Lord777
Professional
- Messages
- 2,578
- Reaction score
- 1,532
- Points
- 113
I'll tell you what you should pay attention to and how not to get caught by a shitseller pushing slag and working off.
Log prices vary widely. Some logs can cost from $ 0.1-1, some go up to $ 20 apiece. The price, first of all, is influenced by the type of the stiller used during the filling. Stealers with broad functionality are considered good. They have a keylogger (keyboard capture function), thanks to which you see the key combinations typed by the user, they are able to process the login form of passwords of all major browsers (Chrome, Mazilla, Opera, etc.), include settings for the form grabber for transferring files from the user's PC and utilities for determining the hardware. In the log of such a stealer there will be accounts of shops, wallets, banks, paypal, crypt, cc, etc. In a bad stealer - accordingly, there will be only a primitive set of login password, and the log itself will consist of several accounts for toys, social networks, e-mail, possibly incentives. Well, any slag.
After buying, first of all, we look at the date it was added to the admin panel. Acceptable, it is considered a log no older than 2-3 weeks. Ideally 1-3 days after flooding. Usually, the date will be displayed in the name of the archive file itself, which the seller will send you.
Please note, sometimes clever mining sellers rename the original archive (for example, like this)
To hide the age of the log from you. But it doesn't matter - you can see it here.
I strongly advise, before buying a log, to ask the seller for something from working off or invalid from the last made bay. For a normal seller who has about 300-500 logs for sale, this will not cause any difficulties.
Why is the age of the log important? It's simple. Cookies help us if they are fresh. You understand that the user, whose data we use, does not seem to be waiting decently until we suck the money out of his money. Of course not. He does not even know about the process and continues to use the PC as usual. And if the log is old, it will have more recent cookies when entering its own account than yours. What would arouse suspicion of the anti-fraud system. Is it reasonable? Well, I'm not even talking about the fact that the user could interrupt the session and change the password from those accounts that you decide to hack.
Further, having received a probe, we made sure that the log is fresh, that the stealer named by the seller corresponds to the promised (We can easily recognize it by the structure of folders and files stored in the archive - an example of Azor's log).
Now let's check the log for the source of the installs. Most people are unaware of this important point. Including the sellers themselves.
If our stealer has settings for form grabbers in the functionality (for example, Azor) and sends us files and screenshots of the desktop, we check them in detail for cracks, patches, activators. If you find them, it is possible that the transfer was streaming from the instal cube (File Traffic Monetization Center). The quality of such installations leaves much to be desired and I do not recommend to work.
Instals are considered good, for example, those obtained from stock exchanges.
So. We figured it out with age, stealer and installs. You bought a log.
Now, after the purchase, the first thing we do is check the content of our files and the presence of cookies. If, for example, you purchase a sampled log from a seller (from azor such a log costs around $ 10-20, depending on the request), for example, a paypal, you should first check the Password-list.
It is not necessary to read everything from start to finish (although not harmful), thanks to a simple combination of search in notepad (Ctrl + f), we enter the query "paypal".
We will be automatically transferred to the required line in the document. If there is no request, feel free to ask the seller to replace it.
You can, of course, forget about this and try to pick up a password from the available ones (most often users use 2-3 permanent passwords) or recover through soap - but why, if you can ask for a replacement?). If everything is ok with login + pass, go to the folder where our cookies are stored. We open the notebook, doing the same simple combination with the search. If the log contains the lines of the required query, then there are cookies. However, if you see the value False, it means that the server received a negative response when connecting. They could not go into the paypal. For example, cardholder forgot to pass and this unsuccessful connection is the only memory of us stored in the paypal's server. Formally, the seller has the right to refuse the replacement, because there are cookies, but try to negotiate. Perhaps it will enter the position.
If all of the above conditions are met, we will finally move on to setting up the system, I will tell you about this tomorrow.
Log prices vary widely. Some logs can cost from $ 0.1-1, some go up to $ 20 apiece. The price, first of all, is influenced by the type of the stiller used during the filling. Stealers with broad functionality are considered good. They have a keylogger (keyboard capture function), thanks to which you see the key combinations typed by the user, they are able to process the login form of passwords of all major browsers (Chrome, Mazilla, Opera, etc.), include settings for the form grabber for transferring files from the user's PC and utilities for determining the hardware. In the log of such a stealer there will be accounts of shops, wallets, banks, paypal, crypt, cc, etc. In a bad stealer - accordingly, there will be only a primitive set of login password, and the log itself will consist of several accounts for toys, social networks, e-mail, possibly incentives. Well, any slag.
After buying, first of all, we look at the date it was added to the admin panel. Acceptable, it is considered a log no older than 2-3 weeks. Ideally 1-3 days after flooding. Usually, the date will be displayed in the name of the archive file itself, which the seller will send you.
Please note, sometimes clever mining sellers rename the original archive (for example, like this)
To hide the age of the log from you. But it doesn't matter - you can see it here.
I strongly advise, before buying a log, to ask the seller for something from working off or invalid from the last made bay. For a normal seller who has about 300-500 logs for sale, this will not cause any difficulties.
Why is the age of the log important? It's simple. Cookies help us if they are fresh. You understand that the user, whose data we use, does not seem to be waiting decently until we suck the money out of his money. Of course not. He does not even know about the process and continues to use the PC as usual. And if the log is old, it will have more recent cookies when entering its own account than yours. What would arouse suspicion of the anti-fraud system. Is it reasonable? Well, I'm not even talking about the fact that the user could interrupt the session and change the password from those accounts that you decide to hack.
Further, having received a probe, we made sure that the log is fresh, that the stealer named by the seller corresponds to the promised (We can easily recognize it by the structure of folders and files stored in the archive - an example of Azor's log).
Now let's check the log for the source of the installs. Most people are unaware of this important point. Including the sellers themselves.
If our stealer has settings for form grabbers in the functionality (for example, Azor) and sends us files and screenshots of the desktop, we check them in detail for cracks, patches, activators. If you find them, it is possible that the transfer was streaming from the instal cube (File Traffic Monetization Center). The quality of such installations leaves much to be desired and I do not recommend to work.
Instals are considered good, for example, those obtained from stock exchanges.
So. We figured it out with age, stealer and installs. You bought a log.
Now, after the purchase, the first thing we do is check the content of our files and the presence of cookies. If, for example, you purchase a sampled log from a seller (from azor such a log costs around $ 10-20, depending on the request), for example, a paypal, you should first check the Password-list.
It is not necessary to read everything from start to finish (although not harmful), thanks to a simple combination of search in notepad (Ctrl + f), we enter the query "paypal".
We will be automatically transferred to the required line in the document. If there is no request, feel free to ask the seller to replace it.
You can, of course, forget about this and try to pick up a password from the available ones (most often users use 2-3 permanent passwords) or recover through soap - but why, if you can ask for a replacement?). If everything is ok with login + pass, go to the folder where our cookies are stored. We open the notebook, doing the same simple combination with the search. If the log contains the lines of the required query, then there are cookies. However, if you see the value False, it means that the server received a negative response when connecting. They could not go into the paypal. For example, cardholder forgot to pass and this unsuccessful connection is the only memory of us stored in the paypal's server. Formally, the seller has the right to refuse the replacement, because there are cookies, but try to negotiate. Perhaps it will enter the position.
If all of the above conditions are met, we will finally move on to setting up the system, I will tell you about this tomorrow.
Last edited: