Introduction to Brute Force on Private Keeper

Carding Forum

Professional
Messages
2,788
Reaction score
1,221
Points
113
Hello everyone, after a long absence I am returning to work and continuing the New Year's marathon, not even trying to write an article a day. By the way, I do not recommend anyone, and even forbid smoking shikha, the regime is fucked right away :(

So, let's begin: Let's look at an example on a car auction.
First, you need to understand the keeper shell, for this, go to In-Line Studio and click Open editor.

2d9c6442-657a-4536-a143-d59db9d603c7.png


1 - Link where we make a request (POST/GET/OPTIONS...)
2 - Post data, a field in which we will need to transfer our data, email, password, login, etc.
3 - Headers, additional information for the request. They give the server information to understand our request.
4 - Field in which we will parse values for further use in requests or in the log. (Tokens, balances, accounts, etc.)
5 - List of our requests.

Let's move on to practice:
I will use the site https://www.capitalautoauction.com/
as an example . Open Google Chrome and go to the site, then open the developer panel with the F12 button and go to the Network tab.
First, we need to get a Get request, with the developer window open, refresh the page of our site.
Scroll to the very top and find our request

f7fb9ab8-8b46-40f1-b20f-6bf25c31e8a0.png


3a8fcf7c-0c60-499f-a333-5905e3de8e8f.png


1 - Link where we make a request (POST/GET/OPTIONS...)
2 - Headers
We transfer data to the keeper, but not all.

a750970e-d039-417a-960f-3839cfde7531.png


1 - We put Get here because we have a request without sending data
2 - We put any symbol here, it is needed so that we can see the insides of the response to our request, in the future we will need to erase all data from this field.
3 - After everything is done, instead of Authorization we set our name like "Get1" and click this button. After double-clicking we can open the request we need for editing.

2fbac65f-f649-4565-a688-b71857645d68.png


Don't forget to enable redirects

We go to the site and do the same thing, only now with the Log In button

1ff99371-66e5-415e-a431-78eeec895a69.png


We transfer it to the keeper by clicking on the Add request to the list button and you will have another request with the same name

265e4c8e-50fa-4c7d-811e-c4aee7923e43.png


Let's do it, double-click to open our second Get1 and transfer the data to the query using the example of the first Get1

21823393-e4bd-4c10-b3e4-717fa7ac63aa.png


2fbac65f-f649-4565-a688-b71857645d68.png


Don't forget to enable redirects

2fbac65f-f649-4565-a688-b71857645d68.png


1 - Link from the request
2 - Here we also needed the referer header since we were moving from the main page.
3 - Change the name and click Apply

Now you need to remove the request to send email and password data.
First:

077dfe3e-e288-4a91-abe4-bc97c257d44b.png


1 - Click the Clear button
2 - Check the box here so that our request is not lost during the redirect.

Enter random values

01dbb26e-6fac-45fd-b636-255ed5a9587c.png


And we press the Log In button, after which we look in the Network tab and find our request (usually at the very top)

888129ea-33e0-4275-a31f-62c36af6bd88.png


d7ec7cce-329a-4167-8021-ff524c1f6ef0.png


1 - Request
2 - Now this is a Post request since we passed some data
3 - Here is the body of our request

We go to Keeper and create another request as we created Get1 before.

7ea2c489-f6bc-42f2-9cef-3dccda3a2038.png


1 - Link from our post request
2 - Post data, to get them go to the Payload tab and click view source

429158a4-a42b-402d-b755-141d9c505e4a.png


copy the whole line

72f50d56-3fa1-43ee-83a9-cacc7b2674ae.png


and transfer it to the keeper in Post data

63682ac5-19d1-4eb8-b123-f596b1bdfbbe.png


3 - Headers, the screenshot doesn't show all the headers, so here they are https://pastebin.com/RinnXR1m

4 - Change the name, move the request to Inactive and Apply the changes.

c73c5c8c-4f1f-4eb0-9ef3-e2fd8c37dd8d.png


In the data post we noticed a value such as _token:

db271982-c903-45df-854a-42e8e7de7b38.png


Now we need to get it, for this

f44a2642-e999-45a6-ba65-c747f0d75d19.png


1 - Click the Check button
2 - Open the Format Log
3 - Click on the result of the last request, in our case it is Get2
4 - Double-click on this field, after which a text file with the server response will open

In the text editor, press Ctrl+F and look for our _token

aedd9ff2-2530-4648-af51-81aef720f28a.png


Copy the values

3a22c1a3-bd00-439b-aa97-db15823f58db.png


Now let's move on to editing the Get2 request.

We insert it

70d493fc-542d-4b28-a81a-c971d97f363e.png


32fed4a7-4829-48c7-9f2a-27de85bad4d7.png


1 - According to the standard, the keeper will automatically pull up the symbol that closes the value, but you need to check

cbe278d1-0b9c-4c7f-b6e8-b0b5b6bda77c.png


2 - Click Add
3 - Apply
Now click Check and see the result

d713154e-6f0b-44a5-9f4b-75bb48d649aa.png


1 - Check
2 - Open the regular log
3 - And we see that our parser successfully received the _token value
Now we need to make a full Post request, go to it by double-clicking

ad8d8f95-8ea6-4891-9a31-94570cf1c571.png


1 - Check
2 - Open the regular log
3 - And we see that our parser successfully received the _token value
Now we need to make a full Post request, go to it by double-clicking

fa27b313-13bf-4392-9ce7-eacd33f60c46.png


Our parser data is stored in the variable |PARS|[1]
Our email data is stored in |LOGIN|, if you need to automatically trim domains, then write |LOGIN|ND|
Password data is stored in |PWD|

9fe15296-5d3d-4cd1-8e9b-2ce1249d122b.png


_token=|PARS|[1]&email=|LOGIN|&password=|PWD|

We transfer from the text editor to our request, replacing the old text with the new one.

eb6443cd-63d3-49e5-8756-133456c46e37.png


1 - Delete the old text and insert the text with our data from the text editor
2 - Set the value to Active
Now let's go back to the site, if we enter the random email and password again, we will see the server's response that the data is incorrect

959e1fa7-2429-42cf-8ced-ecf1264a6153.png


copy this line
Go to the keeper to the Post1 request and paste the copied text into the definition of a bad result and click the Apply button

23481686-033a-458d-80fc-5c728cffa81a.png


After that, click here

0ad96ef7-e6ad-4903-98c5-de5a9787f6a9.png


7b9b97cb-9c0c-4a0d-b118-35c87fd391d2.png


1 - Enter a random email and password via : or ; example tito48ud503@gmail.com:coney1980
:coney1980
2 - Click Check
Look in the Log and see that the bad account detection was successful

8af61c80-f9a6-44c6-a4ba-f5f5157f9678.png


So we are on the right track, to make sure of this we can open the log by double-clicking on it and find our definition of a bad account

d3bcad35-d01c-4464-a534-6d04ded93265.png


It is advisable to have a good account from the service we want to bruteforce in advance, if we don't have one, I'll show you how I do it.
I don't recommend doing this because you can kill the proxy, it's better to already have a good one.

Don't forget to erase 1 from Get1

4a3732fd-3e8c-429f-8ca4-e1701eb57005.png


Hello

df16a1b9-ef46-46f6-a559-4058ba19d373.png


Click yes

19a3ae29-eb98-4db8-881e-f86fb13c5c0d.png


Hello

0812fbdc-0b38-4278-947c-53c9c5001d30.png


We exhibit

358c8f1a-4235-4618-a3f6-9b34ec963693.png


We are closing

Hello

88fb4d49-e820-4bcf-99d4-d900926c991c.png


d8fb3a3f-6a1e-4121-9f1c-61291d92a5f1.png


for convenience, we name our project and set the value to yes, so that we can see the errors of the project

d10cf0fa-8de0-4977-afae-f719c1a31c1b.png


1 - Save
2 - Return to the editor

Hello

9217d5e5-2d9b-427c-9d9b-50d588a7d416.png


71f5609a-d68c-45c7-b2f8-37c37eea818b.png


Load the database, proxy and click Start

After Project Errors Appeared

c43902f3-9a29-41aa-8a37-32f297b3ea37.png


Click here

441f6fd7-722e-4039-82c7-8bceb05ce6c0.png


Further

c5ef0b6f-92c8-48b5-9062-b6d598c111e2.png


We scroll through the text editor and see

1e3be61c-3e40-44af-8852-86a30692b570.png


The site complains that we are fucking it, copying it

c680379a-3d47-4043-afbd-4b13cb6db35c.png


Above we look at which request the error is in

f93a329e-2710-41e8-86b6-d03d4dd1139c.png


Close the project and go to this request.
In our case, this is the Post1 request, open the request, insert it into the captcha/block definition, apply and test again, using the Project Testing button.
After some time, project errors were found.

7672745f-ea36-40a8-a544-7b26790aa6d7.png


let's go see

Request Post1

fd00b175-4d5f-43fc-802c-6af21e552626.png


The data that was used at the time of the error

6118a3bc-d5ae-4a3c-b633-79d79024be2b.png


We take them and go to the site

e4736cb6-3278-4128-bc66-4e423d3d7d85.png


Congratulations

8722c32a-5371-4073-bad3-fbbd8750a4e2.png


we found a good account

Now we will set a definition for a good account, for this we return to the text editor with project errors and look for the text Logout which is on the screenshot

8722c32a-5371-4073-bad3-fbbd8750a4e2.png


Copy this value

afee0d84-af82-4818-a566-57bc9cef2975.png


and go to the project editor, open the Post1 request and paste the copied text into the Definition for a good account

41fee05c-e2fd-440a-a9d2-5b1b5fbebb99.png


click apply

Go here

a72219f4-8a6c-48b9-803e-2a0083956abb.png


be462fd7-1909-4f12-936e-3625f83cef9d.png


1 - Insert data from a good account
2 - Click Check
3 - See PROFITT!!!
Everything was described very briefly and in a compressed format, of course there are many subtleties, but I tried to present the essence in a brief format.

So, we wrote a project for a simple site, but as it turned out, we bruteforce Fullz+dob+dl, which is pretty good)

7418e723-7ab6-4d0a-bc2f-da8736824a23.png


c1f73c81-fc0a-4906-ad08-c094e0955297.png
 
Top