Account mining. Earning money on a dump.

Hacker

Professional
Messages
1,048
Reputation
9
Reaction score
714
Points
113
This article is written for beginners.

"How to dump?" or "Where to get accounts?". So today we will mine accounts and get a profit from them.

What we will need:
  1. Brains and smooth hands.
  2. Dorks.
  3. Proxies are preferably private, but you can also use public ones.
  4. For the best result, use private software.
I will not describe the creation of dorks, there are enough articles and ways to do this.

So let's get started:
  • Open the Searcher, click "Source" and select our dorks.
  • Click "Proxy" and load the proxy.
  • Configuring the proxy as shown in the image:
57667933839c6dc8681c1.png

  • Click "Start" and wait for the end of parsing (or until you get tired of it).
  • Open SQLi Dumper and import our links:
189cc82e45620821e7190.png

  • Go to the next tab and click "Start Exploiter" and wait for the check to finish.
  • In the "Injectables" tab, check the boxes as shown in the screenshot and click " Start Analyzer":
679b6b39a492b3fbb8c32.png

  • After waiting for the end, select all the links and click Search Columns\ Tables Names, write what we will search for for example:
050aead409cc0f6b06c11.png

  • Click "Start", search for the same number in parentheses:
0dcc4a7aa051f4cc48a18.png

  • Select one of them and click "Go To Dumper", "Dumper form".
83e39efbcb19f4221eaa7.png

  • Select the desired column in our case user and click "Get Columns".
9884228218e5a77465b35.png

We put ticks on the columns that we need and click "Get Data" after merging the database, export it to the document.

And so we merged the database, but most often it is encrypted, in order to get something from it, you need to decrypt it.

Quite a lot of Google articles have been written on decryption.

Let's say we received email:password, what should we do next? It is advisable to run the database with an anti-patch and keep private. Then there are many ways to make a profit from this:
  1. Find database buyers.
  2. You collect requests from people that they need and check them for valid, and if successful, we sell the requests.
  3. We check for invalid requests (origin, uplay, etc.) and sell accounts to buyers or friends.
With the first point, everything is clear.

The second point is also typed proxy, take a crack AIO or Amfi and go to check is not necessary to check with a proxy, but it is better with them.
 
Top