the *) cannot
          exceed 60 characters in either the raw form or after the
          plate(s) have been substituted. Note, that you can specify
          both PLATEn and PASSFILE in a HACK record, if you want.
          However, the PASSFILE keyword should only be used once, in
          one HACK record only. There is nothing to stop you from
          using PASSFILE in mutiple HACK records, but why would you?
          Also be careful with the length of the strings in your
          PASSFILE so that they don't overflow the HACK string after
          the PASSFILE string has been inserted in the HACK string.

  LOOP    This optional record has no value. It's purpose is to tell
          the hacker that a loop needs to be done from the next SEND,
          WAIT, HACK record until the last SEND, WAIT, or HACK record.
          If omitted, then the program will loop from first HACK record
          thru the last SEND, WAIT or HACK record.  Or if you have only
          one HACK record, then the program will loop that one.

     Here's a sample control file:

  * sample hacker control file, dudez.....
  TEST = YES            * Show me the modem program.
  LOG = NO              * they said leave it this way...
  CODEZ = SAMPLE.ACT     * valid accounts and PWs here please, please..
  DIAL = 1              * USE MY FIRST ENTRY...
  FORCE = 0            * just keep hacking
  COUNT = 35            * TRY 35 TIMES, I AIN'T GOT ALL DAY..
  STOP = YES            * just get me one code...
  PLATE0 = #&&&&&&#         * HACK a number, six letters, and a number
  PLATE1 = &                * ONE LETTER
  PLATE5 = ###              * HACK 3 NUMBERS
  PLATE7 = @@               * HACK 2 ALPHAMERICS
  * EDL0 = 5YYBBBB#          * DON'T some stuff  (commented out SEEDL0
  * EDH0 = #YYYYYY#          * DON'T TRY Z'S     (commented out SEEDH0
  GOOD = AT* look for an AT to say we are in!!!
  DELAY = 2 *wait 2 seconds
  *
  * The following records control the modem. (modem program?? eh??).
  SEND = @* SEND an @ sign
  WAIT = 5* WAIT 5 TENTHS OF A SECOND
  SEND = D^M^J* SEND D, a CARRIAGE RETURN, and a LINE FEED.
  WAIT = :* WAIT for the : prompt
  LOOP     *actually this is not needed here has I have only 1 HACK record
  HACK = ID=YOMAMA,PASS=PLATE0PLATE7^M^J*hack the fucker

    The "*" is used terminate the string in the SEND, WAIT, GOOD, NOGOOD,
    and HACK records so that they may contain embedded blanks. None of
    the other record type may contain embedded blanks. Ie, the COUNT,
    DIAL, PLATEn, TEST, LOG, CODEZ, DELAY, LOOP, SEEDLn, SEEDHn,
    SHOW, PASSFILE, MASTERFILE, SKIP, and FORCE values are all
    delimited by a blank.



                 Other shit:

    Ok, if you have been trying to read this shit and figure out if
    this is useful or not, let me just say that hacking takes so
    much time, that you have to be smart about your attack. In other
    words, trying to hack a plate like six numbers would represent
    one million combinations. Even at an incrediable rate of 1 second
    per hack attempt, it's a long time. Well, its about 11.25 days,
    so it ain't forever, but in reality, it's much longer, like 9 weeks.
    Of course you could get lucky and crack one, say, after a week.
    But even that seems a tad too long for my tastes. Yours too. So,
    phuck, what are you gonna do? Well, you have to know something
    about your target. Like if you think the password is 2 letters and
    a 6 digit number, then try SS313### as a plate or things like
    that. 3 numbers represents 1,000 tries that at 9 seconds per hack
    attempt (a reasonable number) would take 2.5 hours.  If your are
    guessing six digit numbers, I would run it with at least 3 digits
    specified or even 4 if I was watching.  Of course at 9600 you might
    get the time down to 1 second per attempt, but if the system
    drops carrier every three attempts, then 6 seconds is about as
    good as it gets.

    Well, that was a lot of shit, wasn't it? Hopefully after you try
    it a bit, the descriptions will make more cents...

    This fucking code would have been a lot easier if the damn thing
    supported arrays... Oh well kuldge away!!!!!

    Note that all of the "|"s in column one of this text specify changes
    to the previous versions of this text.

    Another Telix script has been inclued, called MERGE.SLT. It it used
    to merge two sorted password files into one file.  After you compile
    it and invoke it, you will be asked for the names of the input files
    and the name of the output file.  There is no error checking done,
    so if you specify the same file has input and output, then funny
    things will probably happen.

    Finally, I have spent my time makeing the telix hacker work correctly
    when the control and config shit is correctly entered.  I have not
    tested (much, anyway) what happens when things are specified wrong,
    like if you specified a High seed value of 0 for an alphabetic
    field in the plate. So if you have problems please brefily state
    what's not working and include the CONTROL file that you are trying
    to hack with.

    Currently the following BBSes are blessed by the Telix Hacker:

    The Electric Pub 415-236-4380 3/12/24  24Hrs 90 Megs of leechabilty.
    Stainless Steel  415-937-2351 3/12/24  24Hrs Mucho Megs & messages.
    Subgenius        415-798-6262 3/12/24  24Hrs of "Bob" and Beer.

                         Shawn-da-Lay!!!!!!!!!