Professor
Professional
- Messages
- 213
- Reaction score
- 22
- Points
- 18
Today I want to share with you such a scheme
Not because the topic has exhausted itself, but because I myself do not do this anymore and you can modify the theme as much as you like.
And so let's get started ...
- Investments from $5
- Payback from the first time
- Maximum check $1000
- Team from 1 person
- Development time from 5 to 24 hours
So, the guide itself, how we used to chop money every day:
1. We buy a stealer from a trusted seller. It is important that the seller constantly upgrades it and is in touch 24/7.
2. Glue the stealer with a Word document called "Advertising Technical task".
3. Create a site (empty) in a free constructor and link a free domain similar to the domain of a large company.
4. Create an email on a domain with an approximate login ads@GoldApple.com
5. Order a beautiful advertising letter - mailing from the guys - designers from Vorum with an offer to embed an advertising integration of the brand in a video with real links to social networks, official phones.
6. Go to YouTube, look for bloggers with an audience of $1000-5000 who are not connected to affiliate programs, go to the channel, the About channel tab, show the email address.
7. Send a personalized letter to the blogger that we want to cooperate, the technical task for integration in the attachment and are really looking forward to the cost and feedback, whether the technical task suits.
8. The blogger downloads the technical task and that's it, profit. Now using an example from life:
300 potential targets were found.
One of the bloggers is Inna Sudakova (No links, not advertising) Audience of 100 thousand subscribers
From the supposedly official account of the "Golden Apple" store (Perfumery, cosmetics), we send her a request: mule "let us pay you for advertising in the video and send you a product for review, you are a wonderful woman, you will always need care products! We have prepared several options for advertising integrations for you, a complete technical task with timing, links and descriptions of the products in the attachment. We are really looking forward to your feedback, the timing and cost of the selected option. We will discuss the products for review a little later. We are very grateful to you for your creativity!"
Our victim, happily downloads the technical task for advertising, thereby transferring to us in the stealer panel all logins, passwords, cards, in a word, all the information about their location on the Internet - here the most interesting part begins, the victim is on our hook.
And this is the topic of the Internet provider's account, which we can easily cut off for her, and Google mail data, to which a channel with a large audience is linked, which brings her more than $3000 a month, Social networks, accounts on sites, in a word - everything.
We track that the victim's time zone has come night and take everything, changing passwords (where SMS is not required - we confirm by mail. We also have access to it)
We read FB correspondence, social networks, look for a phone number, address, shameful photos, sex correspondence, in a word - any incriminating evidence.
And in the morning we write a letter:
"You have lost everything you had. You are no longer on the Internet, now you are nobody. Now everything is in my hands: from the Internet and television in your apartment to your bank account. But that's not all. The most valuable thing - your YouTube channel is also in my hands. As well as all your social networks, in which I found intimate photos, confidential data and that very video from the bowling alley that you sent to your friend Zhenya. I think now you understand that your life, reputation and money are in my hands ... I give you 16 hours to transfer me $1000, in ten payments. Then - I will give you the password to all your social networks, mail and accounts. If I do not receive the money on time - I will permanently delete each of your accounts and publish a report in the feed of your Instagram. Every even hour - account deletion, every odd hour - leaking the most secret: photos, videos, correspondence.
We start the countdown from 10:00 your time."
Well, that's it, then you control the victim as you want. Manipulate her and don't forget to send screenshots that you really have the information and can freeze the Internet at any time or send a naked photo of her to the world.
Not because the topic has exhausted itself, but because I myself do not do this anymore and you can modify the theme as much as you like.
And so let's get started ...
- Investments from $5
- Payback from the first time
- Maximum check $1000
- Team from 1 person
- Development time from 5 to 24 hours
So, the guide itself, how we used to chop money every day:
1. We buy a stealer from a trusted seller. It is important that the seller constantly upgrades it and is in touch 24/7.
2. Glue the stealer with a Word document called "Advertising Technical task".
3. Create a site (empty) in a free constructor and link a free domain similar to the domain of a large company.
4. Create an email on a domain with an approximate login ads@GoldApple.com
5. Order a beautiful advertising letter - mailing from the guys - designers from Vorum with an offer to embed an advertising integration of the brand in a video with real links to social networks, official phones.
6. Go to YouTube, look for bloggers with an audience of $1000-5000 who are not connected to affiliate programs, go to the channel, the About channel tab, show the email address.
7. Send a personalized letter to the blogger that we want to cooperate, the technical task for integration in the attachment and are really looking forward to the cost and feedback, whether the technical task suits.
8. The blogger downloads the technical task and that's it, profit. Now using an example from life:
300 potential targets were found.
One of the bloggers is Inna Sudakova (No links, not advertising) Audience of 100 thousand subscribers
She runs the channel herself, doesn’t understand much, and has videos without editing or native advertising.
From the supposedly official account of the "Golden Apple" store (Perfumery, cosmetics), we send her a request: mule "let us pay you for advertising in the video and send you a product for review, you are a wonderful woman, you will always need care products! We have prepared several options for advertising integrations for you, a complete technical task with timing, links and descriptions of the products in the attachment. We are really looking forward to your feedback, the timing and cost of the selected option. We will discuss the products for review a little later. We are very grateful to you for your creativity!"
Our victim, happily downloads the technical task for advertising, thereby transferring to us in the stealer panel all logins, passwords, cards, in a word, all the information about their location on the Internet - here the most interesting part begins, the victim is on our hook.
And this is the topic of the Internet provider's account, which we can easily cut off for her, and Google mail data, to which a channel with a large audience is linked, which brings her more than $3000 a month, Social networks, accounts on sites, in a word - everything.
We track that the victim's time zone has come night and take everything, changing passwords (where SMS is not required - we confirm by mail. We also have access to it)
We read FB correspondence, social networks, look for a phone number, address, shameful photos, sex correspondence, in a word - any incriminating evidence.
And in the morning we write a letter:
"You have lost everything you had. You are no longer on the Internet, now you are nobody. Now everything is in my hands: from the Internet and television in your apartment to your bank account. But that's not all. The most valuable thing - your YouTube channel is also in my hands. As well as all your social networks, in which I found intimate photos, confidential data and that very video from the bowling alley that you sent to your friend Zhenya. I think now you understand that your life, reputation and money are in my hands ... I give you 16 hours to transfer me $1000, in ten payments. Then - I will give you the password to all your social networks, mail and accounts. If I do not receive the money on time - I will permanently delete each of your accounts and publish a report in the feed of your Instagram. Every even hour - account deletion, every odd hour - leaking the most secret: photos, videos, correspondence.
We start the countdown from 10:00 your time."
Well, that's it, then you control the victim as you want. Manipulate her and don't forget to send screenshots that you really have the information and can freeze the Internet at any time or send a naked photo of her to the world.
The theme can be modernized as much as you like. The main thing is to have minimal SI skills to find an approach to each victim.