----------------------------------------------------------------------------- ���������������������������������������������� � � �������� ���������������������������������� � � ����� ����� ������������� � � � � � � � � � � � ����� � � ��������� � � � � � � � � � � � � � � � ����� � � ��������� � � � � � � � � ������ ����� ����� ������������� ���������������������������������������������� � The Hacker's Choice � ���������������������������������������������� -------------------------------------------------------------------------------- THC-SCAN v0.8� (c) 1996 by van Hauser/THC of LORE BBS * PUBLIC BETA RELEASE * Part Title Line # Last Updated in Ver. ------------------------------------------------------------------------------ I. Introduction 50 v0.7a II. Commandline Parameters 240 v0.8� III. Online Scanning Keys 550 v0.7a IV. How to configure Modem & TS-CFG 750 v0.7a V. Tips & Tricks 855 v0.7a Epilog: Update? How to contact? etc. 975 v0.8� ------------------------------------------------------------------------------ ============================================================================== I. Introduction ->> Please read HISTORY.DOC to see what's new, or get a general insight <<- What does THC-SCAN ------------------ THC-SCAN scans a defined range of phone numbers. It Reports : Carriers, Tones, VMBs, Fax etc. etc. depending on the mode setted & configured. (You can do many more things with this piece, but get a brain to find out ... ;-) [300 kb source code by the way ...] Hey that looks like TONELOC ! ----------------------------- Yep. Toneloc is very good. But first it didn't work on my computer and second it could be enhanced. So i wrote this one. And my personal opinion is, that this one is better. Much more flexible and more functions. (which programmer would say his one is not as good as? Why releasing it then?) Take a look. Try it, test it. It's worth it's time ! Who's Who in this file package ? -------------------------------- THC-SCAN.EXE The Scanner EXEcutable TS-CFG.EXE The ConfigMaker EXEcutable DAT-CONV.EXE DAT File Converter Toneloc <-> Thc-Scan DAT-MANP.EXE DAT File Manipulator for Thc-Scan, exchange ID values. DAT-STAT.EXE DAT File Statistical Analyzer. EXTR-NO.EXE Extracts (phone-)numbers from a text file. BETATEST.DOC IMPORTANT INFORMATION FOR BETATESTERS /* Only in BETA Releases */ DATFILE.DOC The Structure of the Thc-Scan DAT Files ERRLEVEL.DOC Overview of the Errorlevels returned by Thc-Scan HISTORY.DOC History File. What's new, what changed, bugs etc. READ IT ! THC-SCAN.DOC Small Documentation for the average Scanner Guy TONELOC.DOC Differences between Thc-Scan & Toneloc. How to (ex-)change. SIGS.ZIP PGP Signatures of all EXEcutable files in this package. Please check to get a secure version of my public PGP key. FILE_ID.DIZ File Description for BBS LORE.COM Small demo of LORE BBS ;-) THC.NFO Important. Our group infos ;-) The different Modes ------------------- There are two basic modes, THC-SCAN can be set. CARRIER MODE - THC-SCAN searchs for carriers TONE MODE - THC-SCAN searchs for tones/pbx. Those ones with a dialtone. When in CARRIER MODE, THC-SCAN can also identify VMBs, Voice, Fax and more. You may change the mode online by pressing "ALT-M" The AUTONOM/MANUAL Mode ----------------------- This is a special mode, never ever seen on a scanner before. For this Mode ADD-ON you must sit in front of the computer while scanning. (you should do this every time, unless you are so lazy to scan for carriers only) When turned on, you may continue dialing! This is useful for Tones/PBX, or VMBs or Answering Machines, to test the code length etc. Press ENTER when autonom/manual mode is turned on to continue dialing. You may also enter "M" while online to redial and enter autonom/manual mode for this call only. Or you may hit "Alt-M" to toggle this mode on/off DIAL MODES ---------- You can choose to dial RANDOM, Sequentiell up & down (with step rates too) or to Dial all numbers in a specified textfile. Read next Paragraph for details on this. DIALING NUMBER FROM A TEXT FILE ------------------------------- This allows you to scan every number you put on a list. DRAWBACKS : NO Dat file is created (of course) BACKSPACE key (redial last 20 dialed numbers) won't work here If you want to continue such a scan type after aborting it, you must manually delete everything until the line THC-SCAN should continue. ADVANTAGES : You can put any number on the list you want to. The first scanner ever to offer this possiblity How to use this : Use EXTR-NO.EXE to extract the phonenumbers from any textfile (carrier listings ;-) ... check the created file after that for mistakes etc. Start THC-SCAN with : THC-SCAN.EXE @ [any other options] Note that /M, /X, /D and /R are disabled when using this option. Guys, this one is REALLY cool! I collected EVERY textfile, message, Scanlist TL & TS DAT File and extracted every modem carrier into the file. Then I scanned ALL 700 numbers found, revealing me the list of 500 carriers on german toll free numbers, the most complete list ever to be created ... PRIMARY & SECONDARY Identifications ----------------------------------- This is also a special thing first ever possible in a scanner. Primary Identification is the main thing about the number. Is it a carrier, tone, vmb, girl voice, fax etc. You press the ID key (F for Fax f.e.) and THC-SCAN will stop and move to the next number. Secondary Identifications are other characteristica which are interesting. For example if the phone system of the target is using CCiTT #4 or #5 which is interesting for blueboxers, or to determin if the number is in an other country (better if you want to play with those numbers, depending on the law of your country, you may only break the law in the country the phone number is located. Check your lawyer.) on f.e. Toll Free Numbers. When you press the ID key for a Secondary ID (5 for CCitt #5 for example) THC-SCAN will not stop. You may type some more 2ndary IDs. But when you press a Primary ID, THC-SCAN stops and moves to the next number. SECONDARY Identifications are marked in Section III - Keys while online as SECONDARY. Carrier Hacking & Nudge ----------------------- When mode enabled (TS-CFG : MODE HACKING), depending on mode set it will 0) wait for nudge delay timeout 1) send nudge string to system and wait for nudge delay timeout 2) beeps a few times to inform you that YOU can now enter the system. NO nudge delay timeout. You can online hack the other system) Don't unset the string variable for your Carrier Hack Log, or no log file will be created. Pressing ALT-T while 0) or 1) is in progress automatically enters 2) See TS-CFG to see how to set up the NUDGE STRING. NUDGE DELAY counts the time after the connect had been made. When exceeding Nudge delay setting, THC-SCAN disconnects (only in 0) and 1) ) The DAT File & the LOGs ----------------------- In the DAT file are many things things saved - all primary IDs and the no# of rings detected on that number. Not the 2ndary IDs ! In the LOG files everything is written. In the main log file everything is logged, in the specialized logs (VMB LOG f.e.) only those about this type are written too. If you Delete the name entry in TS-CFG, that type won't be logged in an own file anymore! van Hauser says : ----------------- Thanks to all Betatesters, especially to : The Analyst, Wilkins & Plasmoid ! Credits for the nice blinking Screen, and scrolling up/down go to Plasmoid ;-) Credits too for the nice EXE file crypter got to Marquis. ;-) Greetings to : � Omega (hi chummer! Thanks for your help! And make a BACKUP!) � Tom (thanks for your betatesting too!) � The Search, JFF (good work spreading the THC releases) � Scavenger (thanks for the help! (& the best dialer, ya know) � Skysegel (spoof'em! ;-) � The Q (for being no where and absent all the time) � Marquis / UCF (let's let our groups work together ;-) � Muchos Maas, Minor Threat (for programming TONELOC, breaking the limit at the art of scanning. Your program gave me GREAT inspirations!) Hope ya get out of jail soon. ... and to Dr. Fraud, Karl Marx, Chotaire ... all on #bluebox And two guys who are out at the moment ... the two most dangerous things that may happen to a hacker : � El Griton (Being busted by Police + Fbi ... good luck chummer!) � Vaxxer (Being occupied by his girlfried ... Get up AGAIN!) With those guys, the sky is the limit ... ============================================================================== II. Commandline Parameters --------------------------------------------------------------------------- THC-SCAN.EXE [@] [/M:] [/X:] [/R:-] [/D:-] [/#:] [/H: