Mutt
Professional
- Messages
- 1,457
- Reaction score
- 1,268
- Points
- 113
Chapter 1. Why Carding?
First, you need to figure out why we need carding to make money? Why not just learn to be an accountant, for example, or a lawyer, and then sit in the office and receive your $ 1,000 a month and not bother. Someone thinks that you can easily make a lot of money in carding. If you, my dear reader, decided to engage in carding for this reason, then I hasten to disappoint you. This does not happen. Carding has long ceased to be an easy job. Yes, in the 90s there was such a topic, the bourgeoisie sent any goods to anywhere in the world using the generated map tracks. But those days are long gone. Now, carding is a world with strict rules. There is always a confrontation between shops, banks, cardholders and carders proper.
Think forty times before you, the reader, decide to do carding. Those who really plow from dawn to dawn and have been in the subject for a long time have big earnings here. No freebies. People make money with their will and perseverance. There is also an unpleasant side to carding in the form of problems with the law. Whether you steal a lot or a little, you are a thief. And a thief, as you know, must go to jail. If you are not afraid and confident in yourself, then welcome to carding.
Chapter 2. Laws and responsibility.
On the difficult path of a carder, you should familiarize yourself with the laws of the country in which you live. In this chapter, we will talk about the laws some countres.
Illegal access to computer information
1. Unlawful access to legally protected computer information, that is, information on a machine medium, in an electronic computer (computer), computer system or their network, if this act entailed the destruction, blocking, modification or copying of information, disruption of the computer, system Computers or their networks, - shall be punishable by a fine in the amount of two hundred to five hundred times the minimum monthly wage, or in the amount of the wage or salary, or any other income of the convicted person for a period of two to five months, or correctional labor for a term of six months to one year, or imprisonment for up to two years.
2. The same act, committed by a group of persons by prior conspiracy, or by an organized group or by a person using his official position, as well as having access to a computer, computer system or their network, - shall be punishable by a fine in the amount of five hundred to eight hundred times the minimum wage, or in the amount of the wage or other income of the convicted person for a period of five to months, or correctional labor for a term of one to two years, or arrest for a term of three to six months, or imprisonment for a term of up to five years.
This is the most common article for hackers. If you decide to start hacking stores and getting credit cards from there, then this information is just for you. Note, if you are alone - they give up to two years. If there are two or more of you, then there are already up to five.
Creation, use and distribution of malicious programs for computers
1. Creation of computer programs or making changes to existing programs, knowingly leading to unauthorized destruction, blocking, modification or copying of information, disruption of the operation of a computer, computer system or their network, as well as the use or distribution of such programs or machine media with such programs - shall be punishable by deprivation of liberty for a term of up to three years with a fine in the amount of two hundred to five hundred times the minimum monthly wage, or in the amount of the wage or salary , or any other income of the convicted person for a period of two to five months.
2. The same acts, which through negligence have entailed grave consequences, shall be punishable by imprisonment for a term of three to seven years.
If you are a coder and write Trojans to download and zombie computers of the bourgeoisie, then this article of the law is for you. If you load someone else's tro, then this is also for you. They give up to three years plus a fine, and if with grave, they can give up to seven.
Violation of the rules for the operation of computers, computer systems or their networks
1.Violation of the rules for operating a computer, computer system or their network by a person who has access to a computer, computer system or their network, resulting in the destruction, blocking or modification of computer information protected by law, if this act has caused significant harm, is punishable by deprivation of the right to hold certain positions or engage in certain activities for up to five years, or compulsory work for a period of one hundred and eighty to two hundred and forty hours, or restraint of liberty for up to two years.
2. The same act, which through negligence has entailed grave consequences, - shall be punishable by imprisonment for a term of up to four years.
If you have done something in a chain of stores or a bank and this disrupted their normal operation, for example, a deface or DDoS attack, then this article will shine for you. With serious consequences, they are given up to four years.
Fraud
1. Fraud, that is, theft of someone else's property or the acquisition of the right to someone else's property by deception or abuse of trust, - shall be punishable by a fine in the amount of up to one hundred and twenty thousand $, or in the amount of the wage or salary, or any other income of the convicted person for a period of up to one year, or by compulsory works for a term of up to one hundred and eighty hours, or corrective labor for a term of six months to one year, or arrest for a term from two to four months, or imprisonment for up to two years.
2. Fraud committed by a group of persons by prior conspiracy, as well as causing significant damage to a citizen - shall be punishable by a fine in an amount of up to three hundred thousand $, or in the amount of the wage or salary, or any other income of the convicted person for a period of up to two years, or by compulsory works for a term of one hundred and eighty to two hundred and forty hours, or by corrective labor for a term of one to two years, or by deprivation freedom for up to five years.
3. Fraud committed by a person using his official position, as well as on a large scale, - shall be punishable by a fine in the amount of one hundred thousand to five hundred thousand $, or in the amount of the wage or salary, or any other income of the convicted person for a period from one to three years, or by imprisonment for a term of two to six years, with a fine in an amount of up to ten thousand $ or in the amount of the wage payment or other income of the convicted person for a period of up to one month or without it.
4. Fraud committed by an organized group or on an especially large scale - shall be punishable by imprisonment for a term of five to ten years with a fine in the amount of up to one million $ or in the amount of the wage or other income of the convicted person for a period of up to three years, or without it.
The main article for carders. In different situations, they are given from two to ten years.
Organization of a criminal community (criminal organization) or participation in it (her)
1. Creation of a criminal community (criminal organization) for the purpose of joint commission of one or several grave or especially grave crimes or leadership of such a community (organization) or structural subdivisions included in it (her), as well as coordination of criminal actions, creation of stable ties between various independently active organized groups, the development of plans and the creation of conditions for the commission of crimes by such groups or the division of spheres of criminal influence and criminal proceeds between them, committed by a person using his influence on members of organized groups, as well as participation in a meeting of organizers,leaders (leaders) or other representatives of organized groups for the purpose of committing at least one of these crimes - shall be punishable by imprisonment for a term of twelve to twenty years with a fine of up to one million $ or in the amount of the wage or other income of the convicted person for a period of up to five years or not.
2. Participation in a criminal community (criminal organization) is punished with imprisonment for a term of five to ten years with a fine in the amount of up to five hundred thousand $ or in the amount of the convicted person's salary or other income for a period of up to three years, or without it.
3. The acts provided for in the first or second part of this Article, committed by a person using his official position, is punished with imprisonment for a term of fifteen to twenty years with a fine of up to one million $ or in the amount of the wages or other income of the convicted person for the period up to five years or without it.
4. The acts provided for in the first part of this article, committed by a person occupying the highest position in the criminal hierarchy, is punished with imprisonment for a term of fifteen to twenty years or life imprisonment.
Note. A person who voluntarily ceased participation in a criminal community (criminal organization) or a structural unit included in it (her) or a meeting of organizers, leaders (leaders) or other representatives of organized groups and actively contributed to the disclosure or suppression of these crimes, is released from criminal liability if in his actions do not contain any other corpus delicti.
Production or sale of counterfeit credit or payment cards and other payment documents
1. Manufacturing for the purpose of marketing or selling counterfeit credit or payment cards, as well as other payment documents that are not securities, is punished with imprisonment for a term of two to six years with a fine in the amount of one hundred thousand to three hundred thousand $ or in the amount of salary or other income of the convicted person for a period from one to two years.
2. The same acts committed by an organized group - are punishable by imprisonment for a term of four to seven years with a fine of up to one million $ or in the amount of wages or other income of the convicted person for a period of up to five years or without it.
If you do real carding and make copies of credit cards, it can take up to seven years.
Here are the main articles attributed to our colleagues. As you can see, the list is not small, and the terms are not small. So think again which is better - carding or normal work with a work book, seniority and pension.
Chapter 3. Where to start?
This question worries all beginners, without exception. Where to start in carding? From bays, rollocks, cash out, drops, ringing, drawing documents, clothes, casinos, dating? There are a lot of topics, but not all are suitable for beginners. You can make a good start in a thing and start your first business there. So what is a thing? In short, everything looks like this:
We go to the website of the online store, choose a laptop or a gold chain as thick as a big toe, pay with data from a bourgeois card, and the ordered goods come to our mail. But, as in any business, there are many nuances. One of the biggest problems is anti-fraud protection. This is such a special automatic system that tries to track the person who is driving the card and determine whether it is the carder or the owner. Basically, this system looks at the correspondence of the client's IP address to the country and state where he lives. For example, we drive in the card of John Smith, who lives in the city of Chicago, Illinois, and the IP address shows that this person. Such tricks with an anti-fraud system will not work. She also looks at the local settings of the computer: system language, time zone. It's illogical that the bourgeois is sitting on Windows with a time zone of +5. Therefore, a well-tuned system is needed to successfully drive cards. You also need to pay attention to your safety. Imagine, by some miracle, you have scored 50 thousand worth of things, and then uncles from the police come to you, because you shone your real IP addresses everywhere and even ordered all the parcels to your home address. After reading the second chapter, you don't want to get caught so stupidly. Therefore, you need to provide yourself with maximum coverage of the rear and flanks. because you shone your real IP addresses everywhere and even ordered all the parcels to your home address. After reading the second chapter, you don't want to get caught so stupidly. Therefore, you need to ensure yourself the maximum coverage of the rear and flanks. because you shone your real IP addresses everywhere and even ordered all the parcels to your home address. After reading the second chapter, you don't want to get caught so stupidly. Therefore, you need to provide yourself with maximum coverage of the rear and flanks.
Chapter 4. Security.
Let's start with how to protect your real IP address from being exposed. One of the most successful solutions today is a VPN. VPN is a service that will help you remain anonymous, it will help you hide your real IP address, and will not allow you to listen to traffic. Nowadays a lot of offices provide VPN services. Look for an office with a good reputation and cheaper prices, because you need to spend your start-up capital. Next on the list are socks. In fact, socks are needed not so much for security as for the anti-fraud system to think that we are leaving the state we need.
Now let's talk about how to accept goods ordered in shops. It is out of the question to take over the goods. Therefore, we need a drop - a person who will take upon himself not only the parcel, but also the visit of the cops if they arrive. Drops are adjustable and non-adjustable.
Adjustable drops are those who think that they are doing everything correctly and legally and do not suspect that the goods that come to them are carzen. How can they rub it in is the second thing, but they firmly believe that they work at a real job, or that you brought a brand new plasma for your grandmother, and left for another city on business.
Undivided drops know that your goods are left-handed and that the police can come to them at any time. Making drops for yourself is a rather difficult task, obviously not for beginners. Therefore, with a clear conscience, we will turn to the drop conductor. A drop driver is a person who manages drops and provides us with his drops for a certain fee. Usually this is a percentage of the sale of the product or the second item in the package (two video cameras in the package).
When paying for goods by card, we indicate the address of the drop and the parcel is sent to him, and he already sends us half of the parcel. One way or another, this structure is quite pale because they will take the drop by the balls and he will gladly hand you over to the cops. There is a way out of this situation. Now drop carriers are also buyers in one person. Those. you send him a laptop worth 1 kilo of bucks and he drops $ 500 to your WMZ purse upon receipt. This method is many times more convenient. you do not need to take over the goods, but you can immediately sell them and get laundered money. I think that you should not even remember that you need to look for proven ones who have been in the subject for a long time, tk. there is always the possibility that you will be thrown. Work through a guarantor, so it's calmer.
Now let's talk about how to protect private information on your computer. For example, we have credit card numbers, tracks from shops and other goodies. We need to hide it somewhere far away so that it does not irritate our eyes, and so that if cops suddenly come to us, we can not be especially concerned about the fact that they will find something illegal on our computer.
In order not to store data in clear text, we need to encrypt it. We will encrypt using the TrueCrypt program. So, download the program from the official site (you can also find the crack there). In the wizard, select to encrypt the usb device. Then we choose to create a hidden volume. The hidden volume is needed for better protection. It works like this. We create a encrypted partition disguised as a file. For example, a movie. If, when mounting a partition, enter the password for a regular volume, then a regular volume will open. If you enter the password for the hidden volume, the hidden volume is mounted. The trick is that if the cops find out about the encrypted section, you tell them the section from the usual volume and they will see, for example, porn, not documents.
So the time has come for a detailed acquaintance with the process of driving in and making a bubble. But first, we need to configure the system. So welcome to the next chapter.
Chapter 5. System configuration.
To have a configured system, we need to put it somewhere. The best option for this is a virtual machine. For this situation, WMware is best suited. Download from the official server or from torrents. Then we put the English Windows on it (it is assumed that we will work with USA). After we have downloaded and installed Windows on WMware (I don't give detailed instructions - there are millions of them lying around), we need to configure the programs we need. Programs can be downloaded from the Internet or copied from the main OS (just click copy on the files, and then click paste in the virtual machine). So, we need TrueCrypt to be able to access our storage of important documents. There is a small note here. If your encrypted container is stored on a USB flash drive, then you just need to share access to it over the network and specify the path through the network to the container in the guest OS in TruCript.
IMPORTANT! One container cannot be simultaneously mounted on the guest and host OS. To mount a container in the guest, first unmount it in the main OS! After you set up this program, go to the sock program. Use Proxifier_2.8. To make the programs work through the sox, run proxyfier, click options> proxy settings> add. We enter the sox there. Immediately there is an opportunity to check the sox for survivability, the Check button is intended for this. To hide DNS, click Option> Name Resolution> uncheck Choose the mode automatically> check the box under Remotely> OK. One container cannot be simultaneously mounted on the guest and host OS. To mount a container in the guest, first unmount it in the main OS! After you set up this program, go to the sock program.
To make the programs work through the socls, run proxyfier, click options> proxy settings> add. We enter the sox there. Immediately there is an opportunity to check the socks for survivability, the Check button is intended for this. To hide DNS, I also recommend downloading the CCtools program to change the computer IDs and names. Also download and install a good browser like Opera or Firefox, use programs to delete temporary Internet files, such as cookies, sessions, cache. Privacy Eraser Pro is a program with which you can permanently clean your browser history. In addition to Privacy Eraser, I can advise CCleaner, the program also cleans the history in the browser, deletes unnecessary files, cleans the registry.
The system was set up, ready for driving. Welcome to the next chapter!
Chapter 6. Anatomy of cards.
Now we need to understand the details of what cards are and how to use them.
Usually cards (cardboard, CC, SS) are sold like this:
"Heather Dodder", "10/27/1977", "1232345663", "135 Wyckfield Road", "Savannah", "GA", "31410", "US", "heather912@aol.com", "1 ( 912) 256-1212 "," Visa "," 4185860387795567 "," 307 "," 11 "," 2024 "," PLATINUM (CREDIT) "," PROVIDIAN NATIONAL BANK "
Let's write down what is here and why:
1) Heather Dodder - name of the cardholder (credit card holder)
2) 10/27/1977 - date of birth of the cardholder (DOB - Date Of Birth)
3) "1232345663" - social secure number (SSN)
4) "135 Wyckfield Road" - cardholder address (135 - house number, Wyckfield Road - street name)
5) "Savannah" - the city of residence of the cardholder
6) "GA" - cardholder state
7) "31410" - cardholder index (ZIP code in usa)
8) "US" - the country of the cardholder
9) "heather912@aol.com" - cardholder mail (e-mail)
10) "1 (912) 256-1212" - cardholder's phone number
11) "Visa" - type of credit card
12) "4185860387795567" - credit card number
13) "307" - CVV or CVV2 card code (3-x or 4-digit)
14) "11", "2024" - the expiry date of the credit card (exp date)
15) "PLATINUM (CREDIT)" - type of visa card
16) "PROVIDIAN NATIONAL BANK" - the name of the bank that issued the card
By the way, SSN is not always on the map. Information such as SSN and DOB is searched for separately for a fee.
Types of credit cards:
Visa (VI, starts 4),
MasterCard (MC, starts with 5),
American Express (AMEX, starts with 3).
Additional information sometimes requested by the bank / shop:
MMN (mother's maiden name) - mother's maiden name.
DOB (date of birth) - date of birth.
SSN (social secure number) - individual taxpayer number.
PIN (pin code) - 4-digit pin-code of the card.
DL (driver's license) - driver's license number.
Well, that seems to be all you need to know about credit cards at first. Now we are ready for the first drives, so let's go to the next chapter!
Chapter 7. Test carding.
To begin with, I recommend that you practice "on cats." That is, on the little things, so that then driving on a real site passed without any problems. You can, for example, scard yourself a Counter-Strike. To do this, we go into our virtual machine. You can not buy credit cards for this business, but look for a fresher freebie or ask someone for a loan.
If everything went well with the test drives and you gained at least a little experience in driving, then go ahead to find a real job!
Chapter 8. Real carding.
To start making money on real shops, you need to find these shops. We need shops that send to an address other than billing to the usual CC + CVV. Finding such shops is the most difficult thing. We enter something like "buy asus laptop" into Google and start following the links and looking at shops. Read in the shops, in the description, what you need to order, if it seems to you that the shop should send, then do so, take a credit card, drive it in, and write the address of the owner of some other card to the delivery address. Those. there must be a real person at the address you wrote. With a successful drive, they will collect and send you an order and send a track to the mail. Track is the parcel number, which can be tracked on the website of the postal service where the parcel is now. Register mail on the servers yahoo.com msn.com gmail.com. Forget it. So, if the store has sent the track and the package is gone, congratulations, you have found a wholesome shop. Now go to the drop guide, he gives you the drop address. You again drive the parcel into the name and address of the drop and go! The track that the shop will give you needs to be thrown off the drop guide. Now sit and wait for the first money from the drop guide!
This article has covered the very basics, terms and concepts.
The main idea that I want to convey is that carding is not just driving! As you can see, driving in is just the simplest and last (well, or penultimate) thing in the whole carder scheme. A monkey can also buy cardboard (credit card details) at special forums and stupidly drive numbers into the necessary windows.
The carder's task is to set up the system in the right way, prepare everything you need, provide your cover, security and anonymity, negotiate with drops and / or shipping services, find suitable stores, bypass their security system, finally get the product, sell it (in fact, sell stolen goods), get money and launder it!
As mentioned at the beginning of the article, carding is not at all an easy task. And in order to do it for a long time and productively, you really need to love the process itself and understand everything inside and out. It is no coincidence that all decent carding teachers take a lot of money for training, manuals and the theoretical part.
taken from the vastness of the Internet
First, you need to figure out why we need carding to make money? Why not just learn to be an accountant, for example, or a lawyer, and then sit in the office and receive your $ 1,000 a month and not bother. Someone thinks that you can easily make a lot of money in carding. If you, my dear reader, decided to engage in carding for this reason, then I hasten to disappoint you. This does not happen. Carding has long ceased to be an easy job. Yes, in the 90s there was such a topic, the bourgeoisie sent any goods to anywhere in the world using the generated map tracks. But those days are long gone. Now, carding is a world with strict rules. There is always a confrontation between shops, banks, cardholders and carders proper.
Think forty times before you, the reader, decide to do carding. Those who really plow from dawn to dawn and have been in the subject for a long time have big earnings here. No freebies. People make money with their will and perseverance. There is also an unpleasant side to carding in the form of problems with the law. Whether you steal a lot or a little, you are a thief. And a thief, as you know, must go to jail. If you are not afraid and confident in yourself, then welcome to carding.
Chapter 2. Laws and responsibility.
On the difficult path of a carder, you should familiarize yourself with the laws of the country in which you live. In this chapter, we will talk about the laws some countres.
Illegal access to computer information
1. Unlawful access to legally protected computer information, that is, information on a machine medium, in an electronic computer (computer), computer system or their network, if this act entailed the destruction, blocking, modification or copying of information, disruption of the computer, system Computers or their networks, - shall be punishable by a fine in the amount of two hundred to five hundred times the minimum monthly wage, or in the amount of the wage or salary, or any other income of the convicted person for a period of two to five months, or correctional labor for a term of six months to one year, or imprisonment for up to two years.
2. The same act, committed by a group of persons by prior conspiracy, or by an organized group or by a person using his official position, as well as having access to a computer, computer system or their network, - shall be punishable by a fine in the amount of five hundred to eight hundred times the minimum wage, or in the amount of the wage or other income of the convicted person for a period of five to months, or correctional labor for a term of one to two years, or arrest for a term of three to six months, or imprisonment for a term of up to five years.
This is the most common article for hackers. If you decide to start hacking stores and getting credit cards from there, then this information is just for you. Note, if you are alone - they give up to two years. If there are two or more of you, then there are already up to five.
Creation, use and distribution of malicious programs for computers
1. Creation of computer programs or making changes to existing programs, knowingly leading to unauthorized destruction, blocking, modification or copying of information, disruption of the operation of a computer, computer system or their network, as well as the use or distribution of such programs or machine media with such programs - shall be punishable by deprivation of liberty for a term of up to three years with a fine in the amount of two hundred to five hundred times the minimum monthly wage, or in the amount of the wage or salary , or any other income of the convicted person for a period of two to five months.
2. The same acts, which through negligence have entailed grave consequences, shall be punishable by imprisonment for a term of three to seven years.
If you are a coder and write Trojans to download and zombie computers of the bourgeoisie, then this article of the law is for you. If you load someone else's tro, then this is also for you. They give up to three years plus a fine, and if with grave, they can give up to seven.
Violation of the rules for the operation of computers, computer systems or their networks
1.Violation of the rules for operating a computer, computer system or their network by a person who has access to a computer, computer system or their network, resulting in the destruction, blocking or modification of computer information protected by law, if this act has caused significant harm, is punishable by deprivation of the right to hold certain positions or engage in certain activities for up to five years, or compulsory work for a period of one hundred and eighty to two hundred and forty hours, or restraint of liberty for up to two years.
2. The same act, which through negligence has entailed grave consequences, - shall be punishable by imprisonment for a term of up to four years.
If you have done something in a chain of stores or a bank and this disrupted their normal operation, for example, a deface or DDoS attack, then this article will shine for you. With serious consequences, they are given up to four years.
Fraud
1. Fraud, that is, theft of someone else's property or the acquisition of the right to someone else's property by deception or abuse of trust, - shall be punishable by a fine in the amount of up to one hundred and twenty thousand $, or in the amount of the wage or salary, or any other income of the convicted person for a period of up to one year, or by compulsory works for a term of up to one hundred and eighty hours, or corrective labor for a term of six months to one year, or arrest for a term from two to four months, or imprisonment for up to two years.
2. Fraud committed by a group of persons by prior conspiracy, as well as causing significant damage to a citizen - shall be punishable by a fine in an amount of up to three hundred thousand $, or in the amount of the wage or salary, or any other income of the convicted person for a period of up to two years, or by compulsory works for a term of one hundred and eighty to two hundred and forty hours, or by corrective labor for a term of one to two years, or by deprivation freedom for up to five years.
3. Fraud committed by a person using his official position, as well as on a large scale, - shall be punishable by a fine in the amount of one hundred thousand to five hundred thousand $, or in the amount of the wage or salary, or any other income of the convicted person for a period from one to three years, or by imprisonment for a term of two to six years, with a fine in an amount of up to ten thousand $ or in the amount of the wage payment or other income of the convicted person for a period of up to one month or without it.
4. Fraud committed by an organized group or on an especially large scale - shall be punishable by imprisonment for a term of five to ten years with a fine in the amount of up to one million $ or in the amount of the wage or other income of the convicted person for a period of up to three years, or without it.
The main article for carders. In different situations, they are given from two to ten years.
Organization of a criminal community (criminal organization) or participation in it (her)
1. Creation of a criminal community (criminal organization) for the purpose of joint commission of one or several grave or especially grave crimes or leadership of such a community (organization) or structural subdivisions included in it (her), as well as coordination of criminal actions, creation of stable ties between various independently active organized groups, the development of plans and the creation of conditions for the commission of crimes by such groups or the division of spheres of criminal influence and criminal proceeds between them, committed by a person using his influence on members of organized groups, as well as participation in a meeting of organizers,leaders (leaders) or other representatives of organized groups for the purpose of committing at least one of these crimes - shall be punishable by imprisonment for a term of twelve to twenty years with a fine of up to one million $ or in the amount of the wage or other income of the convicted person for a period of up to five years or not.
2. Participation in a criminal community (criminal organization) is punished with imprisonment for a term of five to ten years with a fine in the amount of up to five hundred thousand $ or in the amount of the convicted person's salary or other income for a period of up to three years, or without it.
3. The acts provided for in the first or second part of this Article, committed by a person using his official position, is punished with imprisonment for a term of fifteen to twenty years with a fine of up to one million $ or in the amount of the wages or other income of the convicted person for the period up to five years or without it.
4. The acts provided for in the first part of this article, committed by a person occupying the highest position in the criminal hierarchy, is punished with imprisonment for a term of fifteen to twenty years or life imprisonment.
Note. A person who voluntarily ceased participation in a criminal community (criminal organization) or a structural unit included in it (her) or a meeting of organizers, leaders (leaders) or other representatives of organized groups and actively contributed to the disclosure or suppression of these crimes, is released from criminal liability if in his actions do not contain any other corpus delicti.
Production or sale of counterfeit credit or payment cards and other payment documents
1. Manufacturing for the purpose of marketing or selling counterfeit credit or payment cards, as well as other payment documents that are not securities, is punished with imprisonment for a term of two to six years with a fine in the amount of one hundred thousand to three hundred thousand $ or in the amount of salary or other income of the convicted person for a period from one to two years.
2. The same acts committed by an organized group - are punishable by imprisonment for a term of four to seven years with a fine of up to one million $ or in the amount of wages or other income of the convicted person for a period of up to five years or without it.
If you do real carding and make copies of credit cards, it can take up to seven years.
Here are the main articles attributed to our colleagues. As you can see, the list is not small, and the terms are not small. So think again which is better - carding or normal work with a work book, seniority and pension.
Chapter 3. Where to start?
This question worries all beginners, without exception. Where to start in carding? From bays, rollocks, cash out, drops, ringing, drawing documents, clothes, casinos, dating? There are a lot of topics, but not all are suitable for beginners. You can make a good start in a thing and start your first business there. So what is a thing? In short, everything looks like this:
We go to the website of the online store, choose a laptop or a gold chain as thick as a big toe, pay with data from a bourgeois card, and the ordered goods come to our mail. But, as in any business, there are many nuances. One of the biggest problems is anti-fraud protection. This is such a special automatic system that tries to track the person who is driving the card and determine whether it is the carder or the owner. Basically, this system looks at the correspondence of the client's IP address to the country and state where he lives. For example, we drive in the card of John Smith, who lives in the city of Chicago, Illinois, and the IP address shows that this person. Such tricks with an anti-fraud system will not work. She also looks at the local settings of the computer: system language, time zone. It's illogical that the bourgeois is sitting on Windows with a time zone of +5. Therefore, a well-tuned system is needed to successfully drive cards. You also need to pay attention to your safety. Imagine, by some miracle, you have scored 50 thousand worth of things, and then uncles from the police come to you, because you shone your real IP addresses everywhere and even ordered all the parcels to your home address. After reading the second chapter, you don't want to get caught so stupidly. Therefore, you need to provide yourself with maximum coverage of the rear and flanks. because you shone your real IP addresses everywhere and even ordered all the parcels to your home address. After reading the second chapter, you don't want to get caught so stupidly. Therefore, you need to ensure yourself the maximum coverage of the rear and flanks. because you shone your real IP addresses everywhere and even ordered all the parcels to your home address. After reading the second chapter, you don't want to get caught so stupidly. Therefore, you need to provide yourself with maximum coverage of the rear and flanks.
Chapter 4. Security.
Let's start with how to protect your real IP address from being exposed. One of the most successful solutions today is a VPN. VPN is a service that will help you remain anonymous, it will help you hide your real IP address, and will not allow you to listen to traffic. Nowadays a lot of offices provide VPN services. Look for an office with a good reputation and cheaper prices, because you need to spend your start-up capital. Next on the list are socks. In fact, socks are needed not so much for security as for the anti-fraud system to think that we are leaving the state we need.
Now let's talk about how to accept goods ordered in shops. It is out of the question to take over the goods. Therefore, we need a drop - a person who will take upon himself not only the parcel, but also the visit of the cops if they arrive. Drops are adjustable and non-adjustable.
Adjustable drops are those who think that they are doing everything correctly and legally and do not suspect that the goods that come to them are carzen. How can they rub it in is the second thing, but they firmly believe that they work at a real job, or that you brought a brand new plasma for your grandmother, and left for another city on business.
Undivided drops know that your goods are left-handed and that the police can come to them at any time. Making drops for yourself is a rather difficult task, obviously not for beginners. Therefore, with a clear conscience, we will turn to the drop conductor. A drop driver is a person who manages drops and provides us with his drops for a certain fee. Usually this is a percentage of the sale of the product or the second item in the package (two video cameras in the package).
When paying for goods by card, we indicate the address of the drop and the parcel is sent to him, and he already sends us half of the parcel. One way or another, this structure is quite pale because they will take the drop by the balls and he will gladly hand you over to the cops. There is a way out of this situation. Now drop carriers are also buyers in one person. Those. you send him a laptop worth 1 kilo of bucks and he drops $ 500 to your WMZ purse upon receipt. This method is many times more convenient. you do not need to take over the goods, but you can immediately sell them and get laundered money. I think that you should not even remember that you need to look for proven ones who have been in the subject for a long time, tk. there is always the possibility that you will be thrown. Work through a guarantor, so it's calmer.
Now let's talk about how to protect private information on your computer. For example, we have credit card numbers, tracks from shops and other goodies. We need to hide it somewhere far away so that it does not irritate our eyes, and so that if cops suddenly come to us, we can not be especially concerned about the fact that they will find something illegal on our computer.
In order not to store data in clear text, we need to encrypt it. We will encrypt using the TrueCrypt program. So, download the program from the official site (you can also find the crack there). In the wizard, select to encrypt the usb device. Then we choose to create a hidden volume. The hidden volume is needed for better protection. It works like this. We create a encrypted partition disguised as a file. For example, a movie. If, when mounting a partition, enter the password for a regular volume, then a regular volume will open. If you enter the password for the hidden volume, the hidden volume is mounted. The trick is that if the cops find out about the encrypted section, you tell them the section from the usual volume and they will see, for example, porn, not documents.
So the time has come for a detailed acquaintance with the process of driving in and making a bubble. But first, we need to configure the system. So welcome to the next chapter.
Chapter 5. System configuration.
To have a configured system, we need to put it somewhere. The best option for this is a virtual machine. For this situation, WMware is best suited. Download from the official server or from torrents. Then we put the English Windows on it (it is assumed that we will work with USA). After we have downloaded and installed Windows on WMware (I don't give detailed instructions - there are millions of them lying around), we need to configure the programs we need. Programs can be downloaded from the Internet or copied from the main OS (just click copy on the files, and then click paste in the virtual machine). So, we need TrueCrypt to be able to access our storage of important documents. There is a small note here. If your encrypted container is stored on a USB flash drive, then you just need to share access to it over the network and specify the path through the network to the container in the guest OS in TruCript.
IMPORTANT! One container cannot be simultaneously mounted on the guest and host OS. To mount a container in the guest, first unmount it in the main OS! After you set up this program, go to the sock program. Use Proxifier_2.8. To make the programs work through the sox, run proxyfier, click options> proxy settings> add. We enter the sox there. Immediately there is an opportunity to check the sox for survivability, the Check button is intended for this. To hide DNS, click Option> Name Resolution> uncheck Choose the mode automatically> check the box under Remotely> OK. One container cannot be simultaneously mounted on the guest and host OS. To mount a container in the guest, first unmount it in the main OS! After you set up this program, go to the sock program.
To make the programs work through the socls, run proxyfier, click options> proxy settings> add. We enter the sox there. Immediately there is an opportunity to check the socks for survivability, the Check button is intended for this. To hide DNS, I also recommend downloading the CCtools program to change the computer IDs and names. Also download and install a good browser like Opera or Firefox, use programs to delete temporary Internet files, such as cookies, sessions, cache. Privacy Eraser Pro is a program with which you can permanently clean your browser history. In addition to Privacy Eraser, I can advise CCleaner, the program also cleans the history in the browser, deletes unnecessary files, cleans the registry.
The system was set up, ready for driving. Welcome to the next chapter!
Chapter 6. Anatomy of cards.
Now we need to understand the details of what cards are and how to use them.
Usually cards (cardboard, CC, SS) are sold like this:
"Heather Dodder", "10/27/1977", "1232345663", "135 Wyckfield Road", "Savannah", "GA", "31410", "US", "heather912@aol.com", "1 ( 912) 256-1212 "," Visa "," 4185860387795567 "," 307 "," 11 "," 2024 "," PLATINUM (CREDIT) "," PROVIDIAN NATIONAL BANK "
Let's write down what is here and why:
1) Heather Dodder - name of the cardholder (credit card holder)
2) 10/27/1977 - date of birth of the cardholder (DOB - Date Of Birth)
3) "1232345663" - social secure number (SSN)
4) "135 Wyckfield Road" - cardholder address (135 - house number, Wyckfield Road - street name)
5) "Savannah" - the city of residence of the cardholder
6) "GA" - cardholder state
7) "31410" - cardholder index (ZIP code in usa)
8) "US" - the country of the cardholder
9) "heather912@aol.com" - cardholder mail (e-mail)
10) "1 (912) 256-1212" - cardholder's phone number
11) "Visa" - type of credit card
12) "4185860387795567" - credit card number
13) "307" - CVV or CVV2 card code (3-x or 4-digit)
14) "11", "2024" - the expiry date of the credit card (exp date)
15) "PLATINUM (CREDIT)" - type of visa card
16) "PROVIDIAN NATIONAL BANK" - the name of the bank that issued the card
By the way, SSN is not always on the map. Information such as SSN and DOB is searched for separately for a fee.
Types of credit cards:
Visa (VI, starts 4),
MasterCard (MC, starts with 5),
American Express (AMEX, starts with 3).
Additional information sometimes requested by the bank / shop:
MMN (mother's maiden name) - mother's maiden name.
DOB (date of birth) - date of birth.
SSN (social secure number) - individual taxpayer number.
PIN (pin code) - 4-digit pin-code of the card.
DL (driver's license) - driver's license number.
Well, that seems to be all you need to know about credit cards at first. Now we are ready for the first drives, so let's go to the next chapter!
Chapter 7. Test carding.
To begin with, I recommend that you practice "on cats." That is, on the little things, so that then driving on a real site passed without any problems. You can, for example, scard yourself a Counter-Strike. To do this, we go into our virtual machine. You can not buy credit cards for this business, but look for a fresher freebie or ask someone for a loan.
If everything went well with the test drives and you gained at least a little experience in driving, then go ahead to find a real job!
Chapter 8. Real carding.
To start making money on real shops, you need to find these shops. We need shops that send to an address other than billing to the usual CC + CVV. Finding such shops is the most difficult thing. We enter something like "buy asus laptop" into Google and start following the links and looking at shops. Read in the shops, in the description, what you need to order, if it seems to you that the shop should send, then do so, take a credit card, drive it in, and write the address of the owner of some other card to the delivery address. Those. there must be a real person at the address you wrote. With a successful drive, they will collect and send you an order and send a track to the mail. Track is the parcel number, which can be tracked on the website of the postal service where the parcel is now. Register mail on the servers yahoo.com msn.com gmail.com. Forget it. So, if the store has sent the track and the package is gone, congratulations, you have found a wholesome shop. Now go to the drop guide, he gives you the drop address. You again drive the parcel into the name and address of the drop and go! The track that the shop will give you needs to be thrown off the drop guide. Now sit and wait for the first money from the drop guide!
This article has covered the very basics, terms and concepts.
The main idea that I want to convey is that carding is not just driving! As you can see, driving in is just the simplest and last (well, or penultimate) thing in the whole carder scheme. A monkey can also buy cardboard (credit card details) at special forums and stupidly drive numbers into the necessary windows.
The carder's task is to set up the system in the right way, prepare everything you need, provide your cover, security and anonymity, negotiate with drops and / or shipping services, find suitable stores, bypass their security system, finally get the product, sell it (in fact, sell stolen goods), get money and launder it!
As mentioned at the beginning of the article, carding is not at all an easy task. And in order to do it for a long time and productively, you really need to love the process itself and understand everything inside and out. It is no coincidence that all decent carding teachers take a lot of money for training, manuals and the theoretical part.
taken from the vastness of the Internet
