Search results

  1. P

    Staying Legite!

    Staying legit and true to customers and other members of the forum as been one very important part that brings success i.e you get referrals, respect etc from people. Looking at the time I've spent on the boards, I've learnt couple of things that makes the good people turn the bad-guy. Below...
  2. P

    Stealing from phishers....

    I was amazed, it is so easy. Here is how you do it: Contents: Step 1 (Finding hosts) Step 2 (Getting logs) Step 3 (Other way to get logs) Step 4 Check the quality Step 5 Enjoy Step 1 You need a list of hosters phishers use. Search for free hosts which allow php. In this tutorial I will...
  3. P

    Holos

    Posted: Tue Aug 27, 2002 7:57 pm by midhack Creating Home Holograms By Anonymous Many people ask about holograms. What are they? many are translucent paint, some are light refracting, others are merely metallic images or letters repeated over and over. Some others (Such as the old "blue"...
  4. P

    Breaking VISA PIN

    Have you ever wonder what would happen if you loose your credit or debit card and someone finds it. Would this person be able to withdraw cash from an ATM guessing, somehow, your PIN? Moreover, if you were who finds someone's card would you try to guess the PIN and take the chance to get some...
  5. P

    Track2 generation questions and answers

    INTRODUCTION (all the information provided here is solely for educational purposes, it does have no conection with real banks, real card numbers and real credit card tracks, misuse of the given information conducts to infringement of the law of many countries. We do not aim to write complette...
  6. P

    POS skimming (1)

    Hallo All, I'd like to tell You something in POS skimming but first.. I'm student of electronics and mechanisms, I can offer You some knowlage.. nowadays/soon ATM skimming will be more risky, Police and Depatments hardly working and Banks teaching customers how recognize skimmers and fake...
  7. P

    PIN ATTACK

    Decimalisation Table Attacks for PIN Cracking Mike Bond and Piotr Zielinski University of Cambridge, Computer Laboratory, Gates Building, JJ Thompson Avenue, Cambridge CB3 0FD, United Kingdom fMike.Bond, Piotr.Zielinskig@cl.cam.ac.uk Abstract. We present an attack on hardware security modules...
  8. P

    Exploiting Track2 Info

    The following article explains practically how vulnerable banks are in the operation of ATM cards. ATM cards (Credit cards) usually has a magnetic stripe that contains the raw data called tracks for its operation. The physical layout of the cards is standard. The LOGICAL makeup varies from...
  9. P

    Few things about UK dumps

    A few things about UK dumps author:JiLsi wrote this for SC, back in the days I am sure lot of people know about dumps, let look a bit deeper in to the dumps and how the are authorised in UK. There are eight different main card types visa, master, debit visa, electron, solo and switch, etc...
  10. P

    Holographic Overlaminate

    I found this is a copy right website - thought some people might find it interesting. Marlo DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS The present invention includes a process that prints a clear layer or layers over a YMCK composite printer layer on an identification card by using...
  11. P

    InStore Carding Tutorial for Beginners

    Everything you wanted to know about instore carding Introduction: So youre interested in trying out instore carding? Instore carding is one of the fastest ways to get money. But you will need to keep your head on straight for this. As you should with every operation you go out to do. This...
  12. P

    Software description

    Software To work with skimmer a computer is necessary of course. You need to save somewhere your dumps. We will provide a driver (software), which completely control your skimmer. Using this software, you can download dumps from skimmer, remove them from there, also download only "new" dumps...
Top