Father
Professional
- Messages
- 2,602
- Reaction score
- 760
- Points
- 113
Good day, my dear future carders 
It's already starting to get into the habit of telling you not only about shady professions, but also about how you can cut down "easy money" on the web.
And I will not publish methods, a la "Investing 1 ruble - you can raise a billion and build yourself a castle in Gelendzhik"
But today I want to tell you about one life lottery, which still gives good chances to raise money by spending a penny.
Smacks of infocyganism? I
'm rummaging around, little brother, but I'm not joking and I want to tell you about such a phenomenon as "Logs" and touch on their processing a little
So get some popcorn ready as we head out to explore other people's PCs and play.
Have you ever wondered what it is and why it is necessary?
So, "Logs" are stolen data from the PC of people who downloaded an infected file to their computer.
A person could download such a file anywhere - in social networks.social networks, on a video hosting service by clicking the link under the video, or on a site for downloading software. Wherever he downloaded it, the result is one-his data is stolen by an attacker.
A question appears:
What can an infected program spizdit?
The answer is simple: Everything. Every last file in the system and account.
Let's just look at one log obtained using the RedLine stiller and you will understand everything for yourself.
And so, my dear future criminal, let's start in order.
For example, you like to get on pornhub and jerk off on Lolly_Lips and often enter her nickname in the search form-it will be in this folder
Do you know what you're at risk of getting infected with?
Well, in the case of this file perfectly helps out when there is no necessary password in Passwords.txt - it is based on this file that you can try to find the right password.
Well, as a bonus, you can sometimes get 12 secret words from a crypto wallet
Cookies are designed to simplify people's lives so that people don't have to type passwords every time they log in to a particular service.
But in the event of infection and their abduction, they play the most key role in gaining access to accounts in all your used services (yes, and in pornhub too
).
This miracle looks like this:
In order not to burden you with unnecessary information, let me explain with a simple example:
We need to log in to Gmail mammoth mail.
To do this, we upload the Google_[Chrome]_Defaut cookie to the browser. Uploaded it.
After that, go to the browser, type "Gmail"in the search and go to the service using the link from the search engine.
If the cookies are not killed and workable , you can easily log in to mammoth mail without even entering your username and Password.
I agree, because this is already a 90% chance of successful work with the log.
Are you already looking forward to exploring the mammoth lairs?
Another extremely nishtyakov folder containing data on cold wallets mammoth.
Intrigued?)
Yes, my dear future criminal, these are the very "easy money" in its purest form.
Of course, there is not always something on such wallets, but everyone has the opportunity to hit the jackpot
Because then I'll tell you how to handle cold wallets and withdraw babosik from them at the click of your fingers.
Well, everything is clear with this file - it stores all usernames and passwords from the services that our mammoth visited. I don't think you need to explain what, where, or how
This file contains all information about the mammoth system.
This information is useful for creating a similar system to bypass some anti-fraud systems.
For example, to prevent Gmail from noticing that we (from Russia) are logging in to the mammoth account (from the USA) and blocking our login attempt as suspicious.
Well, we have analyzed many of the utilities that are hidden in the log-in detail. Now I want you to close your eyes and imagine:
What can an attacker who has infected your PC with such malavariya steal from you?
That's right, everything.
So we come to the next part of the article. Namely, the extraction of logs.
As you already understood from the first part - we need the mammoth to open our infected file in its system.
But where can I get this file? What should I do with it? Where to find a mammoth?
First we need to buy a Stiller. I do not advise you to work with crack versions (free) because they do not shine with stability, and in this case no one guarantees that your logs will fall into other hands.
A permanent license will cost $ 500.
After buying a straler, we will need to create a build (virus) smearing the necessary data there.
The cost of cryptocurrencies varies and ranges from $ 10 to $ 50. But be prepared for the fact that cryptography is not eternal and sooner or later you will have to re-crypt your build because Antivirus programs constantly find and update their databases.
So your mammoth downloading photoshop from your link will launch your malavar (build) along with it.
The cost of gluing files together is somewhere in the region of $20-40
To do this, we will need 2-3 working channels (the more-the better. There is a lot of competition) with more than 300 subscribers.
Plus, we need a good service for getting more views, likes, and comments. I won't write the price, because It depends on the services.
And 2-3 hours for processing and uploading videos, under which we will place links to download our malavari.
You don't learn that in school, do you?
VPN
Firefox Browser
Firefox Browser Add-ons:
CQ Manager is required for uploading cookies to the browser.
Cookie Cleaner-required to clear cookies in the browser. Usually used after the log is completed.
Well, we installed all of the above. Time to get started? It's time!
We are looking at the service that you need and that is available there.
οΈ For example, take https://accounts.google.com/ - this is our goal.
Determined and pinned.
Take our log and go to UserInformation.txt
Copy the IP address.
Go to the site https://whoer.net/ And insert the address in the line, look at the country:
Next, we launch our VPN
Then go to the site https://whoer.net/ru
And we check your IP for "pale yellow".
If a red light shows up we look for another connection for example:
The service recognized the anonymizer - the IP address is not suitable for us.
The service showed all "green" - this is our choice
Start uploading cookies to the browser.
Open Firefox, open our Cookie Quick Manager extension
Importing cookies
Great we imported cookies.
Next, go to Google Mail to see if it is valid.
If you see this image, it means that the cookie is no longer valid.
, But you can choose a password from password.txt
P.S. With good cookies, you will be logged in to your email address without entering your username and password.
If you couldn't log in to Yandex.Mail, I advise you to immediately go for another log.
Don't forget to clear cookies using the add-on. Cookie Cleaner.
Click this button a couple of times.
Well, we cleared the cookies. Now you can search for a log with valid cookies and try to respond to your requests.
Personally, I give my logs for processing to various verified people.
Some of them process game requests, while others process social networks, cryptocurrencies, and bank accounts.

What's in the logs of easy money? That's right, cold wallets. This, my dear future criminal, is the loot lying on the shelf - reach out and take it.
So now I'm going to teach you how to handle cold wallets to make you a little richer.
Processing cold wallets or easy money for a bandit
There are many cold wallets for storing different currencies.
We will analyze only a few of them, but with this knowledge, you can not raise your head too much.
Download and install the app on the site:
by clicking the Download button.
Open our log and go to the folder Wallet-Exodus - exodus. wallet
If you don't have the passphrase file.json when logging in to Exodus, you will need to select a password with password.txt
Then press WIN+R and enter %APPDATA% as shown in the screenshot.
Uploading files from the log to the exodus.wallet folder
And launch Exodus.
Great we went to Exodus mammoth congratulations!
You see the balance by zeros and go further in the search for loot. If the balance drops out, just click the Send button and there, as usual, there is no 2fa there.
Download and install: https://electrum.org/#home
Open Wallet - Electrum - default_wallet. dat/wallet. dat/the name may be different.
Launch our Electrum service.
Choose our default_wallet file
Also choose a password in password.txt
Click Next.
We see the balance and merge it.
Empty - go ahead.
Easy? Very much so, my dear future criminal.
Does this require a lot of intelligence? No. But this is not a job without attachments.
And while every "super-mind" is chasing a drop on banks or MFC, catching up with problems with each exit from the house - you can make money without leaving it and without substituting your precious under the neck of the bottle of yourdolbaeba precinct officer.
The choice is yours, my dear friend.
main thing is not to fuck up the money, think before you buy, do you need it or need it? If necessary, then buy it.
Don't fuck up the money in the wrong direction, work with proven ones. Yes, the earnings are not constant. Yes, you will often give up, but do not give up - if you have the desire, you will also succeed.
And don't buy clouds on Lifetime you don't need it, they are now being drained almost every day for free.
Well, now it's time to say goodbye
I hope it was interesting.
Peace

It's already starting to get into the habit of telling you not only about shady professions, but also about how you can cut down "easy money" on the web.
And I will not publish methods, a la "Investing 1 ruble - you can raise a billion and build yourself a castle in Gelendzhik"

But today I want to tell you about one life lottery, which still gives good chances to raise money by spending a penny.
Smacks of infocyganism? I
'm rummaging around, little brother, but I'm not joking and I want to tell you about such a phenomenon as "Logs" and touch on their processing a little

So get some popcorn ready as we head out to explore other people's PCs and play.
What are "Logs"?
If you've ever visited Shadow Trading Chats , you've never encountered or noticed ads like:"I will sell the latest logs. Uncut ones. In one hand. Link @username
Have you ever wondered what it is and why it is necessary?
So, "Logs" are stolen data from the PC of people who downloaded an infected file to their computer.
A person could download such a file anywhere - in social networks.social networks, on a video hosting service by clicking the link under the video, or on a site for downloading software. Wherever he downloaded it, the result is one-his data is stolen by an attacker.
A question appears:
What can an infected program spizdit?
The answer is simple: Everything. Every last file in the system and account.
Let's just look at one log obtained using the RedLine stiller and you will understand everything for yourself.

And so, my dear future criminal, let's start in order.
Autofills/ImportantAutofills.txt
This folder contains autofill forms. It includes everything that your PC remembers to help you fill out some forms.For example, you like to get on pornhub and jerk off on Lolly_Lips and often enter her nickname in the search form-it will be in this folder

Do you know what you're at risk of getting infected with?
Well, in the case of this file perfectly helps out when there is no necessary password in Passwords.txt - it is based on this file that you can try to find the right password.
Well, as a bonus, you can sometimes get 12 secret words from a crypto wallet

Cookies
All usernames/passwords stored in the browser for various services are stored in this folder.Cookies are designed to simplify people's lives so that people don't have to type passwords every time they log in to a particular service.
But in the event of infection and their abduction, they play the most key role in gaining access to accounts in all your used services (yes, and in pornhub too

This miracle looks like this:

In order not to burden you with unnecessary information, let me explain with a simple example:
We need to log in to Gmail mammoth mail.
To do this, we upload the Google_[Chrome]_Defaut cookie to the browser. Uploaded it.
After that, go to the browser, type "Gmail"in the search and go to the service using the link from the search engine.
If the cookies are not killed and workable , you can easily log in to mammoth mail without even entering your username and Password.
I agree, because this is already a 90% chance of successful work with the log.
FileGrabber
This folder will contain files from the mammoth desktop. Extremely useful feature, I won't explain why. After all, the answer lies on the surface.I strongly recommend against opening files .but we don't know what our mammoth was pumping before it came to us![]()
Wallets

Are you already looking forward to exploring the mammoth lairs?
Another extremely nishtyakov folder containing data on cold wallets mammoth.
Intrigued?)
Yes, my dear future criminal, these are the very "easy money" in its purest form.
Of course, there is not always something on such wallets, but everyone has the opportunity to hit the jackpot

Because then I'll tell you how to handle cold wallets and withdraw babosik from them at the click of your fingers.
Passwords.txt

Well, everything is clear with this file - it stores all usernames and passwords from the services that our mammoth visited. I don't think you need to explain what, where, or how

User Information.txt

This file contains all information about the mammoth system.
This information is useful for creating a similar system to bypass some anti-fraud systems.
For example, to prevent Gmail from noticing that we (from Russia) are logging in to the mammoth account (from the USA) and blocking our login attempt as suspicious.
ScreenShot
When you open our virus on a mammoth PC, an automatic screenshot is taken. Sometimes it is useful to see what games or services mammoth uses.Well, we have analyzed many of the utilities that are hidden in the log-in detail. Now I want you to close your eyes and imagine:
What can an attacker who has infected your PC with such malavariya steal from you?
That's right, everything.
Log mining or mammoth hunting.

So we come to the next part of the article. Namely, the extraction of logs.
As you already understood from the first part - we need the mammoth to open our infected file in its system.
But where can I get this file? What should I do with it? Where to find a mammoth?
First we need to buy a Stiller. I do not advise you to work with crack versions (free) because they do not shine with stability, and in this case no one guarantees that your logs will fall into other hands.
Redline Stealer Price
The RedLine stealer costs $ 200 per month.A permanent license will cost $ 500.
After buying a straler, we will need to create a build (virus) smearing the necessary data there.
Crypt of the virus file (build)
The created build (virus) will be noticed and removed by many antivirus systems. We don't need that. Therefore, there is such a service as cryptovka - which allows you to encrypt your virus so that it will not be seen by antivirus software, which increases the confidence of the mammoth and the chances of breaking the jackpot unnoticed.The cost of cryptocurrencies varies and ranges from $ 10 to $ 50. But be prepared for the fact that cryptography is not eternal and sooner or later you will have to re-crypt your build because Antivirus programs constantly find and update their databases.
Gluing together
To finally increase the mammoth's level of trust in the virus, you can glue it together with working software. For example, Adobe Photoshop.So your mammoth downloading photoshop from your link will launch your malavar (build) along with it.
The cost of gluing files together is somewhere in the region of $20-40
Where can I find a mammoth?
The most accessible platform for finding mammoths is YouTube.To do this, we will need 2-3 working channels (the more-the better. There is a lot of competition) with more than 300 subscribers.
Plus, we need a good service for getting more views, likes, and comments. I won't write the price, because It depends on the services.
And 2-3 hours for processing and uploading videos, under which we will place links to download our malavari.
Working with logs. Training.
Well, you need to work with them immediately after buying the logs - and I'm ready to teach you this, my dear future criminal.You don't learn that in school, do you?

To work, we will need:




CQ Manager is required for uploading cookies to the browser.

Cookie Cleaner-required to clear cookies in the browser. Usually used after the log is completed.
Well, we installed all of the above. Time to get started? It's time!
Getting started:
Select the appropriate log and go to password.txt

Determined and pinned.


Go to the site https://whoer.net/ And insert the address in the line, look at the country:


Connecting to the desired country.Personally, I use ProtonVPN for me is quite enough. If you have LinkSphere and proxy 911, then you are generally a loaded bandit ready to tear and throw-respect.
Then go to the site https://whoer.net/ru
And we check your IP for "pale yellow".
If a red light shows up we look for another connection for example:

The service recognized the anonymizer - the IP address is not suitable for us.

The service showed all "green" - this is our choice


Open Firefox, open our Cookie Quick Manager extension



Great we imported cookies.
Next, go to Google Mail to see if it is valid.

If you see this image, it means that the cookie is no longer valid.
, But you can choose a password from password.txt

If you couldn't log in to Yandex.Mail, I advise you to immediately go for another log.
Don't forget to clear cookies using the add-on. Cookie Cleaner.
Click this button a couple of times.

Well, we cleared the cookies. Now you can search for a log with valid cookies and try to respond to your requests.
Personally, I give my logs for processing to various verified people.
Some of them process game requests, while others process social networks, cryptocurrencies, and bank accounts.
Result.
Now you know how to work with logs and can already start collecting cream from momoths around the world, because they are known to never die out
But we all came here for easy money, didn't we?

What's in the logs of easy money? That's right, cold wallets. This, my dear future criminal, is the loot lying on the shelf - reach out and take it.
So now I'm going to teach you how to handle cold wallets to make you a little richer.
Processing cold wallets or easy money for a bandit
There are many cold wallets for storing different currencies.We will analyze only a few of them, but with this knowledge, you can not raise your head too much.
Wallet: Exodus.
VPN Connectto any country, if you just review your wallets.Download and install the app on the site:
by clicking the Download button.


If you don't have the passphrase file.json when logging in to Exodus, you will need to select a password with password.txt





Great we went to Exodus mammoth congratulations!
You see the balance by zeros and go further in the search for loot. If the balance drops out, just click the Send button and there, as usual, there is no 2fa there.
But our training does not stop at this wallet and I am ready to share with you the method of processing another cold wallet:In the Atomic wallet, the algorithms are the same-just more files.
Wallet: Electrum
VPN VPN Connectto any country.Download and install: https://electrum.org/#home
Open Wallet - Electrum - default_wallet. dat/wallet. dat/the name may be different.

Launch our Electrum service.



Click Next.

We see the balance and merge it.
Empty - go ahead.
Easy? Very much so, my dear future criminal.
Does this require a lot of intelligence? No. But this is not a job without attachments.
And while every "super-mind" is chasing a drop on banks or MFC, catching up with problems with each exit from the house - you can make money without leaving it and without substituting your precious under the neck of the bottle of your
The choice is yours, my dear friend.
How much can I lift?
Many times and many more times, you can completely change your life. The main desire and experience, constant developments, and of course a fancy log.main thing is not to fuck up the money, think before you buy, do you need it or need it? If necessary, then buy it.
Don't fuck up the money in the wrong direction, work with proven ones. Yes, the earnings are not constant. Yes, you will often give up, but do not give up - if you have the desire, you will also succeed.
And don't buy clouds on Lifetime you don't need it, they are now being drained almost every day for free.
Well, now it's time to say goodbye

Peace
