β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Most Popular #Market Crawlers in 2019-2020
1. Google play crawler (Java)
2. Google play crawler (Python)
3. Google play crawler (Node) - get app details and download apps from official Google Play Store.
4. Aptoide downloader (Node) - download apps from Aptoide third-party Android market
5. Appland downloader (Node) - download apps from Appland third-party Android market
6. Apkpure - Online apk downloader. Provides also an own app for downloading.
β Git 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Most Popular #Market Crawlers in 2019-2020
1. Google play crawler (Java)
2. Google play crawler (Python)
3. Google play crawler (Node) - get app details and download apps from official Google Play Store.
4. Aptoide downloader (Node) - download apps from Aptoide third-party Android market
5. Appland downloader (Node) - download apps from Appland third-party Android market
6. Apkpure - Online apk downloader. Provides also an own app for downloading.
β Git 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - Akdeniz/google-play-crawler: Play with Google Play API :)
Play with Google Play API :). Contribute to Akdeniz/google-play-crawler development by creating an account on GitHub.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Misc Tools 2020 (popular tools ):
1. smalihook
3. AXMLPrinter2 - to convert binary XML files to human-readable XML files
4. adb autocomplete
5. Dalvik opcodes
7. ExploitMe Android Labs - for practice
8. GoatDroid - for practice
9. Android InsecureBank - for practice
10. mitmproxy
11. dockerfile/androguard
12. Android Vulnerability Test Suite - android-vts scans a device for set of vulnerabilities
13. AppMon- AppMon is an automated framework for monitoring and tampering system API calls of native macOS, iOS and android apps. It is based on Frida.
14. Internal Blue - Bluetooth experimentation framework based on Reverse Engineering of Broadcom Bluetooth Controllers
15. Opcodes table for quick reference
15. APK-Downloader - seems dead now
## <a name="academic"></a>Academic/Research/Publications/Books
β Git 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Misc Tools 2020 (popular tools ):
1. smalihook
3. AXMLPrinter2 - to convert binary XML files to human-readable XML files
4. adb autocomplete
5. Dalvik opcodes
7. ExploitMe Android Labs - for practice
8. GoatDroid - for practice
9. Android InsecureBank - for practice
10. mitmproxy
11. dockerfile/androguard
12. Android Vulnerability Test Suite - android-vts scans a device for set of vulnerabilities
13. AppMon- AppMon is an automated framework for monitoring and tampering system API calls of native macOS, iOS and android apps. It is based on Frida.
14. Internal Blue - Bluetooth experimentation framework based on Reverse Engineering of Broadcom Bluetooth Controllers
15. Opcodes table for quick reference
15. APK-Downloader - seems dead now
## <a name="academic"></a>Academic/Research/Publications/Books
β Git 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Blogspot
original smalihook java source
i've noticed some interest about a file that antilvl sometimes uses when cracking a program. it's called smalihook and it's purpose is to p...
Analysis Of Exploitation_ CVE-2020-10189.pdf
1.1 MB
Analysis Of Exploitation- CVE-2020-10189
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Android Pentesting 2020 Most usefull sources :
1) OWASP Mobile Security Testing Guide Manual
2) doridori/Android-Security-Reference
3) android app security checklist
4) Mobile App Pentest Cheat Sheet
5) Android Reverse Engineering 101 by Daniele Altomare (Web Archive link)
6) Mobile Security Reading Room - A reading room which contains well categorised technical reading material about mobile penetration testing, mobile malware, mobile forensics and all kind of mobile security related topics~~
β Git 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Android Pentesting 2020 Most usefull sources :
1) OWASP Mobile Security Testing Guide Manual
2) doridori/Android-Security-Reference
3) android app security checklist
4) Mobile App Pentest Cheat Sheet
5) Android Reverse Engineering 101 by Daniele Altomare (Web Archive link)
6) Mobile Security Reading Room - A reading room which contains well categorised technical reading material about mobile penetration testing, mobile malware, mobile forensics and all kind of mobile security related topics~~
β Git 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - OWASP/mastg: The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app securityβ¦
The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the OWA...
π¦ Bin For Google PlayStore
Bin : 520141xxxxxxxxxx
CVV/Date: RND
IP : Brazil π§π·
CPF : 133.267.246-91
Phone : 612648xxxx
DirecciΓ³n 1 : Street Jeff xxxx
DirecciΓ³n 2 : AP 104 BOSQUE COLINA Ti Robos
Code : 41500290
Barrio : SΓO CRISTΓVΓO
Estado : BAHIA
Ciudad : SALVADOR
Bin : 520141xxxxxxxxxx
CVV/Date: RND
IP : Brazil π§π·
CPF : 133.267.246-91
Phone : 612648xxxx
DirecciΓ³n 1 : Street Jeff xxxx
DirecciΓ³n 2 : AP 104 BOSQUE COLINA Ti Robos
Code : 41500290
Barrio : SΓO CRISTΓVΓO
Estado : BAHIA
Ciudad : SALVADOR
(use for learn, not for steal, β
not by undercode)β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Malware 2020 resources :
1. androguard - Database Android Malwares wiki
2. Android Malware Github repo
3. Android Malware Genome Project - contains 1260 malware samples categorized into 49 different malware families, free for research purpose.
4. Contagio Mobile Malware Mini Dump
5. VirusTotal Malware Intelligence Service - powered by VirusTotal, not free
6. Drebin
8. Kharon Malware Dataset - 7 malwares which have been reverse engineered and documented
9. Android Adware and General Malware Dataset
10. Android PRAGuard Dataset - The dataset contains 10479 samples, obtained by obfuscating the MalGenome and the Contagio Minidump datasets with seven different obfuscation techniques.
11. AndroZoo - AndroZoo is a growing collection of Android Applications collected from several sources, including the official Google Play app market.
β Git 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Malware 2020 resources :
1. androguard - Database Android Malwares wiki
2. Android Malware Github repo
3. Android Malware Genome Project - contains 1260 malware samples categorized into 49 different malware families, free for research purpose.
4. Contagio Mobile Malware Mini Dump
5. VirusTotal Malware Intelligence Service - powered by VirusTotal, not free
6. Drebin
8. Kharon Malware Dataset - 7 malwares which have been reverse engineered and documented
9. Android Adware and General Malware Dataset
10. Android PRAGuard Dataset - The dataset contains 10479 samples, obtained by obfuscating the MalGenome and the Contagio Minidump datasets with seven different obfuscation techniques.
11. AndroZoo - AndroZoo is a growing collection of Android Applications collected from several sources, including the official Google Play app market.
β Git 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - ashishb/android-malware: Collection of android malware samples
Collection of android malware samples. Contribute to ashishb/android-malware development by creating an account on GitHub.
π¦Where to report Security Android issues :
1) Android - reporting security issues
2) Android Reports and Resources - List of Android Hackerone disclosed reports and other resources
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
1) Android - reporting security issues
2) Android Reports and Resources - List of Android Hackerone disclosed reports and other resources
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - B3nac/Android-Reports-and-Resources: A big list of Android Hackerone disclosed reports and other resources.
A big list of Android Hackerone disclosed reports and other resources. - GitHub - B3nac/Android-Reports-and-Resources: A big list of Android Hackerone disclosed reports and other resources.
π¦ x6 Bins For WWE Networkβ
Bin 1: 528004614815xxxx
Bin 2: 528004372180xxxx
Bin 3: 528004041121xxxx
Bin 4: 528004133076xxxx
Bin 5: 528004350178xxxx
Bin6 : 52800485x06x23x5
Date & CCV: Rnd
IP: USA (New York)
Address: Street xxxx
City: New York
State: New York
ZipCode: 10080
Link : https://www.wwe.com/wwenetwork
Bin 1: 528004614815xxxx
Bin 2: 528004372180xxxx
Bin 3: 528004041121xxxx
Bin 4: 528004133076xxxx
Bin 5: 528004350178xxxx
Bin6 : 52800485x06x23x5
Date & CCV: Rnd
IP: USA (New York)
Address: Street xxxx
City: New York
State: New York
ZipCode: 10080
Link : https://www.wwe.com/wwenetwork
(verified only by undercode)Bug_Bytes_#64_β_Hacking_Captchaβs,_Unix_Style_Testing_&_New_Public.pdf
473.7 KB
Bypass Captcha full Tutorial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ #Bug Bounty Platforms 2020 Topic:
- AntiHACK
- Bounty Factory
- Bountysource
- BugbountyHQ
- Bugbountyjp
- Bugcrowd
- CESPPA
- Cobalt
- Coder Bounty
- Detectify
- FOSS Factory
- FreedomSponsors
- HackenProof
- Hackerhive
- HackerOne
- Hacktrophy
- intigriti
- Safehats
- Synack
- YesWeHack
β Git 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ #Bug Bounty Platforms 2020 Topic:
- AntiHACK
- Bounty Factory
- Bountysource
- BugbountyHQ
- Bugbountyjp
- Bugcrowd
- CESPPA
- Cobalt
- Coder Bounty
- Detectify
- FOSS Factory
- FreedomSponsors
- HackenProof
- Hackerhive
- HackerOne
- Hacktrophy
- intigriti
- Safehats
- Synack
- YesWeHack
β Git 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
antihack.me
Platform Game Terbaik - Noza78
Baru daftar di Noza78? Nikmati permainan seru yang lengkap dan keuntungan besar khusus untuk member baru!
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Network filtering-About linux+iptables+ADSL to do NATAbout d
1οΈβ£everyone help to see what is wrong with the following configuration
linux7.2
eth0 Intel82558 IP: 192.168.0.1/24 (internal gateway)
eth1 3COM-3C905C (with ADSL)
2οΈβ£rc.local configuration
modprobe ip_tables
modprobe ip_nat_ftp
# for IP masquerading
iptables -t nat -A POSTROUTING -o ppp0 -j MASQUERADE
3οΈβ£in /etc/sysconfig/ network has been added
FORWARD_IPV4 = YES
4οΈβ£the ADSL configuration, has been able to dial can ping external address, inside the gateway computer may ping 192.168.0.1
but not ping external address of ping not point-to-point (ppp0) address , The following is to run
netstat -r
Destination Gateway Genmask Flags MSS Window irtt Iface
218.20.189.1 * 255.255.255.255 UH 40 0 ββ0 ppp0
192.168.0.0 * 255.255.255.0 U 40 0 ββ0 eth0
10.10.40.0 * 255.255.255.0 U 40 0 ββ0 eth1
127.0.0.0 * 255.0.0.0 U 40 0 ββ0 lo
default 218.20 .189.1 0.0.0.0 UG 40 0 ββ0 ppp0
[root@linuxnat /]# iptables -L
Chain INPUT (policy ACCEPT)
target prot opt ββsource destination
5οΈβ£Chain FORWARD (policy ACCEPT)
target prot opt ββsource destination
6οΈβ£Chain OUTPUT (policy ACCEPT)
target prot Opt source destination
π¦doesn't know what went wrong, do you want to compile the kernel?
Your iptables doesn't even have a NAT rule. How can you get out?
1οΈβ£iptables -A INPUT -s 192.168.0.0/24 -j ACCEPT
iptables -t nat -A POSTROUTING -o ppp0 -j MASQUERADE
execute these two commands to see how!
2οΈβ£Haha, the version is cooked, and others have added it. The first rule you wrote shows that you are not familiar with iptables at all. You misunderstood. Why didnβt I write a script for him to use it? ? Can support dial-up. It is
3οΈβ£recommended that your rc.local be written like this:
echo 0> /proc/sys/net/ipv4/ip_froward
iptables -t filter -F
iptables -t nat -F
iptables -t nat -A POSTROUTING -s 192.168.0.0 /24 -j MASQUERADE
echo 1> /proc/sys/net/ipv4/ip_froward
written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Network filtering-About linux+iptables+ADSL to do NATAbout d
1οΈβ£everyone help to see what is wrong with the following configuration
linux7.2
eth0 Intel82558 IP: 192.168.0.1/24 (internal gateway)
eth1 3COM-3C905C (with ADSL)
2οΈβ£rc.local configuration
modprobe ip_tables
modprobe ip_nat_ftp
# for IP masquerading
iptables -t nat -A POSTROUTING -o ppp0 -j MASQUERADE
3οΈβ£in /etc/sysconfig/ network has been added
FORWARD_IPV4 = YES
4οΈβ£the ADSL configuration, has been able to dial can ping external address, inside the gateway computer may ping 192.168.0.1
but not ping external address of ping not point-to-point (ppp0) address , The following is to run
netstat -r
Destination Gateway Genmask Flags MSS Window irtt Iface
218.20.189.1 * 255.255.255.255 UH 40 0 ββ0 ppp0
192.168.0.0 * 255.255.255.0 U 40 0 ββ0 eth0
10.10.40.0 * 255.255.255.0 U 40 0 ββ0 eth1
127.0.0.0 * 255.0.0.0 U 40 0 ββ0 lo
default 218.20 .189.1 0.0.0.0 UG 40 0 ββ0 ppp0
[root@linuxnat /]# iptables -L
Chain INPUT (policy ACCEPT)
target prot opt ββsource destination
5οΈβ£Chain FORWARD (policy ACCEPT)
target prot opt ββsource destination
6οΈβ£Chain OUTPUT (policy ACCEPT)
target prot Opt source destination
π¦doesn't know what went wrong, do you want to compile the kernel?
Your iptables doesn't even have a NAT rule. How can you get out?
1οΈβ£iptables -A INPUT -s 192.168.0.0/24 -j ACCEPT
iptables -t nat -A POSTROUTING -o ppp0 -j MASQUERADE
execute these two commands to see how!
2οΈβ£Haha, the version is cooked, and others have added it. The first rule you wrote shows that you are not familiar with iptables at all. You misunderstood. Why didnβt I write a script for him to use it? ? Can support dial-up. It is
3οΈβ£recommended that your rc.local be written like this:
echo 0> /proc/sys/net/ipv4/ip_froward
iptables -t filter -F
iptables -t nat -F
iptables -t nat -A POSTROUTING -s 192.168.0.0 /24 -j MASQUERADE
echo 1> /proc/sys/net/ipv4/ip_froward
written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦LIVECCN β
β
5439979006730365|06|2021|536 CCN MATCHED
5439979006736263|06|2021|584 CARD
5439979006732387|06|2021|381 CCN MATCHED
5439979006730837|06|2021|781 CCN MATCHED
5439979006735000|06|2021|556 CCN MATCHED
5439979006738004|06|2021|176 CCN MATCHED
5439979006734847|06|2021|683 CCN MATCHED
5439979006738053|06|2021|762 CCN MATCHED
5439979006733021|06|2021|124 CCN MATCHED
5439979006730837|06|2021|512 CCN MATCHED
5439979006730365|06|2021|536 CCN MATCHED
5439979006736263|06|2021|584 CARD
5439979006732387|06|2021|381 CCN MATCHED
5439979006730837|06|2021|781 CCN MATCHED
5439979006735000|06|2021|556 CCN MATCHED
5439979006738004|06|2021|176 CCN MATCHED
5439979006734847|06|2021|683 CCN MATCHED
5439979006738053|06|2021|762 CCN MATCHED
5439979006733021|06|2021|124 CCN MATCHED
5439979006730837|06|2021|512 CCN MATCHED
(verified only by undercode)β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 topic for Termux-Linux :
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£ git clone https://github.com/CISOfy/lynis
2οΈβ£cd lynis
3οΈβ£ cd lynis; ./lynis audit system
4οΈβ£$ ./lynis audit system --quick --auditor "The Auditor"
>During the security audit, Lynis attempts to assign two identifiers to the system. They can be compared as fingerprints and can be used in other tools and to link data to an existing system.
6οΈβ£Identifiers: hostid and hostid2
The first identifier is named hostid and has a length of 40 characters. The MAC address of the system is typically used its data input. The second identifier is hostid2. It is 64 characters long and typically uses a public SSH key a data input.
7οΈβ£lynis show hostids
Overriding the identifiers
In case your system can not generate the host identifiers automatically, then you can specify them in your custom profile (custom.prf). This can also be useful when systems are short-lived, yet you want to link the same data to such instance.
8οΈβ£lynis configure settings hostid=$(head -c 64 /dev/random | sha1sum | awk '{print $1}'):hostid2=$(head -c 64 /dev/random | sha256sum | awk '{print $1}')
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 topic for Termux-Linux :
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£ git clone https://github.com/CISOfy/lynis
2οΈβ£cd lynis
3οΈβ£ cd lynis; ./lynis audit system
4οΈβ£$ ./lynis audit system --quick --auditor "The Auditor"
this example we tell Lynis to audit (command), with the target system (argument). By using the --quick (option), we tell it not to wait. We used --auditor (option) and defined it as "The Auditor" (argument).5οΈβ£HostIDs
>During the security audit, Lynis attempts to assign two identifiers to the system. They can be compared as fingerprints and can be used in other tools and to link data to an existing system.
6οΈβ£Identifiers: hostid and hostid2
The first identifier is named hostid and has a length of 40 characters. The MAC address of the system is typically used its data input. The second identifier is hostid2. It is 64 characters long and typically uses a public SSH key a data input.
7οΈβ£lynis show hostids
Overriding the identifiers
In case your system can not generate the host identifiers automatically, then you can specify them in your custom profile (custom.prf). This can also be useful when systems are short-lived, yet you want to link the same data to such instance.
8οΈβ£lynis configure settings hostid=$(head -c 64 /dev/random | sha1sum | awk '{print $1}'):hostid2=$(head -c 64 /dev/random | sha256sum | awk '{print $1}')
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - CISOfy/lynis: Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testingβ¦
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional. - CISOf...
π¦Start Using Git Today! -- No Frills Source Control β1.24β 2020 Course
https://mega.nz/#F!gt9T1SJR!tqqjGpQOx13_xq6j7m75Fg
https://mega.nz/#F!gt9T1SJR!tqqjGpQOx13_xq6j7m75Fg
mega.nz
MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 20GB now
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦A Few #GETVPN 2020 References
- [Cisco Group Encrypted Transport VPN Configuration Guide](https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_getvpn/configuration/xe-3s/sec-get-vpn-xe-3s-book/sec-get-vpn.html)
- [GETVPN G-IKEv2](https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_getvpn/configuration/xe-3s/sec-get-vpn-xe-3s-book/sec-get-vpn-gikev2.html)
- [GETVPN White Paper](https://www.cisco.com/c/en/us/products/collateral/security/group-encrypted-transport-vpn/deployment_guide_c07-624088.html)
- [GETVPN Design Guide](https://www.cisco.com/c/dam/en/us/products/collateral/security/group-encrypted-transport-vpn/GETVPN_DIG_version_2_0_External.pdf)
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦A Few #GETVPN 2020 References
- [Cisco Group Encrypted Transport VPN Configuration Guide](https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_getvpn/configuration/xe-3s/sec-get-vpn-xe-3s-book/sec-get-vpn.html)
- [GETVPN G-IKEv2](https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_getvpn/configuration/xe-3s/sec-get-vpn-xe-3s-book/sec-get-vpn-gikev2.html)
- [GETVPN White Paper](https://www.cisco.com/c/en/us/products/collateral/security/group-encrypted-transport-vpn/deployment_guide_c07-624088.html)
- [GETVPN Design Guide](https://www.cisco.com/c/dam/en/us/products/collateral/security/group-encrypted-transport-vpn/GETVPN_DIG_version_2_0_External.pdf)
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Cisco
Cisco Group Encrypted Transport VPN Configuration Guide, Cisco IOS XE Release 3S - Cisco Group Encrypted
Transport VPN [Support]
Transport VPN [Support]
Hardcoded placeholder description!
π¦x10 Bins For GoDaddy SmartLine β
β
BIN :
650450xxxxxxxxxx
650451xxxxxxxxxx
650452xxxxxxxxxx
650453xxxxxxxxxx
650454xxxxxxxxxx
650456xxxxxxxxxx
650457xxxxxxxxxx
650458xxxxxxxxxx
650459xxxxxxxxxx
650460xxxxxxxxxx
Date: RND
CVV : RND
Ip : USA
BIN :
650450xxxxxxxxxx
650451xxxxxxxxxx
650452xxxxxxxxxx
650453xxxxxxxxxx
650454xxxxxxxxxx
650456xxxxxxxxxx
650457xxxxxxxxxx
650458xxxxxxxxxx
650459xxxxxxxxxx
650460xxxxxxxxxx
Date: RND
CVV : RND
Ip : USA
(not by us)