NEW CARDING CHAT IN TELEGRAM

PRO Carding - Working with logs

CarderPlanet

Professional
Messages
2,552
Reputation
7
Reaction score
670
Points
83
Today we will talk about the most hype, profitable and interesting topic of 2021, and in fact it has always been relevant. After all, from one log you can recoup installations, a stealer, and even buy a car, or drain everything into installations, not get normal users and go fuck it. Let's start.

Logs from the stealer
Let's go from the very beginning, buying a stealer or logs. Now the AzoRult stealer is very popular on the market, I can say that I used it myself and the quality is good. Cost 100 $ / lifetime. Look for people who make installations and information on how to put the stillack on the host on the forums.

Now about the purchase. I personally cannot advise sellers, in order to avoid conflicts, but many people really often ask for contacts. Therefore, in the new year I will try to create a specialized and convenient market with possible collateral, systematization and transparency - I will notify you. Sellrov is not difficult to find on the forums.

Now to the pricing question. All sellers usually sell logs according to your requests and set a price per log, departing from what service is there. PayPal - $ 10, BA - $ 15. You buy a log, it looks like this:

7acb501bc09dc610f3504.png


There may also be an intriguing "Wallets" folder that you want to go to right away, but more on that later.

You bought a log, but you cannot immediately take and go to the desired site according to user data. For more successful work, you need to load cookies into your browser. Cookies are located in the Browsers -> Cookies folder. In order not to make an article for longreads, I will throw off links to articles and instructions.

How to load cookies into the browser.
Disable internet.

2. Go to "Settings -> General"

3. We are looking for the item "Firefox Update"

4. Select "Never check for updates (not recommended)"

f88a9109c82debc54ad39.png


Turn on the Internet

5. Install the extension https://addons.mozilla.org/ru/firefox/addon/cookies-exportimport/?src=api

6. Press the "Alt" button and the top panel in the browser pops up.

c0dc9f7e88aee1fe32329.png


7. Select "Tools -> Import Cookies"

de092c672c31b52982a3c.png


8. Select the file with cookies and the import is complete.

26c9b357243c1ee0432a1.png


If you already have a browser, then press f10:

7c8f0b844f90310ed1475.png


What are they needed for? - If the cookies are good, then when you go to the mail, you do not even have to enter your password and login and you will be already inside, and the services remember your cookies and trust you more.

You have completed your service, but I would like more money. The most delicious is btc wallets. Now sites will be presented to your eyes that provide us with the opportunity to scam money from the wallets of other owners of bitcoin money:
coinbase.com
blockchain.info
mycelium.com
airbitz.com
exmo.com
localbitcoins.com
xapo.com

Some services may have 2fa on the phone. Now let's move on to the "Wallets" folder. I came across it only once. When opening, we will see one or several files with the .dat extension, most likely there will be money on it, and possibly large, since why download a wallet to your PC if there is nothing there?)) Here you have 2 options.
 

Teacher

Professional
Messages
2,670
Reputation
9
Reaction score
772
Points
113
Let's move on to some interesting tips and life hacks when working with logs.

1. Identify your "attack vector".

Simply put, you need to understand where the holder has money and what payment methods they use most often.

You can view popular payment methods for the holder in Amazon, Paypal, Ebay, etc.)

Once you have determined where the money is , you should try to find out how much money the holder has stored, if possible.

To do this, you need to get into online banking, look at statement, etc.

2. Operator services such as AT&T, Verizon, and others may have the function of blocking the SIM card, losing the phone, and other useful things that can complicate the recovery of access to the holder, or even complete loss.

3. Always add messages from unsolicited services and stores that you might receive messages from to your Yandex.Mail holder's spam filters. Use filters to redirect your messages to your email address.

4. Check all cloud storage (Google drive, icloud, onedrive, dropbox, etc.) There is a high probability of finding Photo ID, Drive License, Credit Cards, Wallet Seed, 2FA and other useful information.

5. Live the life of a holder. After collecting all the information on holder, read his Facebook and other social networks, see where he goes tomorrow, when he is not at home, when he is in the gym, when he eats, who he fucks, this will help to create a psychological portrait for psychological impact, as well as give you the opportunity to choose the best time of attack.

For example, you can immediately call holder to work, send a wreath with threats (Saying that this is from the mafia, the insurance company will return everything, do not rush until we clean you up).

It is important to understand the essence of these thoughts, and the imagination in the use cases of useful information can be unlimited.

6. Keep your own backdoors. Put your secret questions on the mail, tie up your 2FA, phone numbers, backup emails.

Then it is very likely that the holder will not be able to quickly and painlessly return your account, and even if it does, it may not notice your backdoor, which you can use again.

7. Passwords. Many holders use the same passwords, so even if you don't have the right service in the log, you can choose it yourself by searching

through 8. Activity. You can use emails in Yandex. Mail to determine the most popular and most up-to-date services that the holder uses.

Choose the appropriate ones from them - those that you know how to work out. These services will be more loyal to fraud, as the holder often uses them, and, therefore, they have more recent cookies compared to other services.
 
Top