Anyone worked in a WU/MG office?

goshko

Carder
Messages
41
Reaction score
4
Points
8
I have some questions on how the system works.

Is it like web based software where you input sender and receiver information to the WU/MG server?

What kind of passwords/security/encryption is involved? Do they use a dedicated PC only for the WU/MG ?

In my country there are a lot of small WU/MG offices based in exchange bureaus, gas stations and even pawn shops.

I have people working in 2 of the biggest ISP providers here and I can easy find WU office which I can sniff traffic. This will probably not work, as I am sure they use SSL and probably VPN but what will surely work is to infect their computers with a trojan. I don't think they use very secure computers, and employees browse the web and facebook all the time. Tapping the line and infecting the PC with some malware should be easy. From there I can capture the passwords with keyloggers, capture screenshots, or even take over the PC and be able to send WU transfers as I am sitting on the PC.

Is it as easy as I think, or is it more complicated? Any info about the WU/MG offices will be appreciated
 
i dont know how work in your country but in usa and others country in america they use a private network to acces to WU servers. maybe whit VPN somes offices use WEB acces other use a private WU software but if you can infect local computers like you say.. maybe you also can get VPN acces to enter to his network and you can track many WU as you want and cashed out.. i do this in the pass but i loose my inside girl
 
I have seen them using browser access with login/pass and a web certificate. The certificate was necessary to log in.
 
I suggest you to do social engineering and try to find out their IP's.
Small centers have limits on sending.
 
Damn, I didn't think they might have limits. Finding the IP's is easy. Taking over the PC, installing keylogger and remote desktop backdoor might get the job done if it's sertificate and user/pass.
 
This will probably not work, as I am sure they use SSL and probably VPN but what will surely work is to infect their computers with a trojan.

and how exactly r u going to do that? considering the success rate on modern day exploit packs it seems far fetched to me. less talk more action
 
"uber hacking" is out of the question here.
Best luck is social engineering. Call them, say you are from WU, you are sending an update to them to their email. Hold on the phone while they install it. Wait a few minutes so they can appear in ur panel / rat. Wait until they login and you have login info.

Problem from this scenario is that when you do a querry in the server, wu datacenter is noticed. So you wont have alot of time getting all the mtcns out
 
actually it is easy for me to gain physical access to their "cable" . From there i can issue a MITM attack - there is a software which monitors if some software like skype, adobe, etc. checks for updates and infects those updates. but the fact that they have those limits is making me think that it will not be worthed, and if I do this 10 times i risk being caught.
 
You do not need to focus on how many u can create.You can querry their database for past tranactions and get all of them
 
Please note, if you want to make a deal with this user, that it is blocked.
I have some questions on how the system works.

Is it like web based software where you input sender and receiver information to the WU/MG server?

What kind of passwords/security/encryption is involved? Do they use a dedicated PC only for the WU/MG ?

In my country there are a lot of small WU/MG offices based in exchange bureaus, gas stations and even pawn shops.

I have people working in 2 of the biggest ISP providers here and I can easy find WU office which I can sniff traffic. This will probably not work, as I am sure they use SSL and probably VPN but what will surely work is to infect their computers with a trojan. I don't think they use very secure computers, and employees browse the web and facebook all the time. Tapping the line and infecting the PC with some malware should be easy. From there I can capture the passwords with keyloggers, capture screenshots, or even take over the PC and be able to send WU transfers as I am sitting on the PC.

Is it as easy as I think, or is it more complicated? Any info about the WU/MG offices will be appreciated

They use SSL, vpn and other security measures, it's not easy to get in, but you can do it if you work some offline things/research also. Calling them to find out the females working there, sending them a trojan on a cd/dvd to some less clever vulnerable people/women (most women that get rushed by some theory that they don't understand in a technical field quickly loose themselfs , i noticed this while i was working some banks by phone)somewhere out of the big citys. That will sure make your job a lot easyer, trying to take over western union terminals online alone is not very easy. Think of ways to get a trojan/bug/virus in there with offline techniques. It doesn't matter if it's in a big city or somewhere out there, it's the same network. Once you're comfortable in their system you can think of ways of ripping them off. Anyway, you should definately do offline research.
 
bro you should look for center with wifi and crack their WEP/WPA2 ))
then sniff network to/from IP's for the point u need to hack to )
most liekly they will share c$ with Administrator and blank password =)
 
I have wifi password for a travel agency in my country in which they do WU transfers
They use same internet connection to send the transfers
i also have accese to router (they didnt change default password)
Anyway i can infect their pc?
 
yes you can upload at sniffer. to sniff all .. and get acces link to the intranet. of wu..trough his pc you can get access to the private network they use to get in wu system...now you need to configure router/hack it.. to get acces to OS. this its easy just only need to know what kind of router is and search some vulnerability or manulas to bypass router and acces to OS.. router must be a CISCO? i guess
 
blue*, in the router settings you can change the DNS servers to your server. setup a custom dns server and change some settings, so when a user from the network tries to open google.com they go to your page instead. very easy way to infect a pc.
 
goshko )) this is very clever i have not heard of this method, will use when time come bro!!
for people who cannot obtain router, a lot of these have bypass exploit or can be logg in with default administration password such as admin/admin :))

another method can be done with netbios spread ) some PC have c$ drive default share and open to all person ) find an application one always open such as iexplore.exe and copy it to your drive. use undetected exe-binder and bind something to it )

you could also just rename iexplore to iexplore2.exe and make you own software to just shell iexplore2.exe and your virus at same time)))

get ip scanner for ports 135/139/445 on this lan i think these are the ports you must look for. you can also run net view via the command window if on winnt-win7

attempt to acces \\ipaddress\c$ in browser win. default login may let you in as well such as this 'guest' or 'administrator'
 
Last edited:
Top