Carding 2025: Methods, Tools, Anonymity – Full Analysis

Jollier

Professional
Messages
1,391
Reaction score
1,448
Points
113
Carding 2025 | The Basis of Anonymity on the Web!

How are things with anonymity on the Internet today? What technologies do carders use in 2025 to stay out of sight? VPN, TOR, multi-entries, encryption - do these methods work or is it already the last century?

Hello everyone! In this article, we will talk about anonymity. You will never get complete anonymity in the context of the network, and whoever you are, you will be found if you are really needed. You can get as close to anonymity as possible by individually studying your specific case, and in no other way.

There are no and cannot be universal advice here, it is necessary to take a comprehensive approach to this issue. At the same time, you need to understand well how networks, systems are arranged, how software works, how all this is interconnected and what problems there are. You need to study this for a very long time, and from the very basics, no less than, for example, the same pentest, the base, by the way, is the same.

And if there is no such understanding, or no desire to learn, then it is better to order a turnkey solution from a specialist, and perhaps with full permanent support of the security system that you or someone else will build for you. No one will tell you such things in a nutshell in principle. It is almost the same as explaining to a beginner from scratch how a nuclear reactor works, teaching him how to service and operate it, or, in extreme cases, a passenger plane. A question from one subscriber. I heard that VPN over Tor is not very good, but why? Especially if you add additional layers of security. Also tell me what would be the best setting and in what order. Answer. By sending traffic through Tor, this does not allow the provider to see the fact of connecting your equipment to Tor. This is the only thing for which a VPN can be useful in your case. Changing the number of nodes in the chain will not provide guaranteed security, but will only increase the time it takes to find your location, cut the speed and thereby create hemorrhoids for yourself.

The basis of basics. Some people might think this chain is for the anonymity of some Baron Pablo, I will describe the best option for everyone and it doesn't matter who you are. Let's start with the fact that no one needs you, I will describe the main things and what will at least improve the anonymity of beginners by 100 times, and for this area this chain will save your ass. Over time, you can improve it.

Your work computer is a work computer, you have never connected it to your home network, and it has not released a single packet to the Internet from your white Internet, where you watch Pornhub, play games and sit on social networks. This was previously described in detail in the Tor documentation, in particular, there is a link to a study from the early mid-2000s. No Windows and Macs work and I do not recommend it, you will get tired, there are all the services and pitfalls.

We buy a flash drive and encrypt it with VeraCrypt. We carry the flash drive with us when we do not carry a laptop, a worthy option is Sealand flash. This is a device with an automatic destruction function. Remove the camera, microphone and speakers, be sure to physically. In laptops, most often up to 4 cables go to the monitor, video, up to two Wi-Fi antennas and one wire, the one we need, most often this will be the camera plus micro. There has long been a design of a circuit for repairing old laptops, make sure that you are pulling exactly this.

Check that neither the camera nor the micro no longer work and they are not in the system. What you pull out from a homemade kernel of video camera and audio drivers will not give you anything. Anyone who wants to will definitely assemble modules for your kernel or hack the kernel and load the code. We remove the speakers. Through sound, you can drain a lot of information into the phone lying next to you. The sound card itself is usually not cut out, only sometimes it is disabled in the BIOS, but the speakers can usually be either pulled out or cut.

These removed pairs of wires will save your life. Ideally, pull out Wi-Fi and leave only LAN. Google has long abandoned Google cars for collecting Wi-Fi and uses your phones for this. When working, take your phones to another room. If you get a call, turn up the volume so as not to miss it, do not put them next to each other. The phone collects all the spots nearby.

Potentially, your client Mac is associated with the neighbor's point. Smarts are a great evil, avoid them. Even if you do not have anything like a smart, then you are not a tanker, your neighbor across the street has one, or even through the wall. You will be rooted and in the VLAN 0 scan list and that's it. 100% you will be identified with an accuracy of up to a centimeter. Thanks to the neighbors' phones, politely sending the same result from themselves to Google and Apple. That's pretty much it with the hardware.

Access to the network. Access to the network must be done from someone else's network. There are several options:
1. Hacking your neighbors' Wi-Fi.
2. Hacking a corporate network, that is, some company's Wi-Fi.
3. Connecting to the Starlink satellite. Elon Musk, hello! Not for everyone. The most suitable option is hacking your neighbors' Wi-Fi.

Why neighbors and not corporate points? The less traffic, the more accurate the analysis, and someone will say that office points or organizations will be a priority, because it is difficult to find what you need in the trash, unless, of course, it is a specialized office with equipment. But there is one "but" - in organizations, if the speed of an accountant, director, etc. drops, the provider's employees or a full-time visiting SIS admin will identify the cause and, in the best case, this will end with you changing your password. Therefore, we hack your neighbors' Wi-Fi.

Wi-Fi hacking kit:
1. Buy a Wi-Fi adapter. I recommend buying Alpha.
This adapter works well out of the Linux box, from where you will have to use programs to hack Wi-Fi. Among this brand there are a lot of fakes, be sure to buy the original, there will be problems with the fake and the indicators are much worse.
2. In addition to the adapter, we buy an antenna. Wi-Fi gun. Study in detail what kind of Wi-Fi gun you need to buy, all the info is on YouTube. With it, you can receive and transmit a Wi-Fi signal not just for hundreds of meters, but for several kilometers.

We break Wi-Fi. In short:
1. Go to Linux, download the AirGedon program.
2. Scan nearby Wi-Fi networks and select an attack target. There are many different attack options, I will tell you about one common one.
3. Capture a handshake, a handshake with someone else's Wi-Fi. After capturing a handshake, the program will download a file with this handshake to you, which you will need to decrypt. It may sound scary at first glance, but capturing a handshake with another router is done in less than a minute with one button, the program does everything for you.
4. Decrypt the handshake and get the password in plain text. Help program hashcode, for fast decryption of hashes you need a good video card and dictionaries. If you do not have a good video card or are too lazy to decrypt hashes yourself, give it to other people as a freelancer, within fifty minutes for a couple of hundred rubles they will give you a ready-made pass from a neighbor's Wi-Fi. We figured out the Internet access, let's move on.

Setting up the chain:
1. On the main machine, we install DNS crypt, encrypt our DNS from the provider. And yes, no DNS on your computer in Resolve. Conf, you do not need them. Use your roots and VPS for all resolves, as well as Tor itself, in the form of socks5 via socks4a. Make sure that your own computer knows nothing about what and who surrounds it.
2. Rent a VPS server for Monero and deploy OpenVPN in it. This is your pure VPN, you don’t do anything weird with it. It turns out to be a chain, someone else’s Wi-Fi, plus DNS crypt, plus AVPN. And now we are encrypted from the provider.
3. Create two virtual machines. Install Vonix OS on one virtual machine. Its essence is that it consists of two operating systems. One of them is a gateway.
Its function is to route traffic through the Tor network. And the second is a workstation, you can install any OS, but of course we will roll out Linux. The second station is completely isolated and can access the network only through the gateway. The advantage of this combination is that no matter what you do on the second station, no matter what utilities you run, including malicious ones, you will not be able to expose your real IP, simply because the second station, Linux does not know it.
Another useful feature is that for each running application in Honex, a separate chain of Tor network nodes is created. In Honex Gateway, you don't necessarily have to run it with a graphical interface, which will just eat up RAM. So you have two stations, the network goes through one virtual machine, and you work through the second virtual machine. I'll record a practical video on Fhonix later. So, here's the chain: Someone else's Wi-Fi, plus DNS crypt, plus VPN, plus Honex Tor.
4. Rent another server for Monero. Wrap Linux in OpenVPN.
5. Rent a dedicated server with full-disk encryption, ideally with TRM and a configured Tor domain. So that you can only connect to it through a Tor domain, so that the dedicated server will never know from which address you connected to it. Test, if the speed is cut off significantly, you can rent two dedicated servers, use one dedicated server as a spacer for connecting via a Tor domain to the second dedicated server, from which all the main activities will be conducted.

As a result, we get the following chain: someone else's Wi-Fi + DNS crypt + oVPN + Honiks Tor + oVPN Linux + Tor domain + dedicated server. Recommendations. VPN servers should be in different countries from each other. Test, if the speed is cut off significantly, you can rent two dedicated servers, use one dedicated server as a spacer for connecting via a Tor domain to the second dedicated server, from which all the main activities will be conducted.

As a result, we get the following chain: someone else's Wi-Fi + DNS script + oVPN + Phonic Store + oVPN Linux + Tor domain + Dedicated Server (RDP). Recommendations. VPN servers should be in different countries from each other. Disable logs on your main machines. You will have to test different countries for a comfortable speed, different VPN countries and also different countries in Tor.

Over time, you will set up your chain for convenient work. Here you can choose either comfort with high-speed Internet or security with reduced speed. It all depends on what you do, how much you will be needed. To find you, you need to pay. The more serious you are, the higher the price for your search will be. And the more seriously you approach your security, the harder it will be to find you. Do not be lazy to work for anonymity and do not spare money for this.

When they take you by the ass, it will be too late to regret your pettiness and inaction in the past. Remember that logs will always be found, if there is suspicion. No one will just rummage through you, and many countries do not have complete logs. Working from home is a bad idea, sooner or later it can lead to sad consequences. If you have a good income, rent a separate workplace for yourself. It is better not to take a mobile there and change the access to the network at different hours.

Keep all finances in a separate LifeSide. Withdraw only as much as you need to live, many people get caught withdrawing cash in expensive purchases. It's one thing to steal, another thing to spend it wisely, which most people have problems with. This is a separate topic for discussion. Perform hygiene more often, change servers, change hardware, because various IDs and serial numbers remain, if you were rooted, then they are there and there is no way to unscrew them.

Do not connect devices to your work laptop that you then connect to machines with personal information. Each device has its own unique ID, by which you can be diagnosed. Improving the system. If you want to improve the system, then your network connection should be located on a separate device that you cannot access from your work computer. I recommend removing Wi-Fi on your work machine and leaving only LAN. There should be no Wi-Fi connection on your work machine. Buy a Raspberry Pi, stick 3-4 Gmodems into it, break Wi-Fi from it, you can also throw VPN + Tor on top, then connect it to the laptop with a LAN cable, create a bridge in the virtual machine and get Internet in the virtual machine via LAN.

It turns out that encrypted Internet comes to your laptop through the Raspberry Pi. Remove ssh in it and check that no port except for the forwarded socks from VPN or Tor to VPN is listened to. Access to the Raspberry Pi itself is possible only from the keyboard via USB and the monitor, you need to log in from there.

Make it so that the restart is possible either by simply re-poking, or something simple homemade, for example, nc listens to the port, as soon as it connects to it, it does the restart procedure for your IP. No one will forgive you for your mistakes. That's all, all the best.
 
Top