UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
Step 4. Click on Vulnerable to filter the result and only show the vulnerable results. Bingo! Boom you completed your first task.
πŸ¦‘ Getting Data From Vulnerable Site:

Now, you need to run Havij as administrator and follow the steps below

Step 1. Paste the vulnerable site in the target TextBox on Havij and click Analyze .

Step 2. Once the process finished, you will see something like in the image below on your Havij log box.
Step 3. Click on Tables then Get Tables and you will see all the tables that are in the database.
Step 4. Now, look for a table named β€œ Orders ” or something similar. Tick the table and click on Get Columns.
Step 5. You will get the columns that are in the table β€œOrders”. Now tick on something that related to credit cards information, such as cc_number, cc_type, cc_expired_year, cc_expired_month, and cvv or cvv2 . Once you’re done, click on Get Data.
Step 6. Just wait for the dumping progress and you will get the information.
πŸ¦‘TOP CARDING: CREATE YOUR OWN LIVE CC

Β» this tutorial not by undercode-wiki sources but verified by us -use for learnβœ…
πŸ¦‘BIN Disney Plus

πŸ’³: 438639xxxxxxxxxx

> CVV/Fecha : RND (Random)

> IP : USA

> Postal: 10080/10010
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Best #Whois services :


WHOIS information is based upon a tree hierarchy. ICANN (IANA) is the authoritative registry for all of the TLDs and is a great starting point for all manual WHOIS queries.

ICANN - http://www.icann.org

IANA - http://www.iana.com

NRO - http://www.nro.net

AFRINIC - http://www.afrinic.net

APNIC - http://www.apnic.net

ARIN - http://ws.arin.net

LACNIC - http://www.lacnic.net

RIPE - http://www.ripe.net

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘DNS Most popular tools used for informations gathering :

> dnsenum : http://code.google.com/p/dnsenum

> dnsmap : http://code.google.com/p/dnsmap

> dnsrecon : http://www.darkoperator.com/tools-and-scripts

> dnstracer : http://www.mavetju.org/unix/dnstracer.php

> dnswalk : http://sourceforge.net/projects/dnswalk

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘BIN Spotify

πŸ’³: 40606833420xxxxx

πŸ§œβ€β™‚οΈCVV/Fecha: RND (Random)

πŸ§œβ€β™‚οΈIP : USA
πŸ¦‘BIN CRUNCHYROLL

πŸ’³: 5105662320xxxxxx

πŸ’³: 51056623331xxxxx

πŸ§œβ€β™‚οΈFECHA: RND (Random)

πŸ§œβ€β™‚οΈCVV: RND (Random)

πŸ§œβ€β™‚οΈIP: USA

πŸ“¦CP: 10080