Go to above site, enter BIN and Click on Findβ¦ You will get result like bellow β¦
Paste image from pdf
Now we can calculate few things from above info.. approx balance, is this bin non vbv or vbv , Bank phone no. from googleβ¦ etc. etc.I will explain later how to check cc balance with Skype methodβ¦
Let us know What is VBV/ NON-VBV/ MSC
VBV(Verified by Visa)
Extra verification process initially added by visa, there are different types of authentication used, most notably would be a password, date of birth, social security number, or mothers maiden name. Will send OTP t
o CC owner mobile No. or need secret Password when doing transaction in any process.
NON VBV(Verified by Visa)
Easy to use. No need of more info about CC like DOB, SSN, MMN. Also no need OTP when doing transaction.
MSC (Mastercard Secure Code)
As same as VBV We always buy NON VBV CC for carding. Cause the shopping site is VBV or NON VBV we donβt care, we have NON VBV CC. So no OTP, no AVS, no need SSN etc. NON VBV is not verifired by visa card, you can buy anything with non vbv cards without going through 3rd verification process. How to Buy NON VBV CC will explain later..
AVS β (Address Verification System)
A system used to verify the identity of the person claiming to own the credit card. The system will check the billing address of the credit card provided by the user with the address on file at the credit card company. This was an attempt to help identity theft and fraud over the internet. This is a system we as carders dont have to worry about since we have the billing address of the credit card holder. I mentioned it since it is good to be aware of it and that almost every site has this system. It emplifies the importance of typing in the address correctly.
I think u all know enough to do your first cardingβ¦ So go to main part β¦
Before starting gather your all equipments:
Credit Card, Socks5 matching with CC owner address, CCleaner Software, MAC address changer software, High Speed internet
You can buy socks from www.vip72.com . Check socks for live or not with socksproxy checker app before set it in Firefox.
How to set socks in Mozilla Firefox:
Run firefoxβ Go to Optionsβ β click on Advanced setting β Network
Now the screen will pop up with various options like : 1. No proxy; 2.Auto Detect; 3.Use system proxy; 4. Manual proxy configuration. You mark 4. Manual proxy configuration. Now type in socks host IP you have,
For example Socks Host: 141.0.8.24 Port: 1080
Press ok and restart firefox. Now you are connected to secure socks5..
When you buy SOCKS, it should always match with card holder address.
Ex. If CC holder from Newberry, South Calorina, MA, USA then you also buy socks with same address. Atleast matching State, Countryβ¦
How to card :
1. Make a email (gmail, hotmail ) with CC matching name. For example If CC name is Peter Mortan then make like petermortan1990@gmail.com
2. Run Remote Desktop Connection and connect with your RDP Host. If u donβt use rdp then do the following steps in your pc..
3. Run MAC address changer, change all MAC address.
4. Run CCleaner. Analyze and clean.
5. Set socks5 in Mozzila firefox. I already explain how to do it..
6. Restart Firefox and goto www.check2ip.com and check your ip is blacklisted or not & as same as CC holder address.
7. Now open shopping site. I want to recommend a website shop from your country. Why? Because you dont need to wait a lot for your package
8. Register with credit card holder information, name, country, city, address, and email you made one just for this order.
9. Choose your item & add to cart. Never choose big amount first.
Try to card small amount item first within $500.
10. In shipping address enter your address or your drop address, where you want to deliver product.
11.Go to payment page, choose Credit Card as payment method
12.Enter your CC details. Like CC Number, CC holder name, CVV/CVV, Exp. Date. Donβt copy β paste info. Type it one by one. Cause most site have copy-paste detector script..
Paste image from pdf
Now we can calculate few things from above info.. approx balance, is this bin non vbv or vbv , Bank phone no. from googleβ¦ etc. etc.I will explain later how to check cc balance with Skype methodβ¦
Let us know What is VBV/ NON-VBV/ MSC
VBV(Verified by Visa)
Extra verification process initially added by visa, there are different types of authentication used, most notably would be a password, date of birth, social security number, or mothers maiden name. Will send OTP t
o CC owner mobile No. or need secret Password when doing transaction in any process.
NON VBV(Verified by Visa)
Easy to use. No need of more info about CC like DOB, SSN, MMN. Also no need OTP when doing transaction.
MSC (Mastercard Secure Code)
As same as VBV We always buy NON VBV CC for carding. Cause the shopping site is VBV or NON VBV we donβt care, we have NON VBV CC. So no OTP, no AVS, no need SSN etc. NON VBV is not verifired by visa card, you can buy anything with non vbv cards without going through 3rd verification process. How to Buy NON VBV CC will explain later..
AVS β (Address Verification System)
A system used to verify the identity of the person claiming to own the credit card. The system will check the billing address of the credit card provided by the user with the address on file at the credit card company. This was an attempt to help identity theft and fraud over the internet. This is a system we as carders dont have to worry about since we have the billing address of the credit card holder. I mentioned it since it is good to be aware of it and that almost every site has this system. It emplifies the importance of typing in the address correctly.
I think u all know enough to do your first cardingβ¦ So go to main part β¦
Before starting gather your all equipments:
Credit Card, Socks5 matching with CC owner address, CCleaner Software, MAC address changer software, High Speed internet
You can buy socks from www.vip72.com . Check socks for live or not with socksproxy checker app before set it in Firefox.
How to set socks in Mozilla Firefox:
Run firefoxβ Go to Optionsβ β click on Advanced setting β Network
Now the screen will pop up with various options like : 1. No proxy; 2.Auto Detect; 3.Use system proxy; 4. Manual proxy configuration. You mark 4. Manual proxy configuration. Now type in socks host IP you have,
For example Socks Host: 141.0.8.24 Port: 1080
Press ok and restart firefox. Now you are connected to secure socks5..
When you buy SOCKS, it should always match with card holder address.
Ex. If CC holder from Newberry, South Calorina, MA, USA then you also buy socks with same address. Atleast matching State, Countryβ¦
How to card :
1. Make a email (gmail, hotmail ) with CC matching name. For example If CC name is Peter Mortan then make like petermortan1990@gmail.com
2. Run Remote Desktop Connection and connect with your RDP Host. If u donβt use rdp then do the following steps in your pc..
3. Run MAC address changer, change all MAC address.
4. Run CCleaner. Analyze and clean.
5. Set socks5 in Mozzila firefox. I already explain how to do it..
6. Restart Firefox and goto www.check2ip.com and check your ip is blacklisted or not & as same as CC holder address.
7. Now open shopping site. I want to recommend a website shop from your country. Why? Because you dont need to wait a lot for your package
8. Register with credit card holder information, name, country, city, address, and email you made one just for this order.
9. Choose your item & add to cart. Never choose big amount first.
Try to card small amount item first within $500.
10. In shipping address enter your address or your drop address, where you want to deliver product.
11.Go to payment page, choose Credit Card as payment method
12.Enter your CC details. Like CC Number, CC holder name, CVV/CVV, Exp. Date. Donβt copy β paste info. Type it one by one. Cause most site have copy-paste detector script..
13. In Billing address enter CC holder address. Now proceed to payment.
14. I am sure if you do everything right then order will be successfully placed..
15. Wait for order to arrive to your shipping address. When they arrive the corier boy will call you. The ask for any ID card. If you can make fake ID card then good. Otherwise show your any ID card (Adhar Card, Voter ID, College ID card)
How to Card From Mobile:
Though I donβt prefer carding from mobile. But if you follow belowsteps carefully then you can do that.
Basic reqirements for carding from Mobile :
1. Mobile must be rooted. (offcourse I pref
er any Android smartphone)
2. You must install few apps : IMEI changer, Phone ID changer, Android ID changer, Proxy Droid, CCleaner
3. You can use HMA VPN for carding in mobile.
4. You use SOCK5 proxy with Proxy Droid apps.
5. You must change IMEI, Android ID etc evrything before starting carding.
6. Now connect proxy droid with SOCKS5 proxy and connect it.
7. Now follow all steps of carding that mentioned aboveβ¦
Ok, so you got your cc, your drop and try to be anonymous as you can make yourself.
Now, what sites are cardable?
-ANY AND ALL SITES ARE CARDABLE-
Why do I say that? because itβs true. Whatever your card, make sure that you have all your info prepared before carding it. If you donβt get success first time then you have to use other BIN CC and Others Method. Have used your brain & find different Logic for a different site. You may Kill 2-3 CC when trying any sites. But you will find out the working method for any site
OKβ¦.You know enough about CC. But donβt understand nothing.. Now let me clear all your doubt about acronyms and termsβ¦.
1. CC (Credit Card)
2. CCN (Credit Card Number) β Includes the number of the card and expiration date, no name or address.
3. CVV(Credit Verification Value) / (Card Security Code) / CVV2- The number on the back of the card used for verification purposes. 3 digit number for visa/mc and 4 digit for AMEX (American Express) (There is also CVV1 which is a verification number that is written into the magstripe on the back of the card that is read when the card is swiped)
4. Dropβ an address where you can send carded goods, not your own house or friend or relatives.
5. SSN (Social Security Number) β one of the details of CC holder, used to bypass security measures
6. MMN (Mothers Maiden Name) β Comes in handy when bypassing security measures on VBV/MCSC. One of your security question.
7. DOB β Date of Birth β Used to bypass some security measures.
8. COB (Change of Billing) β Some stores will only ship large/high priced items if the shipping and billing info match, these can be obtained through some cvv sellers, usually in the form of a βFullsβ
9. Fulls βYou listen many times βFulls/ Fullzβ. It is nothing but CC Details with more info eg. security question answers, SSN, DOB, MMN, etc. which can be used for COB, etc.
10. AVS (Address Verification Service) β System that checks the billing address entered against the credit card companyβs records.
11. VBV (Verified by Visa) β Extra verification process initially added by visa, there are different types of authentication used, most notably would be a password, date of birth, social security number, or mothers maiden name.
12. MCSC (MasterCard SecureCode) β MC (MasterCard) adopted this process after VBV came out, basically the same thing but with mastercards.
13. POS (Point of Sale) β Terminal at a physical shop where the card is swiped/read
14. Dump β The information that is written onto the magnetic stripe on the back of the card, the only way to get dump is with a skimmer, comes in different βtracksβ which I will not be explaining β a dump would look like
4131980030032319=11101010000000006460
15. Skimmer β A device that is normally attached to an atm where you insert your card, which records your card information (there are other variants, that is the most common)
14. I am sure if you do everything right then order will be successfully placed..
15. Wait for order to arrive to your shipping address. When they arrive the corier boy will call you. The ask for any ID card. If you can make fake ID card then good. Otherwise show your any ID card (Adhar Card, Voter ID, College ID card)
How to Card From Mobile:
Though I donβt prefer carding from mobile. But if you follow belowsteps carefully then you can do that.
Basic reqirements for carding from Mobile :
1. Mobile must be rooted. (offcourse I pref
er any Android smartphone)
2. You must install few apps : IMEI changer, Phone ID changer, Android ID changer, Proxy Droid, CCleaner
3. You can use HMA VPN for carding in mobile.
4. You use SOCK5 proxy with Proxy Droid apps.
5. You must change IMEI, Android ID etc evrything before starting carding.
6. Now connect proxy droid with SOCKS5 proxy and connect it.
7. Now follow all steps of carding that mentioned aboveβ¦
Ok, so you got your cc, your drop and try to be anonymous as you can make yourself.
Now, what sites are cardable?
-ANY AND ALL SITES ARE CARDABLE-
Why do I say that? because itβs true. Whatever your card, make sure that you have all your info prepared before carding it. If you donβt get success first time then you have to use other BIN CC and Others Method. Have used your brain & find different Logic for a different site. You may Kill 2-3 CC when trying any sites. But you will find out the working method for any site
OKβ¦.You know enough about CC. But donβt understand nothing.. Now let me clear all your doubt about acronyms and termsβ¦.
1. CC (Credit Card)
2. CCN (Credit Card Number) β Includes the number of the card and expiration date, no name or address.
3. CVV(Credit Verification Value) / (Card Security Code) / CVV2- The number on the back of the card used for verification purposes. 3 digit number for visa/mc and 4 digit for AMEX (American Express) (There is also CVV1 which is a verification number that is written into the magstripe on the back of the card that is read when the card is swiped)
4. Dropβ an address where you can send carded goods, not your own house or friend or relatives.
5. SSN (Social Security Number) β one of the details of CC holder, used to bypass security measures
6. MMN (Mothers Maiden Name) β Comes in handy when bypassing security measures on VBV/MCSC. One of your security question.
7. DOB β Date of Birth β Used to bypass some security measures.
8. COB (Change of Billing) β Some stores will only ship large/high priced items if the shipping and billing info match, these can be obtained through some cvv sellers, usually in the form of a βFullsβ
9. Fulls βYou listen many times βFulls/ Fullzβ. It is nothing but CC Details with more info eg. security question answers, SSN, DOB, MMN, etc. which can be used for COB, etc.
10. AVS (Address Verification Service) β System that checks the billing address entered against the credit card companyβs records.
11. VBV (Verified by Visa) β Extra verification process initially added by visa, there are different types of authentication used, most notably would be a password, date of birth, social security number, or mothers maiden name.
12. MCSC (MasterCard SecureCode) β MC (MasterCard) adopted this process after VBV came out, basically the same thing but with mastercards.
13. POS (Point of Sale) β Terminal at a physical shop where the card is swiped/read
14. Dump β The information that is written onto the magnetic stripe on the back of the card, the only way to get dump is with a skimmer, comes in different βtracksβ which I will not be explaining β a dump would look like
4131980030032319=11101010000000006460
15. Skimmer β A device that is normally attached to an atm where you insert your card, which records your card information (there are other variants, that is the most common)
16. Embosser β A device that βstampsβ the cards to produce the raised lettering
17. Tipper β A device that adds the gold/silver accents to the embossed characters
18. MSR (Magnetic Stripe Reader/Writer) Used in the carding scene for writing dumps (and drivers license, student ID) info to blank cards or gift cards (if you want to use blank white cards, you will need a printer for the card template, embosser/tipper also, which can get costly to buy)
19. BIN (Bank Identification Number) β The first 6 digits of a card number (this will be gone over in more detail later on)
20. Novs (Novelty ID / Fake ID) β Commonly used for signing at drops, store pickups, WU Drops, Bank Drops, etc.
21. VPN (Virtual Privat
e Network ) β This will change your IP to wherever the location is of the VPN server. This is used with an application rather than through your browser as with socks. Watch out as some VPN providers will keep logs. But it leaks our DNS info so it is not safe
22. BTC (Bitcoin) β It is a digital currency. Used for buying anything in the digital world. You need it to buy CC, SOCKS, VPN etc and even you can exchange your local currency (INR/Dollar etc) to BTC. You can create wallet here www.blockchain.com
Few things you must remember before starting Carding:
Security to me is a key aspect of carding. However, an important thing to note is that IF THEY WANT TO GET YOU THAT BADLY; THEN THEY WILL NO MATTER WHAT.
Here are a few key security aspects you should take into consideration before getting started:
β When you have a CC, the next step is to get a socks5 in either the same city and state as the cardholder or as close to it as you can find. You must use socks.
β I personally use Firefox since it is stable, easy to use, you can load many unique and helpful plugins (tamper data, sniffers, etc).
β Many carders get sloppy over time and will neglect to clear history, or instead of shutting down their computer just put it to sleep so they donβt have to wait for it to decrypt, etc. Moral here? DONβT BE A LAZY!
β Emails β I personally use a new email for every site I card. Either Gmail or Yahoo works well for me.
How to know what is brand of CC at a glance:
If CCN (Credit Card Number) start with 3 then it is American Express (AMEX), if it starts with 4 then it is Visa, if it starts with 5 then itβs Mastercardβ¦With VBV CC, most notably would be a password, date of birth, social security number, or mothers maiden name.
**In order to get by VBV you need the password, if you want to reset the password then you will need the DOB (date of birth), MMN (mothers maiden name), and SSN (social security number). So I personally prefer always By NON-VBV Credit Card
How to check CC Is Live or Dead:
There are so many websites that check CC live or dead. At the time of checking they charge CC $0.001. But almost 80% site kill the CC. So we never use it. There also few tools available on the internet for checking CC. It may be Backdoor/ Trojan. So donβt use itβ¦..
There is no easy method for that. Carder makes there own way to do that. One of them is β¦ Go to any porn website. Buy the membership and use your CC. If you got success then CC is Live. You must follow carding rule. Like using socks, rdp bla.. blah.
Search youtube for find latest method. Or google it βHow to check CC is live or Deadβ. You will get so many latest method.
How to check CC Balance (Skype Method):
This method only working for US & UK CC only
1. Check your BIN in www.binspro.com There you will get bank name. For above example, BIN (430587) bank is Capital One, USA.
2. Now search phone number of this bank in google. For Capital One itβs +1-800-935-9935
3. Call this number from skype itβs free since itβs toll-free number.
4. Now the automatic robot will ask you few details. Ex. CCN, CVV etc.
5. Now put your info by using your keyboard.
6. It will automatically tell you the CC balance.
WRITTEN BY uNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
17. Tipper β A device that adds the gold/silver accents to the embossed characters
18. MSR (Magnetic Stripe Reader/Writer) Used in the carding scene for writing dumps (and drivers license, student ID) info to blank cards or gift cards (if you want to use blank white cards, you will need a printer for the card template, embosser/tipper also, which can get costly to buy)
19. BIN (Bank Identification Number) β The first 6 digits of a card number (this will be gone over in more detail later on)
20. Novs (Novelty ID / Fake ID) β Commonly used for signing at drops, store pickups, WU Drops, Bank Drops, etc.
21. VPN (Virtual Privat
e Network ) β This will change your IP to wherever the location is of the VPN server. This is used with an application rather than through your browser as with socks. Watch out as some VPN providers will keep logs. But it leaks our DNS info so it is not safe
22. BTC (Bitcoin) β It is a digital currency. Used for buying anything in the digital world. You need it to buy CC, SOCKS, VPN etc and even you can exchange your local currency (INR/Dollar etc) to BTC. You can create wallet here www.blockchain.com
Few things you must remember before starting Carding:
Security to me is a key aspect of carding. However, an important thing to note is that IF THEY WANT TO GET YOU THAT BADLY; THEN THEY WILL NO MATTER WHAT.
Here are a few key security aspects you should take into consideration before getting started:
β When you have a CC, the next step is to get a socks5 in either the same city and state as the cardholder or as close to it as you can find. You must use socks.
β I personally use Firefox since it is stable, easy to use, you can load many unique and helpful plugins (tamper data, sniffers, etc).
β Many carders get sloppy over time and will neglect to clear history, or instead of shutting down their computer just put it to sleep so they donβt have to wait for it to decrypt, etc. Moral here? DONβT BE A LAZY!
β Emails β I personally use a new email for every site I card. Either Gmail or Yahoo works well for me.
How to know what is brand of CC at a glance:
If CCN (Credit Card Number) start with 3 then it is American Express (AMEX), if it starts with 4 then it is Visa, if it starts with 5 then itβs Mastercardβ¦With VBV CC, most notably would be a password, date of birth, social security number, or mothers maiden name.
**In order to get by VBV you need the password, if you want to reset the password then you will need the DOB (date of birth), MMN (mothers maiden name), and SSN (social security number). So I personally prefer always By NON-VBV Credit Card
How to check CC Is Live or Dead:
There are so many websites that check CC live or dead. At the time of checking they charge CC $0.001. But almost 80% site kill the CC. So we never use it. There also few tools available on the internet for checking CC. It may be Backdoor/ Trojan. So donβt use itβ¦..
There is no easy method for that. Carder makes there own way to do that. One of them is β¦ Go to any porn website. Buy the membership and use your CC. If you got success then CC is Live. You must follow carding rule. Like using socks, rdp bla.. blah.
Search youtube for find latest method. Or google it βHow to check CC is live or Deadβ. You will get so many latest method.
How to check CC Balance (Skype Method):
This method only working for US & UK CC only
1. Check your BIN in www.binspro.com There you will get bank name. For above example, BIN (430587) bank is Capital One, USA.
2. Now search phone number of this bank in google. For Capital One itβs +1-800-935-9935
3. Call this number from skype itβs free since itβs toll-free number.
4. Now the automatic robot will ask you few details. Ex. CCN, CVV etc.
5. Now put your info by using your keyboard.
6. It will automatically tell you the CC balance.
WRITTEN BY uNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦NEW BINS LIST
> Bin Spotify 3 Months
Bin: 549627
ip: usa
Change country ph
BIN AMAZON PRIME VIDEO
497410702895xxxx
EXPIRY: rnd/2021
IP : France
ADDRESS: 48 bis Rue de Rivoli
City: Paris
State: Paris
ZIP: 75004
TELF: 33755xxxxxx
Send Screenshot in @Undercode_Testing
Bin Youtube Premium
553890259657xxxx
553890259638xxxx
553890259687xxxx
553890259538xxxx
553890259506xxxx
IP: India
Send Screenshot in @Undercode_Testing
CCnum:: 372765756775001
Cvv: 0815
Expm: 09
Expy: 23
Fname: Laurie
Lname: Murchison
Address: 305 Love Lane
City: WALL
State: NJ
Zip: 07719
Country: USA
Phone: 7329390707
CCnum:: 379654781301004
Cvv: 4745
Expm: 01
Expy: 22
Fname: Green
Lname: Cove
Address: 2200 Eller Dr. PO Box 13038
City: FORT LAUDERDALE
State: FL
Zip: 33316
Country: USA
Phone: 954-523-2200
CCnum:: 5178059822751047
Cvv: 179
Expm: 06
Expy: 22
Fname: Matthew
Lname: Flores
Address: 622 SE Washington Ave
City: CHEHALIS
State: WA
Zip: 98532
Country: USA
Phone: 2068511240
CCnum:: 4549516617390948
Cvv: 157
Expm: 05
Expy: 24Fname: Susana
Lname: Garca
Address: 330 Calle Santa Ines
City: ARECIBO
State:
Zip: 00612
Country: PUERTO RICO
Phone: 17879754789
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦NEW BINS LIST
> Bin Spotify 3 Months
Bin: 549627
ip: usa
Change country ph
BIN AMAZON PRIME VIDEO
497410702895xxxx
EXPIRY: rnd/2021
IP : France
ADDRESS: 48 bis Rue de Rivoli
City: Paris
State: Paris
ZIP: 75004
TELF: 33755xxxxxx
Send Screenshot in @Undercode_Testing
Bin Youtube Premium
553890259657xxxx
553890259638xxxx
553890259687xxxx
553890259538xxxx
553890259506xxxx
IP: India
Send Screenshot in @Undercode_Testing
CCnum:: 372765756775001
Cvv: 0815
Expm: 09
Expy: 23
Fname: Laurie
Lname: Murchison
Address: 305 Love Lane
City: WALL
State: NJ
Zip: 07719
Country: USA
Phone: 7329390707
CCnum:: 379654781301004
Cvv: 4745
Expm: 01
Expy: 22
Fname: Green
Lname: Cove
Address: 2200 Eller Dr. PO Box 13038
City: FORT LAUDERDALE
State: FL
Zip: 33316
Country: USA
Phone: 954-523-2200
CCnum:: 5178059822751047
Cvv: 179
Expm: 06
Expy: 22
Fname: Matthew
Lname: Flores
Address: 622 SE Washington Ave
City: CHEHALIS
State: WA
Zip: 98532
Country: USA
Phone: 2068511240
CCnum:: 4549516617390948
Cvv: 157
Expm: 05
Expy: 24Fname: Susana
Lname: Garca
Address: 330 Calle Santa Ines
City: ARECIBO
State:
Zip: 00612
Country: PUERTO RICO
Phone: 17879754789
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦hack like expert -Wapiti is a free open-source command-line based vulnerability scanner written in Python. While itβs not the most popular tool in this field, it does a good job of finding security flaws in many web applications.
t.me/undercodeTesting
π¦Using Wapiti can help you to discover security holes including:
F E A T U R E S :
XSS attacks
SQL injections
XPath injections
XXE injections
CRLF injections
Server side request forgery
Other features include:
Runs in verbose mode
Ability to pause and resume scans.
Highlights vulnerabilities found inside the terminal
Generates reports and export into HTML, XML, JSON and TXT
Activates and deactivates multiple attack modules
Removes parameters from certain URLs
Excludes URLs during an attack
Bypasses SSL certificate verification
URL extractor from javascript
Timeout configuration for large scans
Sets custom user-agent and HTTP headers
π¦πβπππΈπππππΈπππβ & βπβ :
> clone https://github.com/IFGHou/wapiti
> go dir
> run :
Installation on Unix-like systems
=================================
If you really want to install Wapiti on your system, launch the setup.py script with the following command :
python setup.py install
It will copy the wapiti libraries (wapitiCore) in your Python installation and place the executables in a "bin" system
directory (eg: /usr/local/bin).
Using Wapiti on Windows systems
===============================
If you don't want to install all the requirements to use Wapiti on Windows you should look for a standalone package
made with py2exe (see the available downloads on SourceForge).
Then, just download and extract the zip archive and launch wapiti.exe from the Windows command line.
Installing Wapiti requirements on Windows
=========================================
You can't install Wapiti on a Windows system but if (for some reasons) you really want to install all the
requirements then :
* Download a Python 2.7.5 (or more recent) installer for your platform from http://python.org/download/
* Install it and change the PATH environment variable to append the Python path
* Download a requests archive from http://docs.python-requests.org/en/latest/user/install/
* Extract the archive and call the setup.py script from the archive with "python setup.py install"
* Download BeautifulSoup 3 from http://www.crummy.com/software/BeautifulSoup/
* Extract the archive and call the setup.py script from the archive with "python setup.py install"
E N J O Y
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦hack like expert -Wapiti is a free open-source command-line based vulnerability scanner written in Python. While itβs not the most popular tool in this field, it does a good job of finding security flaws in many web applications.
t.me/undercodeTesting
π¦Using Wapiti can help you to discover security holes including:
F E A T U R E S :
XSS attacks
SQL injections
XPath injections
XXE injections
CRLF injections
Server side request forgery
Other features include:
Runs in verbose mode
Ability to pause and resume scans.
Highlights vulnerabilities found inside the terminal
Generates reports and export into HTML, XML, JSON and TXT
Activates and deactivates multiple attack modules
Removes parameters from certain URLs
Excludes URLs during an attack
Bypasses SSL certificate verification
URL extractor from javascript
Timeout configuration for large scans
Sets custom user-agent and HTTP headers
π¦πβπππΈπππππΈπππβ & βπβ :
> clone https://github.com/IFGHou/wapiti
> go dir
> run :
Installation on Unix-like systems
=================================
If you really want to install Wapiti on your system, launch the setup.py script with the following command :
python setup.py install
It will copy the wapiti libraries (wapitiCore) in your Python installation and place the executables in a "bin" system
directory (eg: /usr/local/bin).
Using Wapiti on Windows systems
===============================
If you don't want to install all the requirements to use Wapiti on Windows you should look for a standalone package
made with py2exe (see the available downloads on SourceForge).
Then, just download and extract the zip archive and launch wapiti.exe from the Windows command line.
Installing Wapiti requirements on Windows
=========================================
You can't install Wapiti on a Windows system but if (for some reasons) you really want to install all the
requirements then :
* Download a Python 2.7.5 (or more recent) installer for your platform from http://python.org/download/
* Install it and change the PATH environment variable to append the Python path
* Download a requests archive from http://docs.python-requests.org/en/latest/user/install/
* Extract the archive and call the setup.py script from the archive with "python setup.py install"
* Download BeautifulSoup 3 from http://www.crummy.com/software/BeautifulSoup/
* Extract the archive and call the setup.py script from the archive with "python setup.py install"
E N J O Y
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ CARDING FOR BEGINERS :
1) CC - Cardboard
These terms mean information about the credit card or the credit card itself.
Cardboard example:
4916478867239017 | 6/2014 | 370 | Elizabeth Hutton | 3071 Joanne Lane | Lexington | MA | 2173 | COLOMBIA | 12-26-4682 || 6/30/1988 |
4916478867239017 - credit card number.
6/2014 is an expiration date or in translation: card expiration date.
370 - CVV2 or card security code.
Elizabeth Hutton - first and last name of the card holder.
3071 Joanne Lane - cardholderβs street of residence.
Lexington is a cardholder city. (cardholder - cardholder)
MA - state of the owner of the credit card .
2173 - zip cod, postal cod or postal code of the card holder.
COLOMBIA - country of residence of the cardholder.
12-26-4682 - the phone number of the owner.
6/30/1988 - year of birth of the cardholder.
2) This ss is written in a convenient form and everything is clear on it, but the seller of the material can give ss in a bad format without separation, so I advise you to check with the sellers in what format they sell ss before buying.
3) You need to know one thing to easily distinguish cardboard.
Remember:
if the card number starts at 4 - this is VISA, if the card number starts at 3 - this is American expres, if the card number starts at 5 - this is MASTERCARD.
Possessing even this little information can be done by driving into Skype, Steam, online stores, etc.
π¦ Add. Information:
1. The balance on a regular ss is never known. (there are special checkers, but there are only a few, and most usually kill a card in 90%)
2. The security code for MASTERCARD and VISA consists of three digits, for American expres of 4.
3. For MASTERCARD and VISA, the card number consists of 16 digits, for American expres of 15.
4. Not all ss staff can be written completely, very often it is marked with two letters, examples: IA, AR, DE, etc. - to find out the state, I gave at the end of the article a table for deciphering the names of the states.
You can also come across things like full ss or enrol. Now I will tell you what it is.
Full cc is a card with additional information such as:
SSN - Social Security number in translation is the cardholder insurance number
DOB - date of birth - date of birth of the cardholder
MMN - mother's maiden name or mother's maiden name
4) There may also be soap, a phone number and the bank that issued the credit card. But all this data is sometimes found on ordinary maps.
The main goodies are SSN and DOB. Full ss needs to make enrol, i.e. create an account in a bank. For this, additional information about SSN and DOB is needed.
Cards are usually rolled in order to find out the card balance and gain access to change billing addresses. And now what is all this for?
about balance I think everything is clear, here about billing - I think not everyone and even more it is not clear why it should be changed at all. So, billing address is the address of the card holder. The fact is that when registering in the online store there are two such concepts as Billing adress (owner address) and shipping adress (delivery address). If they differ, then the order is checked more thoroughly in the case when they coincide (the goods will be sent within 2 hours)
Thus, for example: we have a usa shop and a usa ss, as well as a drop in the usa, we make a video change the billing address of the cardholder to the drop address and then order goods at a billing address and everything is ok. But in reality, of course, not everything is so simple. Itβs not so easy to change the billing address, but at least you have to accept the dialer and have the MMN info - and thatβs at least. So draw conclusions)) Well, generally we will not bother with enrols, this is just for general development.
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ CARDING FOR BEGINERS :
1) CC - Cardboard
These terms mean information about the credit card or the credit card itself.
Cardboard example:
4916478867239017 | 6/2014 | 370 | Elizabeth Hutton | 3071 Joanne Lane | Lexington | MA | 2173 | COLOMBIA | 12-26-4682 || 6/30/1988 |
4916478867239017 - credit card number.
6/2014 is an expiration date or in translation: card expiration date.
370 - CVV2 or card security code.
Elizabeth Hutton - first and last name of the card holder.
3071 Joanne Lane - cardholderβs street of residence.
Lexington is a cardholder city. (cardholder - cardholder)
MA - state of the owner of the credit card .
2173 - zip cod, postal cod or postal code of the card holder.
COLOMBIA - country of residence of the cardholder.
12-26-4682 - the phone number of the owner.
6/30/1988 - year of birth of the cardholder.
2) This ss is written in a convenient form and everything is clear on it, but the seller of the material can give ss in a bad format without separation, so I advise you to check with the sellers in what format they sell ss before buying.
3) You need to know one thing to easily distinguish cardboard.
Remember:
if the card number starts at 4 - this is VISA, if the card number starts at 3 - this is American expres, if the card number starts at 5 - this is MASTERCARD.
Possessing even this little information can be done by driving into Skype, Steam, online stores, etc.
π¦ Add. Information:
1. The balance on a regular ss is never known. (there are special checkers, but there are only a few, and most usually kill a card in 90%)
2. The security code for MASTERCARD and VISA consists of three digits, for American expres of 4.
3. For MASTERCARD and VISA, the card number consists of 16 digits, for American expres of 15.
4. Not all ss staff can be written completely, very often it is marked with two letters, examples: IA, AR, DE, etc. - to find out the state, I gave at the end of the article a table for deciphering the names of the states.
You can also come across things like full ss or enrol. Now I will tell you what it is.
Full cc is a card with additional information such as:
SSN - Social Security number in translation is the cardholder insurance number
DOB - date of birth - date of birth of the cardholder
MMN - mother's maiden name or mother's maiden name
4) There may also be soap, a phone number and the bank that issued the credit card. But all this data is sometimes found on ordinary maps.
The main goodies are SSN and DOB. Full ss needs to make enrol, i.e. create an account in a bank. For this, additional information about SSN and DOB is needed.
Cards are usually rolled in order to find out the card balance and gain access to change billing addresses. And now what is all this for?
about balance I think everything is clear, here about billing - I think not everyone and even more it is not clear why it should be changed at all. So, billing address is the address of the card holder. The fact is that when registering in the online store there are two such concepts as Billing adress (owner address) and shipping adress (delivery address). If they differ, then the order is checked more thoroughly in the case when they coincide (the goods will be sent within 2 hours)
Thus, for example: we have a usa shop and a usa ss, as well as a drop in the usa, we make a video change the billing address of the cardholder to the drop address and then order goods at a billing address and everything is ok. But in reality, of course, not everything is so simple. Itβs not so easy to change the billing address, but at least you have to accept the dialer and have the MMN info - and thatβs at least. So draw conclusions)) Well, generally we will not bother with enrols, this is just for general development.
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Extra credit card protections:
t.me/UndercodeTesting
1) Every day, bank specialists work hard to make life difficult for carders. And then one day they came up with VBV - Verified by Visa.
2) The essence of the system is that when paying for goods or services on the Internet, you must enter an additional verification code, which the cardholder receives from the bank that issued the card. However, this does not solve the problem of payment security.
3) The problem is that the client cannot prohibit transactions that are not protected Verified by Visa. And even paying only in those online stores where Verified by Visa is used, the client can easily steal data (card number, owner name, expiration date, cvv2 code) sufficient to make legal payments on behalf of the client.
4) In short: VBV is an additional protection for visa cards (requires a password when paying) there are cards with and without VBV - some sellers check for VBV. If you bought from a seller who does not check for VBV and it turned out to be with VBV, then such a card can only be thrown out. Therefore, check with the sellers.
5) As you understand, VBV is an additional protection for visa cards. The master card has a similar protection called SECURITYCODE. Brand credit cards - American Express - have nothing of the kind!
6) That's probably all about carring today. In the next article on carring, I will write on the topic of drops, the search for retreating shops and the breakdown of additional information.
In the meantime, a small glossary of terms:
CC - credit card
information Fulka - great credit card information
Kartholder - the legal owner of the card.
Shop - online store.
Ship - the process of buying a product in an online store using the stolen credit card information.
Drop - the person on whom you do the spike of the staff or do the bay (bank transfer).
Seller - seller of the material necessary for the cardholder
Drive in - enter information about card when paying for the goods. (One of the rules for successful driving: you need to enter it and not copy it)
Staff - product
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Extra credit card protections:
t.me/UndercodeTesting
1) Every day, bank specialists work hard to make life difficult for carders. And then one day they came up with VBV - Verified by Visa.
2) The essence of the system is that when paying for goods or services on the Internet, you must enter an additional verification code, which the cardholder receives from the bank that issued the card. However, this does not solve the problem of payment security.
3) The problem is that the client cannot prohibit transactions that are not protected Verified by Visa. And even paying only in those online stores where Verified by Visa is used, the client can easily steal data (card number, owner name, expiration date, cvv2 code) sufficient to make legal payments on behalf of the client.
4) In short: VBV is an additional protection for visa cards (requires a password when paying) there are cards with and without VBV - some sellers check for VBV. If you bought from a seller who does not check for VBV and it turned out to be with VBV, then such a card can only be thrown out. Therefore, check with the sellers.
5) As you understand, VBV is an additional protection for visa cards. The master card has a similar protection called SECURITYCODE. Brand credit cards - American Express - have nothing of the kind!
6) That's probably all about carring today. In the next article on carring, I will write on the topic of drops, the search for retreating shops and the breakdown of additional information.
In the meantime, a small glossary of terms:
CC - credit card
information Fulka - great credit card information
Kartholder - the legal owner of the card.
Shop - online store.
Ship - the process of buying a product in an online store using the stolen credit card information.
Drop - the person on whom you do the spike of the staff or do the bay (bank transfer).
Seller - seller of the material necessary for the cardholder
Drive in - enter information about card when paying for the goods. (One of the rules for successful driving: you need to enter it and not copy it)
Staff - product
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ DROPPING CARDING _BEGINERS :
Drops
π¦ To begin with, letβs define what a drop is:
1) Drop is a dummy who throws dirt at it. For example, a drop under a staf will accept goods hissed
in the store for someone else's credit card, and then it will send you a percentage. Drops are staf, cash out, bay,
receive SMS, etc. In general, wherever you want to shine, you can hire a drop.
2) Also, with the help of drops in
Europe, for example, or the USA, it is possible to solve problems with shops (in the clothing store) if you could not find a shop that sends
to Russia, but it sends for example to Germany, then a drop in Germany will solve the problem. Similarly, for receiving SMS well,
etc.
3) It should also be noted that if for bays and receiving SMS, drop should be in a certain country, then for
luggage can be taken drop in Raska and in the USA / Europe. But the probability that they will be sent to the USA / Europe
without problems is higher than the probability that they will be sent to Raska without problems.
4) Now I think itβs clear that in the luggage carrier they are looking
not so much for safety, but for a successful drive-in. Another important point about drops, they are of
two types:
adjustable;
non-adjustable.
Divorced people have no idea what violates the law, such drops often have problems.
Non-divorceable - a person knows that he is breaking the law and follows safety measures.
π¦ DROPPING CARDING _BEGINERS :
Drops
π¦ To begin with, letβs define what a drop is:
1) Drop is a dummy who throws dirt at it. For example, a drop under a staf will accept goods hissed
in the store for someone else's credit card, and then it will send you a percentage. Drops are staf, cash out, bay,
receive SMS, etc. In general, wherever you want to shine, you can hire a drop.
2) Also, with the help of drops in
Europe, for example, or the USA, it is possible to solve problems with shops (in the clothing store) if you could not find a shop that sends
to Russia, but it sends for example to Germany, then a drop in Germany will solve the problem. Similarly, for receiving SMS well,
etc.
3) It should also be noted that if for bays and receiving SMS, drop should be in a certain country, then for
luggage can be taken drop in Raska and in the USA / Europe. But the probability that they will be sent to the USA / Europe
without problems is higher than the probability that they will be sent to Raska without problems.
4) Now I think itβs clear that in the luggage carrier they are looking
not so much for safety, but for a successful drive-in. Another important point about drops, they are of
two types:
adjustable;
non-adjustable.
Divorced people have no idea what violates the law, such drops often have problems.
Non-divorceable - a person knows that he is breaking the law and follows safety measures.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ CARDING -BEGINERS _Where to find these drops?
1) Look for Carrion Forums at Dropovodov (be sure to look for people with a reputation). Dropouts are people who have a certain number of drops. When concluding a deal with a drop driver, specify what kind of drops he has, adjustable or not.
2) The second is the principle of the drops. There are different options for different types of drops. If everything is clear with the SMS receiver, you pay him, he receives SMS and everything is buzzing, then there are a lot of options with the thingie. For example, there are drop traders who pay for goods on a track or after sale, some who send for%, and some who take with a staff (for example, 2 phones of one brand hissed, he takes one and sends it to you).
3) You can search for drops yourself. For example, in the same forums, look for messages from people who are ready to work with drops, but I would not recommend this option to you since you are likely to be thrown.
4) You can search for drops, for example, on forums about additional earnings (naturally search in the country in which you need a drop).
π¦ Well, sort of sorted out, we move on.
Having broken through additional credit card information.
Why is this information actually needed? And what is she like?
Well, first you need to say that the more you know the better and calmer you work. In carding,
everything is really tied around information of various kinds.
So let's give a couple of new definitions:
Bank emitent - a bank that issued a card to which it belongs and which controls the card.
Bean - the first six digits of the card number, by which you can determine the following: bank emitet, card type, card level, card brand.
Information about the bin can be punched, for example, here: www.bindb.com
Having visited the site, you will immediately understand. There is one great button, Bin Search, which after entering the captcha will tell you everything =)
Example of outputting bin information:
Bin: 371740
Card Brand: AMEX
Issuing Bank: AMERICAN EXPRESS COMPANY US
Card Type: CREDIT
Card Level:
Iso Country Name: UNITED STATES
Iso Country A2: US
Iso Country A3: USA
Iso Country Number: 840
Bank's website: www.americanexpress.com/us/
Customer Care Line: 1-800-528-4800
Bank Address: ******** [?] Available on Ultimate Database
Formal Bank: ******* * [?] Available on Ultimate Database
Aditional Info: The
map is a little crooked but it's not scary, I'm sure you will see and try it yourself later.
Card Level in translation sounds like a card level. The fat content of the card depends on the level of the card, the higher the level, the more likely it is that the card is with a large balance.
Well, sort of figured it out too) Next!
Since I canβt describe the topic of bays and others, in this article I will describe the topic of searching for retreating shops (for a thing).
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ CARDING -BEGINERS _Where to find these drops?
1) Look for Carrion Forums at Dropovodov (be sure to look for people with a reputation). Dropouts are people who have a certain number of drops. When concluding a deal with a drop driver, specify what kind of drops he has, adjustable or not.
2) The second is the principle of the drops. There are different options for different types of drops. If everything is clear with the SMS receiver, you pay him, he receives SMS and everything is buzzing, then there are a lot of options with the thingie. For example, there are drop traders who pay for goods on a track or after sale, some who send for%, and some who take with a staff (for example, 2 phones of one brand hissed, he takes one and sends it to you).
3) You can search for drops yourself. For example, in the same forums, look for messages from people who are ready to work with drops, but I would not recommend this option to you since you are likely to be thrown.
4) You can search for drops, for example, on forums about additional earnings (naturally search in the country in which you need a drop).
π¦ Well, sort of sorted out, we move on.
Having broken through additional credit card information.
Why is this information actually needed? And what is she like?
Well, first you need to say that the more you know the better and calmer you work. In carding,
everything is really tied around information of various kinds.
So let's give a couple of new definitions:
Bank emitent - a bank that issued a card to which it belongs and which controls the card.
Bean - the first six digits of the card number, by which you can determine the following: bank emitet, card type, card level, card brand.
Information about the bin can be punched, for example, here: www.bindb.com
Having visited the site, you will immediately understand. There is one great button, Bin Search, which after entering the captcha will tell you everything =)
Example of outputting bin information:
Bin: 371740
Card Brand: AMEX
Issuing Bank: AMERICAN EXPRESS COMPANY US
Card Type: CREDIT
Card Level:
Iso Country Name: UNITED STATES
Iso Country A2: US
Iso Country A3: USA
Iso Country Number: 840
Bank's website: www.americanexpress.com/us/
Customer Care Line: 1-800-528-4800
Bank Address: ******** [?] Available on Ultimate Database
Formal Bank: ******* * [?] Available on Ultimate Database
Aditional Info: The
map is a little crooked but it's not scary, I'm sure you will see and try it yourself later.
Card Level in translation sounds like a card level. The fat content of the card depends on the level of the card, the higher the level, the more likely it is that the card is with a large balance.
Well, sort of figured it out too) Next!
Since I canβt describe the topic of bays and others, in this article I will describe the topic of searching for retreating shops (for a thing).
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Americanexpress
American Express Credit Cards, Rewards & Banking
American Express offers world-class Charge and Credit Cards, Gift Cards, Rewards, Travel, Personal Savings, Business Services, Insurance and more.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ CARDING-BEGINERS- Stores
1) Searching for shops comes down to working with Google.
2) Purpose: to find a shop that will be sent to Rush.
3) Necessary characteristics of shops:
Shop should support payment by credit card;
π¦ The shop should send to an arbitrary address (separate from Billing adress).
Sorry forgot about the definitions.
Billing address - Billing adress - address of the card holder.
Shipping address - Shiping adress - delivery address, i.e. your address or drop
back to the shopping characteristics.
The shop should be sent to the country we need (for example, Russia, Ukraine, well, etc.).
Is there a delivery method to the country we need (it often happens that Russia is on the list of countries, but there is no way to deliver there).
These are the necessary characteristics. If you find a store in which all these rules will be followed, you can do it by driving. You say that it is difficult to find so much information. Yes, youβre right, but if youβll pretend to drive it when you go to the
online storeβs website , select a product, register (you just invent all the data), and then go to the payment in your way, looking and defining all the rules described above, you will quickly determine this shop suits you or not.
π¦ In Google, look for shops for example like this:
Google into the .com zone;
A request of type intext: online store & intext: electronic;
We check them according to the rules described above.
Well, sort of and thank you all for your attention.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ CARDING-BEGINERS- Stores
1) Searching for shops comes down to working with Google.
2) Purpose: to find a shop that will be sent to Rush.
3) Necessary characteristics of shops:
Shop should support payment by credit card;
π¦ The shop should send to an arbitrary address (separate from Billing adress).
Sorry forgot about the definitions.
Billing address - Billing adress - address of the card holder.
Shipping address - Shiping adress - delivery address, i.e. your address or drop
back to the shopping characteristics.
The shop should be sent to the country we need (for example, Russia, Ukraine, well, etc.).
Is there a delivery method to the country we need (it often happens that Russia is on the list of countries, but there is no way to deliver there).
These are the necessary characteristics. If you find a store in which all these rules will be followed, you can do it by driving. You say that it is difficult to find so much information. Yes, youβre right, but if youβll pretend to drive it when you go to the
online storeβs website , select a product, register (you just invent all the data), and then go to the payment in your way, looking and defining all the rules described above, you will quickly determine this shop suits you or not.
π¦ In Google, look for shops for example like this:
Google into the .com zone;
A request of type intext: online store & intext: electronic;
We check them according to the rules described above.
Well, sort of and thank you all for your attention.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦HOW INSTALL ALL TERMUX DEPENCIES ?
x11-repo Termux repo for x11 packages pkg install x11-repo
vnc server For graphical output pkg install tigervnc
openbox wm Openbox Window Manager pkg install openbox obconf
xsetroot Set color background for X pkg install xorg-xsetroot
xterm X terminal pkg install xterm
xcompmgr Composite manager or desktop effects pkg install xcompmgr
xfsettingsd The settings daemon, to set themes & icons pkg install xfce4-settings
polybar Easy and fast status bar pkg install polybar libnl
st Suckless/Simple terminal pkg install st
geany Graphical text editor pkg install geany
thunar File manager (optional) pkg install thunar
pcmanfm File manager pkg install pcmanfm
rofi An application launcher pkg install rofi
feh Simple image viewer pkg install feh
neofetch System info program pkg install neofetch
git VCS, for cloning repos pkg install git
wget Command line downloader pkg install wget
curl To transfer/get internet data pkg install curl
zsh A very good shell pkg install zsh
vim Command line text editor (! - hard to exit :D) pkg install vim
htop System monitor (optional) pkg install htop
elinks Command line web browser (optional) pkg install elinks
mutt Command line mail client (optional) pkg install mutt
mc Command line file manager (optional) pkg install mc
ranger Command line file manager (optional) pkg install ranger
cmus Command line music player (optional) pkg install cmus
cava Console-based audio visualizer (optional) pkg install cava
pulseaudio Sound system & audio server (optional) pkg install pulseaudio
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦HOW INSTALL ALL TERMUX DEPENCIES ?
x11-repo Termux repo for x11 packages pkg install x11-repo
vnc server For graphical output pkg install tigervnc
openbox wm Openbox Window Manager pkg install openbox obconf
xsetroot Set color background for X pkg install xorg-xsetroot
xterm X terminal pkg install xterm
xcompmgr Composite manager or desktop effects pkg install xcompmgr
xfsettingsd The settings daemon, to set themes & icons pkg install xfce4-settings
polybar Easy and fast status bar pkg install polybar libnl
st Suckless/Simple terminal pkg install st
geany Graphical text editor pkg install geany
thunar File manager (optional) pkg install thunar
pcmanfm File manager pkg install pcmanfm
rofi An application launcher pkg install rofi
feh Simple image viewer pkg install feh
neofetch System info program pkg install neofetch
git VCS, for cloning repos pkg install git
wget Command line downloader pkg install wget
curl To transfer/get internet data pkg install curl
zsh A very good shell pkg install zsh
vim Command line text editor (! - hard to exit :D) pkg install vim
htop System monitor (optional) pkg install htop
elinks Command line web browser (optional) pkg install elinks
mutt Command line mail client (optional) pkg install mutt
mc Command line file manager (optional) pkg install mc
ranger Command line file manager (optional) pkg install ranger
cmus Command line music player (optional) pkg install cmus
cava Console-based audio visualizer (optional) pkg install cava
pulseaudio Sound system & audio server (optional) pkg install pulseaudio
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ HACKING TIPS :
> Knowing yourself and knowing each other, hacking technology is no longer mysterious
π¦ππΌπ'π πππΈβπ :
> Nowadays, there are very few hacking softwares that are continuously updated. The most famous and the most widely circulated are the "Ahra QQ thieves". At present, most of the QQ stolen incidents are caused by this software. of.
> The conditions of use of the software are very simple, as long as you have a mailbox that supports smtp sending letters or a web space that supports asp scripts. Moreover, the Trojan can automatically divide the stolen QQ numbers into two types: pretty and non-beautiful numbers, and send them to different mailboxes, which is one of the reasons why "Ala QQ thief" is so popular. Next, let us first understand the working principle in order to find a countermeasure against it.
1) Select the hacking mode
Download "Ala QQ Thief", after decompression there are two files: alaqq.exe, Love Forever, Love Babysitter qq.asp. Among them, alaqq.exe is the configuration program of "Ahra QQ thief". Love forever, love nanny qq.asp is the file to be used when using the "website reception" mode. Before formal use, its parameters need to be set.
> "Mailbox receiving" configuration: run alaqq.exe, the program configuration interface appears. In the "Sending Mode Selection" option, select "Receive Mail" and fill in the email address in "Receive Mail" (it is recommended to use the default 163.com NetEase email of the program). Here, take the mailbox n12345@163.com (password n_12345) as an example to introduce the configuration in the "mailbox receiving" mode, and conduct the following tests. In addition, different email addresses can be filled in the "Inbox (Pretty)" and "Inbox (General)" to accept QQ Liang and ordinary QQ numbers. Then select the smtp server corresponding to your mailbox in the drop-down box of "Sending Server", here is smtp.163.com. Finally, fill in the account number, password and full name of the mailbox.
> After setting, we can test whether the content is correct, click the "test mailbox" button below, the program will appear mailbox test status. If all the tested items show success, you can complete the mailbox information configuration.
> "Website Receiving" configuration: In addition to selecting the "Mailbox Receiving" mode, we can also select the "Website Receiving" mode to allow the stolen QQ numbers to be automatically uploaded to the designated website space. Of course, before use, some preparation work is also needed.
> Use FTP software to upload the space that supports eternal love and nanny qq.asp to the ASP script, run alaqq.exe, and enter the URL address of the eternal love and nanny qq.asp in the "Asp interface address". Then, when the Trojan intercepts After the QQ number information, it will be saved in the qq.txt file in the same directory of the love eternal, love nanny qq.asp.
2) Set additional Trojan parameters
Next, we make advanced settings. If you check "Close QQ after running", once the other party runs the Trojan generated by "Ala QQ Thief", QQ will automatically shut down after 60 seconds. When the other party logs into QQ again, their QQ number and password will be intercepted by the Trojan And send it to the mailbox or website space of the pirate. In addition, if you want the trojan to be used in an Internet cafe environment, you need to check "Automatically Restore Restore Wizard" so that the trojan can still run after the system restarts. Except these two items, the others can be kept as default.
3) Stealing QQ number information
π¦ HACKING TIPS :
> Knowing yourself and knowing each other, hacking technology is no longer mysterious
π¦ππΌπ'π πππΈβπ :
> Nowadays, there are very few hacking softwares that are continuously updated. The most famous and the most widely circulated are the "Ahra QQ thieves". At present, most of the QQ stolen incidents are caused by this software. of.
> The conditions of use of the software are very simple, as long as you have a mailbox that supports smtp sending letters or a web space that supports asp scripts. Moreover, the Trojan can automatically divide the stolen QQ numbers into two types: pretty and non-beautiful numbers, and send them to different mailboxes, which is one of the reasons why "Ala QQ thief" is so popular. Next, let us first understand the working principle in order to find a countermeasure against it.
1) Select the hacking mode
Download "Ala QQ Thief", after decompression there are two files: alaqq.exe, Love Forever, Love Babysitter qq.asp. Among them, alaqq.exe is the configuration program of "Ahra QQ thief". Love forever, love nanny qq.asp is the file to be used when using the "website reception" mode. Before formal use, its parameters need to be set.
> "Mailbox receiving" configuration: run alaqq.exe, the program configuration interface appears. In the "Sending Mode Selection" option, select "Receive Mail" and fill in the email address in "Receive Mail" (it is recommended to use the default 163.com NetEase email of the program). Here, take the mailbox n12345@163.com (password n_12345) as an example to introduce the configuration in the "mailbox receiving" mode, and conduct the following tests. In addition, different email addresses can be filled in the "Inbox (Pretty)" and "Inbox (General)" to accept QQ Liang and ordinary QQ numbers. Then select the smtp server corresponding to your mailbox in the drop-down box of "Sending Server", here is smtp.163.com. Finally, fill in the account number, password and full name of the mailbox.
> After setting, we can test whether the content is correct, click the "test mailbox" button below, the program will appear mailbox test status. If all the tested items show success, you can complete the mailbox information configuration.
> "Website Receiving" configuration: In addition to selecting the "Mailbox Receiving" mode, we can also select the "Website Receiving" mode to allow the stolen QQ numbers to be automatically uploaded to the designated website space. Of course, before use, some preparation work is also needed.
> Use FTP software to upload the space that supports eternal love and nanny qq.asp to the ASP script, run alaqq.exe, and enter the URL address of the eternal love and nanny qq.asp in the "Asp interface address". Then, when the Trojan intercepts After the QQ number information, it will be saved in the qq.txt file in the same directory of the love eternal, love nanny qq.asp.
2) Set additional Trojan parameters
Next, we make advanced settings. If you check "Close QQ after running", once the other party runs the Trojan generated by "Ala QQ Thief", QQ will automatically shut down after 60 seconds. When the other party logs into QQ again, their QQ number and password will be intercepted by the Trojan And send it to the mailbox or website space of the pirate. In addition, if you want the trojan to be used in an Internet cafe environment, you need to check "Automatically Restore Restore Wizard" so that the trojan can still run after the system restarts. Except these two items, the others can be kept as default.
3) Stealing QQ number information
After configuring "Ala QQ Thief", click "Generate Trojan" in the program interface to generate a Trojan horse program that can steal QQ numbers. We can disguise the program as an image, a mini-game, or bundle it with other software for dissemination. When someone runs the corresponding file, the Trojan will be hidden in the system. When there is a QQ login in the system, the Trojan will start working, intercept the relevant number and password, and send the information to the mailbox or Website space.
4) Practise smart eyes, so that Trojans have nowhere to escape in the system
Now that we have understood the general process of "Ala QQ Thief", how can we find "Ala QQ Thief" from the system? In general, if you encounter the following situations, you should be careful.
Β·> automatically closes.
Β· It disappears after running a program.
Β· The anti-virus software closes automatically after running a program.
Β· The browser is automatically closed when accessing the antivirus software website.
Β· If the anti-virus software has a mail monitoring function, a warning box will appear for the program to send mail.
Β· A network firewall (such as Skynet firewall) is installed, and NTdhcp.exe accesses the network warning.
π¦If one or more of the above conditions occur, the system may have been infected with "Ala QQ Thief". Of course, it is not terrible to be infected with a Trojan. We can also remove it from the system.
1) Kill the Trojan manually. After discovering that the system is infected with "Ala QQ Thief", we can manually remove it. "Ala QQ Thief" will generate a file named NTdhcp.exe in the system32 folder in the system directory after running, and add the Trojan key value in the startup item of the registry so that it can run every time the system starts Trojan. The first thing we need to do is to run the "task manager" and end the Trojan process "NTdhcp.exe". Then open the "folder options" in the Explorer, select the "View" tab, and uncheck the "Hide protected operating system files" option. Then enter the system32 folder in the system directory and delete the NTdhcp.exe file. Finally, enter the registry to delete the NTdhcp.exe key value, which is located at HKEY_LOCAL_MACHINE
\ Software \ Microsoft \ Windows \ Currentversion \ Run.
2) Uninstall the Trojan. Uninstalling "Ala QQ Thief" is very simple. Just download the configuration program of "Ala QQ Thief" and click the "Uninstall Program" button after running to completely remove the Trojan from the system.
3) Take retreat as the advance and give the hackers a fatal blow
After being busy for a long time, I finally cleared the "Ahra QQ thief" in the system. So, should we give him a lesson in the face of hateful hackers?
1. Take advantage of loopholes and switch from defense to attack
The so-called "attack" here is not to directly invade the computer of the pirate. I believe this "technical work" is not suitable for everyone. Here is just to start from the loopholes that almost exist in the hacking software, so as to teach the hackers a lesson.
So what is this loophole?
From the previous analysis of "Ala QQ Thief", you can see that the configuration part filled in the email account and password for receiving QQ number information emails, and the email account and password are all stored in the Trojan horse program in plain text. Therefore, we can find the email account and password of the thief from the generated Trojan horse program. Furthermore, it is easy to control the mailboxes of the number thieves, so that the number thieves can't steal the chickens and can't turn back the rice.
Tip: The above vulnerability only exists in Trojan horses that send QQ number information by email. If you choose to use the website receiving method during the configuration of "Ala QQ Thief", the vulnerability does not exist.
2. Network sniffing, anti-robbing the hacker's mailbox
4) Practise smart eyes, so that Trojans have nowhere to escape in the system
Now that we have understood the general process of "Ala QQ Thief", how can we find "Ala QQ Thief" from the system? In general, if you encounter the following situations, you should be careful.
Β·> automatically closes.
Β· It disappears after running a program.
Β· The anti-virus software closes automatically after running a program.
Β· The browser is automatically closed when accessing the antivirus software website.
Β· If the anti-virus software has a mail monitoring function, a warning box will appear for the program to send mail.
Β· A network firewall (such as Skynet firewall) is installed, and NTdhcp.exe accesses the network warning.
π¦If one or more of the above conditions occur, the system may have been infected with "Ala QQ Thief". Of course, it is not terrible to be infected with a Trojan. We can also remove it from the system.
1) Kill the Trojan manually. After discovering that the system is infected with "Ala QQ Thief", we can manually remove it. "Ala QQ Thief" will generate a file named NTdhcp.exe in the system32 folder in the system directory after running, and add the Trojan key value in the startup item of the registry so that it can run every time the system starts Trojan. The first thing we need to do is to run the "task manager" and end the Trojan process "NTdhcp.exe". Then open the "folder options" in the Explorer, select the "View" tab, and uncheck the "Hide protected operating system files" option. Then enter the system32 folder in the system directory and delete the NTdhcp.exe file. Finally, enter the registry to delete the NTdhcp.exe key value, which is located at HKEY_LOCAL_MACHINE
\ Software \ Microsoft \ Windows \ Currentversion \ Run.
2) Uninstall the Trojan. Uninstalling "Ala QQ Thief" is very simple. Just download the configuration program of "Ala QQ Thief" and click the "Uninstall Program" button after running to completely remove the Trojan from the system.
3) Take retreat as the advance and give the hackers a fatal blow
After being busy for a long time, I finally cleared the "Ahra QQ thief" in the system. So, should we give him a lesson in the face of hateful hackers?
1. Take advantage of loopholes and switch from defense to attack
The so-called "attack" here is not to directly invade the computer of the pirate. I believe this "technical work" is not suitable for everyone. Here is just to start from the loopholes that almost exist in the hacking software, so as to teach the hackers a lesson.
So what is this loophole?
From the previous analysis of "Ala QQ Thief", you can see that the configuration part filled in the email account and password for receiving QQ number information emails, and the email account and password are all stored in the Trojan horse program in plain text. Therefore, we can find the email account and password of the thief from the generated Trojan horse program. Furthermore, it is easy to control the mailboxes of the number thieves, so that the number thieves can't steal the chickens and can't turn back the rice.
Tip: The above vulnerability only exists in Trojan horses that send QQ number information by email. If you choose to use the website receiving method during the configuration of "Ala QQ Thief", the vulnerability does not exist.
2. Network sniffing, anti-robbing the hacker's mailbox
When the Trojan intercepts the QQ number and password, it will send the information to the hacker's mailbox in the form of e-mail. We can start from here. The Trojan horse intercepts the network data packets during the email process. This intercepted The data package contains the account number and password of the hacker's mailbox. When intercepting data packets, we can use some network sniffing software. These sniffing software can easily intercept data packets and automatically filter out password information.
Β· X-sniff
x-sniff is a sniffer tool under the command line. Its sniffer ability is very powerful, especially suitable for sniffing password information in data packets.
Unzip the downloaded x-sniff into a directory, such as "c: \", then run "Command Prompt", enter the directory where x-sniff is located in the "Command Prompt", and then enter the command "xsiff." exe
-pass -hide -log
"pass.log" is enough (command meaning: run x-sniff in the background, filter out the password information from the data packet, and save the sniffed password information to the pass.log file in the same directory).
After setting the sniffer software, we can log in to QQ normally. At this point, the Trojan also started to run, but since we have run x-sniff, the information sent by the Trojan will be intercepted. After a while, go to the folder where x-sniff is located and open pass.log, you can find that x-sniff has successfully sniffed the account and password of the mailbox.
π¦Sinffer
1) Perhaps many friends have a sense of fear about what is on the command line, so we can use a graphical sniffer tool to sniff. For example, sinffer suitable for novices.
2) Before running sinffer, we need to install WinPcap driver, otherwise sinffer will not run normally.
3) Run sinffer. First, we need to specify a network card for sinffer.exe, click the network card icon on the toolbar, select the network card we use in the pop-up window, and click "OK" to complete the configuration. After confirming the above configuration, click the "Start" button in the sinffer toolbar, and the software will start sniffing.
4) Next, we log in to QQ normally. If the sniffing is successful, the captured data packet will appear in the interface of the sinffer. The password information of the email account is listed clearly.
After getting the email account and password of the thief, we can delete all the QQ number information emails or modify his email password to give the thief a lesson and let us rookie be just.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Β· X-sniff
x-sniff is a sniffer tool under the command line. Its sniffer ability is very powerful, especially suitable for sniffing password information in data packets.
Unzip the downloaded x-sniff into a directory, such as "c: \", then run "Command Prompt", enter the directory where x-sniff is located in the "Command Prompt", and then enter the command "xsiff." exe
-pass -hide -log
"pass.log" is enough (command meaning: run x-sniff in the background, filter out the password information from the data packet, and save the sniffed password information to the pass.log file in the same directory).
After setting the sniffer software, we can log in to QQ normally. At this point, the Trojan also started to run, but since we have run x-sniff, the information sent by the Trojan will be intercepted. After a while, go to the folder where x-sniff is located and open pass.log, you can find that x-sniff has successfully sniffed the account and password of the mailbox.
π¦Sinffer
1) Perhaps many friends have a sense of fear about what is on the command line, so we can use a graphical sniffer tool to sniff. For example, sinffer suitable for novices.
2) Before running sinffer, we need to install WinPcap driver, otherwise sinffer will not run normally.
3) Run sinffer. First, we need to specify a network card for sinffer.exe, click the network card icon on the toolbar, select the network card we use in the pop-up window, and click "OK" to complete the configuration. After confirming the above configuration, click the "Start" button in the sinffer toolbar, and the software will start sniffing.
4) Next, we log in to QQ normally. If the sniffing is successful, the captured data packet will appear in the interface of the sinffer. The password information of the email account is listed clearly.
After getting the email account and password of the thief, we can delete all the QQ number information emails or modify his email password to give the thief a lesson and let us rookie be just.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β