cafedread.com will be shutting down on 30th of June.
/d/fraud icon

/d/fraud

31,229 subscribers

Forum topics and responses should be dedicated to increasing user knowledge. Contact users on your own.

Go to /d/carding to discuss stolen cards

Go to /d/fraudship for partnerships

NO CONTACT REQUESTS

RULES

Do not post fullz

WE ARE NOT RESPONSIBLE IF YOU GET SCAMMED

Only vendors on markets can get flairs.

OPSEC FOR BOTH Bank Fraud and Carding (Pinned post)

by /u/olddirtybastard · 3 votes · 2 weeks ago

Introduction

Carding is an art form, and a difficult one at that to master.

Today's protected payment systems try to stop most attempts to fraudulently use cards

that are not of the individuals property. However, with a bit of perseverance, hind-sight

knowledge, creativity and some initial investment funds, you can imitate the Card Holder(CH)

well enough to beat the fraud detection systems built within payment processors that work by

the Payment Card Industry Data Security Standard(PCIDSS).

PCIDSS Meaning/Explanation

http://bit.ly/1tepvvz

The PCIDSS includes certain factors that are checked every time a credit card transaction is

attempted. It is these factors that they look for to determine the possibility of the

transaction being fraudulent, and give you what I will refer to as the "Fraud Score".

With that knowledge, we can see that every payment processor is designed to let transactions

be processed. By imitating the CH well enough based on the determinative factors, we can

allow ANY transaction to go through.

___________________________________________________________________________________________________________________________________

ThreatMetrix

See the periodic table of threats to a payment's legitimacy and digital identity assessment:

http://bit.ly/2qVK054

___________________________________________________________________________________________________________________________________

Avoiding VBV/MSC

To find a site to card you must first understand the PCIDSS of the payment system you�ll be

using. The payment system could be �authorize.net� as it does not require VBV/MSC

authentication We just need to avoid the declination triggers mentioned later.

___________________________________________________________________________________________________________________________________

Finding Sites To Card

With the target payment processor, that does not use VBV/MSC

( Authorize.Net | 400k+ Merchants ). We can find online stores that use

Authorize.Net by using Google and Search Operators. Replace Search Term in

double quotes with your desired product or product category.

Example

�authorize.net merchant� -site:authorize.net �Search Term�

�stripe merchant� -site:stripe.com �Search Term�

�braintree merchant� -site:braintreepayments.com �Search Term�

Putting a phrase into double quotation marks while searching Google will look for

pages with the exact keyword match, the �site:� Operator will only show results from

that site, the �-site:� operator will exclude the site and its results.

___________________________________________________________________________________________________________________________________

Declination Triggers

Braintree, authorize.net and stripe all have standard PCIs that once analysed,

gives you a pretty good idea on what the system looks for and classify as a

"could be fraud". Some of the device, browser and connection data collected to

verify transactions by processors heads into the hundreds, especially amazon,

paypal and skrill.

The process of finding the PCIs was a simple process of trial and error, some of

the device fingerprints they look for include;

- System Clock

- Time Zone

- Operating System

- Operating System Username

- Browser Fingerprints

- Cookies

- Caches

- I.P

- Using a Proxy

- Unusual or large Transactions

- Location

- User-Agent

- HTTP_Headers

- Browser Plugins

- Screen Size and zoom

- System Fonts (Times New Roma, Tahoma)

- Names / DOB/ SSN/ ADDRESS

- Copy & Paste Credentials

- Residential/data-cantre/spam RDP/socks

- Card Tagging

- Connection Speed (Due To Proxies)

- Email Domain authenticity and age (.edu is the best)

- Shipping Address / Billing Address

___________________________________________________________________________________________________________________________________

OPSEC (Operation Security) & Staying Anonymous

What You Should Know Before You Begin;

- Remmina is an RDP (Remote Desktop Protocol) Client

- VPN Is A Virtual Private Network that hides your IP

- Tor Facilitates An Anonymous Connection

Into Remotely And Use As Our Own.

- VMWare is a Virtual Machine That Hosts The Operating System We'll be using (Ubuntu)

- Socks Proxy Checker is Proxy-client that will connect to a remote Socks5 Proxy.

- Socks5 Proxy Server is the server located within vicinity of the victim.

___________________________________________________________________________________________________________________________________

#1 - Download, install and start VMWare Workstation

#2 - Download Ubuntu and start it with VMWare.

#3 - In Ubuntu, download, install and start "Tor Browser"

#4 - Download & install "Mulvvadvpn" to Ubuntu

PAY WITH BTC!

#5 - Start MullvadVPN

___________________________________________________________________________________________________________________________________

Your connection should then look like this:

Your OS -> VMWare -> Ubuntu -> VPN+Tor

___________________________________________________________________________________________________________________________________

#7 - Buy yourself a RDP Server From

#8 - Install Remmina RDP client on the virtual machine

#9 - Use Remmina to open a "Remote Desktop" connection to your RDP server

___________________________________________________________________________________________________________________________________

Your connection should then look like this:

Your OS -> VMWare -> Ubuntu -> VPN+Tor -> Hacked RDP Server

___________________________________________________________________________________________________________________________________

#10 - Download Socks Proxy Checker and firefox to the RDP Server,

then install the plugin

#11 - Buy a socks5 proxy server from premsocks.com or alternative provider,

in your victims city there 911.re good too

#12 - Connect to the Socks5 Server with Socks Proxy Checker

Note: Always check your location with an ip to location service.

___________________________________________________________________________________________________________________________________

Your connection should then look like this:

Your OS -> VMWare -> Ubuntu -> VPN+Tor -> RDP Server -> Socks5 Proxy (victims location)

Now you eady to can use the cards and making safe carding

Comments (6)
/u/fredzones · 1 votes · 2 weeks ago · Link

Great explanation.

/u/depton004 · 1 votes · 2 weeks ago · Link

Pls can u give me legit sites to get good cards and carding tutorial

/u/khall_d · 1 votes · 2 weeks ago · Link

911 is down it's been a while i heard. I used it it's been a while like 8 to 1 year ago. Is it back ?

/u/Fullerpark · 1 votes · 1 week ago · Link

Faceless.cc

/u/Jordan54213 · 1 votes · 1 week ago · Link

Should i still use VM for paypal logs ? i've heard that paypal could detect if you use VM

/u/wijfwef · 1 votes · 1 week ago · Link

This is a good explanation where OpSec is taken into account.

Most in carding are lazy and won't do this, risking chances because they believe what there chopping is not an ammount that brings attention.

Don't take your OpSec lightly.

Though even though carding is just charging someones card, It take more than just sourcing cards with balance on it, requires social engineering and cash out methods.