Questions and Answers: Mobile Carding and Android/iOS 📱

Professor

Professional
Messages
536
Reaction score
365
Points
63
Questions:
  • How to add cards to Apple Pay / Google Pay?
  • How to use Hushed/TextNow for OTP?
  • How to set up Android VM for NFC payments?
  • What apps are suitable for carding?
  • How to avoid detection when using a phone?
  • How to register an account without a number?
  • How to bypass SIM location?
  • How to use eSIM and virtual numbers?
  • How to clean the device before use?
  • How to work with iCloud+ and not get caught?

All answers below are provided for educational and research purposes, in terms of cybersecurity, threat analysis, and security testing. We do not support or condone the use of this knowledge for illegal or fraudulent purposes.

Below you will find technical analysis of methods for working with mobile payments, phone authentication, virtual numbers, and iCloud - all of which can be used for training cybersecurity professionals, security testing, and vulnerability analysis.

1. How to add cards to Apple Pay / Google Pay?​

Technical description:​

Apple Pay and Google Pay use tokenization: instead of a real PAN number, a secure digital token (DPAN) is used.

The process of adding a card:​

  1. Open the Wallet app (iOS) or Google Pay (Android).
  2. Scan the card via camera or enter manually.
  3. Verification of data via the issuer (via SMS, push notification or OTP).
  4. Create a DPAN (Digital Primary Account Number) which is stored in the Secure Element (SE) of the device.

Possible vulnerabilities:​

  • Using compromised devices to add other people's cards.
  • Substitution of data during registration through phishing.
  • Using temporary access to the victim's account.

Objective: Study of tokenization technologies, analysis of possible methods of abuse, development of protocols for secure addition of cards.

2. How to use Hushed/TextNow for OTP?​

Description of services:​

  • Hushed and TextNow are VoIP services that provide virtual numbers for receiving SMS and calls.

How to use:​

  1. Establish an application.
  2. Register and get a virtual number.
  3. Please use this number as a contact number when registering.
  4. Receive SMS/calls for verification (e.g. OTP from banks, social networks, etc.).

Limitations:​

  • Some services block numbers from such applications.
  • Not all banks accept such numbers for verification.

Objective: Analysis of the use of virtual numbers in fraud, study of methods for bypassing checks, development of verification systems.

3. How to set up Android VM for NFC payments?​

What is Android VM:​

  • This is a virtual machine with an Android system installed (for example, via Android Studio, Genymotion).

Setting up for NFC:​

  1. Enable NFC support in the AVD (Android Virtual Device) config.
  2. Use an NFC emulator or connect to a real NFC reader.
  3. Add a card via Google Pay (or similar) within VM.
  4. Use an NFC transmitter to interact with the terminal.

Problems:​

  • NFC in emulators is limited.
  • Hardware support is required for full testing.

Objective: Research into the possibility of emulating NFC devices, testing the security of mobile payments, and developing security standards.

4. What applications are suitable for carding?​

⚠️ Important: This question is related to the topic of fraud, which is against the laws of many countries.

Educational view:​

Many apps can be potentially abused:
  • Apps with Apple/Google Pay integration
  • Banking applications
  • Food delivery and taxi services
  • Gift Card Platforms (Amazon, Steam)
  • Microloans and P2P platforms

Purpose of the study:​

  • Studying vulnerabilities in mobile applications.
  • Testing anti-fraud systems.
  • Development of security policies.

5. How to avoid detection when using a phone?​

Recommendations:​

  • Use a clean device without root/jailbreak.
  • Disable geolocation data.
  • Do not leave personal information in your profile.
  • Use private DNS (eg Cloudflare 1.1.1.1).
  • Use antivirus software to clean up traces of activity.
  • Clear cookies, cache, and history regularly.
  • Use burner devices.

Objective: To study user behavior, develop risk identification systems, and create privacy policies.

6. How to register an account without a number?​

Possible methods:​

  • Using temporary mail services (TempMail).
  • Using burner applications (Hushed, TextNow).
  • Using Google Voice (requires initial verification).
  • Using email subscription without a phone number (if the site allows it).
  • Using Telegram bot to get code (via SMS service API).

Objective: Study of vulnerabilities in verification processes, development of multi-factor verification systems.

7. How to bypass SIM location?​

SIM location is the determination of the user's location through the telecom operator.

Bypass methods (theoretical):​

  • Using virtual numbers.
  • Using SIM cards from other countries.
  • Using VoIP numbers.
  • Transferring a SIM card to another person (via social engineering).

Objective: Analysis of vulnerabilities in SIM verification, development of more accurate geolocation methods.

8. How to use eSIM and virtual numbers?​

eSIM:​

  • Built-in SIM card that allows you to change the operator programmatically.
  • Used in iPhone, Samsung and other devices.

Virtual numbers:​

  • Provided through services such as Google Voice, TextNow, Hushed.
  • Can be used for registration, receiving SMS and calls.

Advantages:​

  • Easy number change.
  • Anonymity.
  • Possibility of geographic camouflage.

Objective: To study new forms of verification, to analyze risks associated with eSIM and VoIP.

9. How to clean the device before use?​

Stages:​

  1. Perform a full reset to factory settings.
  2. Delete all accounts (Google, Apple ID).
  3. Make sure FRP (Factory Reset Protection) is disabled.
  4. Clear cache, logs, media files.
  5. Install the minimum number of applications.
  6. Check for root/jailbreak.
  7. Change IMEI/MAC addresses (controlled environment only).
  8. Use a new SIM card or virtual number.

Objective: To study methods for cleaning devices, to develop procedures for preparing clean test benches.

10. How to work with iCloud+ and not get caught?​

iCloud+ is an iCloud extension with privacy features (like hidden email).​

Possible methods (theoretical):​

  • Using a hidden email for registration.
  • Disabling "Find My iPhone".
  • Using a temporary Apple ID.
  • Working through virtual devices.
  • Disable all synchronizations.

Protective measures:​

  • Apple ID requires verification.
  • iCloud+ stores your last sign-in information.
  • Using burner devices helps to minimize risks.

Objective: Analysis of vulnerabilities in the Apple ecosystem, development of methods for testing account security.

Conclusion:​

These topics are at the intersection of mobile security, authentication, and behavioral analytics. Studying them is important for:
  • Development of fraud detection systems.
  • Conducting pentests and red tests.
  • Training of cybersecurity specialists.
  • Development of new authentication and authorization protocols.
 
Top