How to make money from logs?

Father

Professional
Messages
2,602
Reaction score
760
Points
113
Good day, my dear future carders 😎
It's already starting to get into the habit of telling you not only about shady professions, but also about how you can cut down "easy money" on the web.

And I will not publish methods, a la "Investing 1 ruble - you can raise a billion and build yourself a castle in Gelendzhik" πŸ˜„

But today I want to tell you about one life lottery, which still gives good chances to raise money by spending a penny.

Smacks of infocyganism? I
'm rummaging around, little brother, but I'm not joking and I want to tell you about such a phenomenon as "Logs" and touch on their processing a little 😎
So get some popcorn ready as we head out to explore other people's PCs and play.

What are "Logs"?​

If you've ever visited Shadow Trading Chats , you've never encountered or noticed ads like:

"I will sell the latest logs. Uncut ones. In one hand. Link @username

Have you ever wondered what it is and why it is necessary?

So, "Logs" are stolen data from the PC of people who downloaded an infected file to their computer.
A person could download such a file anywhere - in social networks.social networks, on a video hosting service by clicking the link under the video, or on a site for downloading software. Wherever he downloaded it, the result is one-his data is stolen by an attacker.

A question appears:
What can an infected program spizdit?

The answer is simple: Everything. Every last file in the system and account.

Let's just look at one log obtained using the RedLine stiller and you will understand everything for yourself.

f0e5a24b069280ea75945.jpg


And so, my dear future criminal, let's start in order.

Autofills/ImportantAutofills.txt​

This folder contains autofill forms. It includes everything that your PC remembers to help you fill out some forms.
For example, you like to get on pornhub and jerk off on Lolly_Lips and often enter her nickname in the search form-it will be in this folder 😏
Do you know what you're at risk of getting infected with?

Well, in the case of this file perfectly helps out when there is no necessary password in Passwords.txt - it is based on this file that you can try to find the right password.
Well, as a bonus, you can sometimes get 12 secret words from a crypto wallet 😎

Cookies​

All usernames/passwords stored in the browser for various services are stored in this folder.
Cookies are designed to simplify people's lives so that people don't have to type passwords every time they log in to a particular service.
But in the event of infection and their abduction, they play the most key role in gaining access to accounts in all your used services (yes, and in pornhub too 😏).
This miracle looks like this:

32983be74957bc4141904.jpg


In order not to burden you with unnecessary information, let me explain with a simple example:

We need to log in to Gmail mammoth mail.
To do this, we upload the Google_[Chrome]_Defaut cookie to the browser. Uploaded it.
After that, go to the browser, type "Gmail"in the search and go to the service using the link from the search engine.
If the cookies are not killed and workable , you can easily log in to mammoth mail without even entering your username and Password.
I agree, because this is already a 90% chance of successful work with the log.

FileGrabber​

This folder will contain files from the mammoth desktop. Extremely useful feature, I won't explain why. After all, the answer lies on the surface.

I strongly recommend against opening files .but we don't know what our mammoth was pumping before it came to us πŸ€”

Wallets​


f2e38708c16ac0e966fe5.jpg


Are you already looking forward to exploring the mammoth lairs?
Another extremely nishtyakov folder containing data on cold wallets mammoth.
Intrigued?)
Yes, my dear future criminal, these are the very "easy money" in its purest form.
Of course, there is not always something on such wallets, but everyone has the opportunity to hit the jackpot 😎
Because then I'll tell you how to handle cold wallets and withdraw babosik from them at the click of your fingers.

Passwords.txt​


7f30b3300a4b96a68758c.jpg


Well, everything is clear with this file - it stores all usernames and passwords from the services that our mammoth visited. I don't think you need to explain what, where, or how 😎

User Information.txt​


a1fda7244c3c3a69802ba.jpg


This file contains all information about the mammoth system.
This information is useful for creating a similar system to bypass some anti-fraud systems.
For example, to prevent Gmail from noticing that we (from Russia) are logging in to the mammoth account (from the USA) and blocking our login attempt as suspicious.

ScreenShot​

When you open our virus on a mammoth PC, an automatic screenshot is taken. Sometimes it is useful to see what games or services mammoth uses.

Well, we have analyzed many of the utilities that are hidden in the log-in detail. Now I want you to close your eyes and imagine:
What can an attacker who has infected your PC with such malavariya steal from you?
That's right, everything.

Log mining or mammoth hunting.​


43e70f42dc49df37aceb3.jpg


So we come to the next part of the article. Namely, the extraction of logs.
As you already understood from the first part - we need the mammoth to open our infected file in its system.
But where can I get this file? What should I do with it? Where to find a mammoth?

First we need to buy a Stiller. I do not advise you to work with crack versions (free) because they do not shine with stability, and in this case no one guarantees that your logs will fall into other hands.

Redline Stealer Price​

The RedLine stealer costs $ 200 per month.
A permanent license will cost $ 500.

After buying a straler, we will need to create a build (virus) smearing the necessary data there.

Crypt of the virus file (build)​

The created build (virus) will be noticed and removed by many antivirus systems. We don't need that. Therefore, there is such a service as cryptovka - which allows you to encrypt your virus so that it will not be seen by antivirus software, which increases the confidence of the mammoth and the chances of breaking the jackpot unnoticed.

The cost of cryptocurrencies varies and ranges from $ 10 to $ 50. But be prepared for the fact that cryptography is not eternal and sooner or later you will have to re-crypt your build because Antivirus programs constantly find and update their databases.

Gluing together​

To finally increase the mammoth's level of trust in the virus, you can glue it together with working software. For example, Adobe Photoshop.
So your mammoth downloading photoshop from your link will launch your malavar (build) along with it.

The cost of gluing files together is somewhere in the region of $20-40

Where can I find a mammoth?​

The most accessible platform for finding mammoths is YouTube.

To do this, we will need 2-3 working channels (the more-the better. There is a lot of competition) with more than 300 subscribers.

Plus, we need a good service for getting more views, likes, and comments. I won't write the price, because It depends on the services.

And 2-3 hours for processing and uploading videos, under which we will place links to download our malavari.

😎


Working with logs. Training.​

Well, you need to work with them immediately after buying the logs - and I'm ready to teach you this, my dear future criminal.
You don't learn that in school, do you? 😎

To work, we will need:​

πŸ‘‰ VPN
πŸ‘‰ Firefox Browser
πŸ‘‰ Firefox Browser Add-ons:

c8fd11788ea7e0e2e06ba.jpg


CQ Manager is required for uploading cookies to the browser.

a9ece32995fc9f606f830.jpg


Cookie Cleaner-required to clear cookies in the browser. Usually used after the log is completed.
Well, we installed all of the above. Time to get started? It's time!

Getting started:​

Select the appropriate log and go to password.txt

πŸ‘‰ We are looking at the service that you need and that is available there.
β—Ύ ️ For example, take
https://accounts.google.com/ - this is our goal.
Determined
and pinned.

πŸ‘‰ Take our log and go to UserInformation.txt

πŸ‘‰ Copy the IP address.

Go to the site https://whoer.net/ And insert the address in the line, look at the country:

a5e2633a8d781dd42dfab.jpg


πŸ‘‰ Next, we launch our VPN

Personally, I use ProtonVPN for me is quite enough. If you have LinkSphere and proxy 911, then you are generally a loaded bandit ready to tear and throw-respect.
Connecting to the desired country.

Then go to the site https://whoer.net/ru
And we check your IP for "pale yellow".
If a red light shows up we look for another connection for example:

0064016ba0077e8929f19.jpg


The service recognized the anonymizer - the IP address is not suitable for us.

25ae33b9e40702d7c9124.jpg


The service showed all "green" - this is our choice πŸ‘
πŸ‘‰ Start uploading cookies to the browser.
Open Firefox, open our Cookie Quick Manager extension

c54e777969699a2d4b4f7.jpg


πŸ‘‰ Importing cookies

51b4a2dd559eb3f3c123f.jpg


Great we imported cookies.

Next, go to Google Mail to see if it is valid.

074b07a40a82188882fbb.jpg


If you see this image, it means that the cookie is no longer valid.
, But you can choose a password from password.txt

πŸ€™P.S. With good cookies, you will be logged in to your email address without entering your username and password.

If you couldn't log in to Yandex.Mail, I advise you to immediately go for another log.
Don't forget to clear cookies using the add-on. Cookie Cleaner.
Click this button a couple of times.

ffd7fd72bfe9c60f38d42.jpg


Well, we cleared the cookies. Now you can search for a log with valid cookies and try to respond to your requests.

Personally, I give my logs for processing to various verified people.
Some of them process game requests, while others process social networks, cryptocurrencies, and bank accounts.

Result.​

Now you know how to work with logs and can already start collecting cream from momoths around the world, because they are known to never die out 😎

But we all came here for easy money, didn't we?​


9388fb3524f7c779a2777.jpg


What's in the logs of easy money? That's right, cold wallets. This, my dear future criminal, is the loot lying on the shelf - reach out and take it.

So now I'm going to teach you how to handle cold wallets to make you a little richer.

Processing cold wallets or easy money for a bandit 😎

There are many cold wallets for storing different currencies.
We will analyze only a few of them, but with this knowledge, you can not raise your head too much.

Wallet: Exodus.​

VPN Connectto any country, if you just review your wallets.

Download and install the app on the site:
by clicking the Download button.

πŸ‘‰ Open our log and go to the folder Wallet-Exodus - exodus. wallet

9a7772ac2c460aea1ea1e.jpg


If you don't have the passphrase file.json when logging in to Exodus, you will need to select a password with password.txt

πŸ‘‰Then press WIN+R and enter %APPDATA% as shown in the screenshot.

πŸ‘‰Uploading files from the log to the exodus.wallet folder

35a5d2c14ec118c898cb5.jpg


πŸ‘‰ And launch Exodus.

0005bc9ec4298083807cb.jpg


Great we went to Exodus mammoth congratulations!

You see the balance by zeros and go further in the search for loot. If the balance drops out, just click the Send button and there, as usual, there is no 2fa there.

In the Atomic wallet, the algorithms are the same-just more files.
But our training does not stop at this wallet and I am ready to share with you the method of processing another cold wallet:

Wallet: Electrum​

VPN VPN Connectto any country.

Download and install: https://electrum.org/#home

Open Wallet - Electrum - default_wallet. dat/wallet. dat/the name may be different.

8b3daef3a8d55ebd839ee.jpg


Launch our Electrum service.

3d6cd173586e7487b34f3.jpg


πŸ‘‰ Choose our default_wallet file πŸ‘‰ Also choose a password in password.txt
Click Next.

6466192be4c42c88a1026.jpg


We see the balance and merge it.
Empty - go ahead.

Easy? Very much so, my dear future criminal.
Does this require a lot of intelligence? No. But this is not a job without attachments.

And while every "super-mind" is chasing a drop on banks or MFC, catching up with problems with each exit from the house - you can make money without leaving it and without substituting your precious under the neck of the bottle of your dolbaeba precinct officer.

The choice is yours, my dear friend.

How much can I lift?​

Many times and many more times, you can completely change your life. The main desire and experience, constant developments, and of course a fancy log.
main thing is not to fuck up the money, think before you buy, do you need it or need it? If necessary, then buy it.

Don't fuck up the money in the wrong direction, work with proven ones. Yes, the earnings are not constant. Yes, you will often give up, but do not give up - if you have the desire, you will also succeed.

And don't buy clouds on Lifetime you don't need it, they are now being drained almost every day for free.


Well, now it's time to say goodbye 😎 I hope it was interesting.
Peace ✌️
 
Top