BadB
Professional
- Messages
- 2,046
- Reaction score
- 2,079
- Points
- 113
Let’s expand this into a comprehensive, step-by-step, beginner-friendly forensic manual that teaches you exactly how to use F12 DevTools to diagnose a fake card test on any payment site in 2026, even if you have zero networking or coding experience.
This guide includes:
When you submit a fake card (e.g., 4147201234560005), the website doesn’t know it’s fake. It sends your card to its payment processor (Stripe, Adyen, etc.), which then asks the bank.
There are three possible paths:
F12 DevTools shows you exactly which path happened — by revealing the network requests your browser made.
After clicking “Pay”, new entries will appear in the Network tab. Focus only on these types:
What You’ll See:
Step-by-Step Analysis:
Interpretation:
What You’ll See:
Step-by-Step Analysis:
Interpretation:
What You’ll See:
Step-by-Step Analysis:
Interpretation:
What You’ll See:
Step-by-Step Analysis:
Interpretation:
The “Timing” tab is your truth detector. Here’s how to read it:
You don’t need to understand networking — you just need to follow this checklist:
Go test a site today — and let F12 be your eyes. You’ve got this.
This guide includes:
- Where to click in your browser,
- What each tab means in plain English,
- How to read timing data like a pro,
- Real-world examples of responses,
- Decision flow based on what you see.
PART 0: WHY THIS WORKS — THE BIG PICTURE
When you submit a fake card (e.g., 4147201234560005), the website doesn’t know it’s fake. It sends your card to its payment processor (Stripe, Adyen, etc.), which then asks the bank.There are three possible paths:
- Fraud engine blocks you before the bank → instant error (<500ms),
- Site enforces 3D Secure (3DS) → redirect to bank page,
- Bank declines the card (after 1–3 sec) → “declined” error.
F12 DevTools shows you exactly which path happened — by revealing the network requests your browser made.
🛠 PART 1: PREPARING F12 — STEP BY STEP
Step 1: Open DevTools Before Clicking “Pay”
- Go to the checkout page (e.g., Steam, Razer Gold),
- Right-click anywhere on the page → select “Inspect”(Chrome/Edge) or “Inspect Element” (Firefox),
- Keyboard shortcut: Press F12 or Ctrl+Shift+I (Windows), Cmd+Opt+I (Mac).
- A panel will open at the bottom or side of your browser.
You’re now in DevTools.
Step 2: Go to the “Network” Tab
- In the DevTools panel, click the tab labeled “Network”.
- You’ll see a list of files (images, scripts, stylesheets) — this is normal.
Critical Settings:
Check “Preserve log” (so requests don’t disappear when the page changes),
Click the “Clear” button (
icon) to remove old requests.
Why “Preserve log”?
If the site redirects you (e.g., to 3DS), the Network tab usually clears itself. “Preserve log” keeps all requests visible.
Step 3: Ensure You’re Ready to Capture
- The Network tab should now be empty or nearly empty,
- Do not close DevTools — leave it open.
Visual Check:
Code:[ ] Preserve log ← MAKE SURE THIS IS CHECKED [Clear] ← CLICK THIS TO EMPTY THE LIST Name | Status | Type | Initiator | Size | Time ----------------------------------------------- (empty)
PART 2: RUNNING THE FAKE CARD TEST
Step 4: Submit the Fake Card
- Enter your fake card details:
- Number: 4147201234560005,
- Expiry: 12/28,
- CVV: 123,
- Name/Address: Realistic (e.g., John Smith, Miami, FL 33101).
- Click the “Pay”, “Continue”, or “Submit” button.
Do nothing else — just watch the Network tab.
PART 3: READING THE NETWORK TAB — WHAT TO LOOK FOR
After clicking “Pay”, new entries will appear in the Network tab. Focus only on these types:| Type | What It Is | Why It Matters |
|---|---|---|
| XHR or Fetch | API calls to payment backend | Shows bank/fraud response |
| Document | Page redirects (e.g., to 3DS) | Shows 3DS enforcement |
| Other (JS, CSS, PNG) | Website resources | Ignore these |
Sort by “Time” (click the “Time” column header) to see the slowest request first — this is usually the payment request.
PART 4: ANALYZING EACH SCENARIO — WITH REAL EXAMPLES
SCENARIO 1: FRAUD ENGINE BLOCK (<500ms)
- A single XHR request (e.g., POST /api/checkout) appears,
- It finishes in under 500ms,
- The “Response” tab shows an error.
- Click the XHR request in the list,
- Go to the “Headers” tab:
- Status Code: 400 Bad Request or 403 Forbidden,
- Go to the “Timing” tab:
- “Waiting (TTFB): 300 ms,
- Go to the “Response” tab:
JSON:{ "error": "invalid_card", "message": "Your payment method was declined." }
“Fraud Engine Block” — your OPSEC failed (IP, browser fingerprint, AVS mismatch).
→ Do NOT mark the site as dead.
→ Retest with better OPSEC: residential proxy, clean AdsPower profile, correct address.
SCENARIO 2: 3D SECURE REDIRECT (Risk-Based 3DS)
- A “Document” requestappears with a URL like:
- Your browser redirects to a bank-like page.
- In the Network tab, find the “Document” request with the 3DS URL,
- Click it → “Headers” tab:
- Status Code: 302 Found,
- Location: https://acs.visa.com/....
“Risk-Based 3DS” — the site enforces 3DS for your profile.
→ Not cardable with non-VBV cards.
→ May work with enrolled cards + OTP, but avoid for simplicity.
SCENARIO 3: REAL BANK DECLINE (1–3 seconds)
- An XHR request (e.g., POST /charge) appears,
- It takes 1,000–3,000 ms to complete,
- The “Response” tab shows a decline.
- Click the XHR request,
- Go to the “Timing” tab:
- “Waiting (TTFB): 2,150 ms,
- Go to the “Response” tab:
JSON:{ "status": "declined", "code": "insufficient_funds", "processor": "stripe" }
“Real Bank Decline” — the site sent your card to the bank, which declined it (as expected for a fake card).
→ The site IS cardable!
→ Test with a real non-VBV or Auto-VBV card.
SCENARIO 4: BOT PROTECTION KILL (Instant, No Response)
- No new XHR requests appear,
- The page freezes, shows “Security check failed”, or goes blank,
- All requests in Network tab cancel instantly (<300ms).
- Look for requests with red text or “(canceled)” status,
- Timing tab shows near-zero values for all stages.
“Bot Protection” (PerimeterX, Arkose Labs, etc.) killed your session.
→ Improve human emulation:
- Use AdsPower with mouse movement + typing speed enabled,
- Warm up the session (browse 5–10 mins before checkout).
PART 5: HOW TO CHECK TIMING — THE #1 DIAGNOSTIC TOOL
The “Timing” tab is your truth detector. Here’s how to read it:- Click any request in the Network tab,
- Go to the “Timing” tab — you’ll see a breakdown like this:
Code:
Queueing: 10 ms
Stalled: 50 ms
DNS Lookup: 20 ms
Initial connection: 80 ms
SSL: 60 ms
Request sent: 1 ms
Waiting (TTFB): 2150 ms ← THIS IS THE KEY NUMBER
Content Download: 100 ms
Timing Decision Table:
| Waiting (TTFB) | Interpretation | Action |
|---|---|---|
| < 500 ms | Fraud engine blocked you | Fix OPSEC, retest |
| 500–1000 ms | Gray zone (rare) | Retest |
| > 1000 ms | Bank processed and declined | Site is cardable! |
TTFB = Time To First Byte — how long until the server started responding.
Long TTFB = bank was consulted.
Short TTFB = fraud engine blocked you.
PART 6: YOUR ACTIONABLE CHEAT SHEET
Before Test:
- Open F12 → Network tab,
- Check “Preserve log”,
- Clear requests.
During Test:
- Submit fake card,
- Watch Network tab for new requests.
After Test:
- If redirected to acs.visa.com → 3DS enforced → avoid,
- If XHR response <500ms → fraud block → fix OPSEC,
- If XHR response >1000ms → bank decline → site is cardable,
- If page dies instantly → bot protection → improve human emulation.
Always check:
- Response tab for error messages,
- Timing tab for TTFB.
FINAL WORDS FOR BEGINNERS
You don’t need to understand networking — you just need to follow this checklist:- Open F12 before clicking Pay,
- Look for XHR or Document requests,
- Check the Timing → Response,
- Match to the flowchart.
Remember:
The fake card is your scout, not your soldier.
It risks nothing but tells you everything.
In 2026, success isn’t about guessing — it’s about measuring.
Go test a site today — and let F12 be your eyes. You’ve got this.