CLONNING GUIDE

Dreadbot

Member
Messages
2
Reaction score
0
Points
1
What’s Needed to Create a Clone Card?
Creating a clone card requires specialized tools and software, many of which are accessible online through platforms like Amazon, AliExpress, or eBay. The key components include:
• Software Suite: Tools like JcopEnglish, ARQC_GEN, BP-Tools Crypto Calculator, and Cardpeek are used to program and analyze cards.
• Magnetic Stripe Reader/Writer (MSR): A device to read and write data onto a card’s magnetic stripe.
• Smart Card Readers (e.g., Omnikey 3021 or 3121): Used to interact with the card’s chip.
• ATR Tool: Initializes the card’s Answer to Reset (ATR), a unique identifier for the card type.
• Blank Java Cards: These programmable cards, costing $5–$20 each, serve as the base for the clone. Software like JCOP Manager verifies their status (fused or unfused).

The Step-by-Step Process of Cloning a Card
The process of creating a clone card involves replicating the data from a legitimate card (often stolen or purchased illegally, known as a “dump”) onto a blank card. Here’s how it works:

1. Erase and Format the Blank Card
Using software like JcopEnglish, the blank card is wiped clean and formatted to prepare it for new data. A success message confirms the card is ready.

2. Set the Card’s Identifier (ATR)
An ATR Tool configures the card’s ATR to match the type of card being cloned (e.g., VISA or Mastercard). This ensures the card appears legitimate to payment systems.

3. Verify the Card’s Identity
Using Cardpeek, the card’s ATR is checked to confirm it matches the intended card type. The card should display bank details, not appear as a blank “Java Card.”

4. Write Magnetic Stripe Data
Track 1 and Track 2 data (containing card number, expiration date, and other details) are written to the card’s magnetic stripe using an MSR device. Online tools like the Omerta Generator may be used to create Track 1 data from Track 2.

5. Configure Chip (EMV) Data
For cards with chips (EMV), software like X2.5 is used to input critical details, including:
• Card number (PAN)
• Application Identifier (AID)
• PIN, currency, country code, and cardholder name
• Discretionary data and application label The card’s preferred name and expiration date are also updated.

6. Generate Authentication Codes (ARQC)
Dynamic codes called ARQCs (Authorization Request Cryptograms) are generated using tools like ARQC_GEN or BP-Tools Crypto Calculator. These codes mimic the security checks performed during transactions, making the card appear legitimate.

7. Load and Finalize Data
The EMV data and ARQC codes are loaded onto the card using an IST file (specific to the card’s type). The data is then “burned” onto the card, making it ready for use at ATMs or point-of-sale (POS) terminals.
Why Clone Cards Fail
Even with the right tools, cloning attempts can fail due to:
• Invalid Data: Using fake, used, or empty “dumps” (stolen card data) leads to non-functional cards.
• Outdated Information: If the original cardholder uses their card after the data is stolen, the dump may become invalid.
• Mismatched Configurations: The ATR and IST file must match the card type exactly, or the clone won’t work.

For further questions and assistance please contact me @deergun on telegram
 
Last edited by a moderator:
Top