100% found this document useful (1 vote)
4K views7 pages

Guide to Secure Online Purchases

This document provides instructions for making fraudulent purchases using stolen credit cards securely. It explains the necessary tools such as VPNs, stolen credit cards, and how to set up an identity to appear as the legitimate cardholder. Additionally, it divides the levels of difficulty of fraudulent purchases and offers tips on which websites are more vulnerable.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
4K views7 pages

Guide to Secure Online Purchases

This document provides instructions for making fraudulent purchases using stolen credit cards securely. It explains the necessary tools such as VPNs, stolen credit cards, and how to set up an identity to appear as the legitimate cardholder. Additionally, it divides the levels of difficulty of fraudulent purchases and offers tips on which websites are more vulnerable.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

1.

=============METHOD PHYSICAL PURCHASES BY


INTERNET
2.
3. Tutorial: -=Dark0000=-
4.
5. To begin, it is essential to have knowledge of some
terms and tools to be used.
6. CREDIT CARD (CC): Card issued by an entity
banking that allows certain operations to be carried out from a
ATM and the purchase of goods and services on credit;
it is generally made of plastic and has a magnetic strip on one
of their faces. There are different types of credit cards:
7. Visa
8. Mastercard (MC)
9. American Express (AMEX)
10. Discover
11. New
12. JBC
13. Cards whose numbers start with 4 are visa cards,
with a 5 are Mastercard cards, with a 3 (15 digits long)
they are Amex, with a 6 they are Discover / JBC cards.
14. BILLING ADDRESS: The address of the holder of the
card.
15. TITULAR DE LA TARJETA: Propietario de la tarjeta.
16. EXP DATE: Validity period of the card.
17. VPN: I always recommend using a virtual private network
(VPN for its initials in English), even though we have
Socks, this will add security when we are operating.
18. The best way is to connect to the VPN first and once
connected to use Socks, with this we would get double defense
before any attempt at tracking.
19. There are many VPN alternatives, some cheap and others
dear ones, it all comes down to your preference, personally I use
NordVPN, you can register through the following link:
[Link]
20. SOCKS: Just like VPNs, they are easy to find but
they can cost a lot depending on the supplier,
I recommend using:
21. [Link] Public Socks5 from $3.00 for 15
days.
22. [Link] Private Socks5 from $.8.99 for
15 days.
23. CCLEANER: It is a cookie finder and remover
history, it is a paid software, but it can be found for
free way by googling. Delete the cookies and the history
From your PC is an operation that must be performed each time you
hide your IP.
24. Through the following link, you can download the latest
completely cracked version of Ccleaner: [Link]
25. Now that you know the terms and the tools that
they must be used, you must understand that in any method you choose
existe garantía de 100% de éxito, esta guía no te permitirá
to succeed in 100% of your attempts, there are too many reasons
for which the operations are rejected, some of them still
are unknown to me, what this guide will allow you is
increase your success rate when you decide to trade, but understand
that you will still fail in many attempts, I would say that my rate of
success is around 50% of the time, and the professionals
maybe around 70% to 80%.
26. Sometimes you have to accept that you wasted money on
tools, cards, and anything else you bought, but
then you overcome it and try again.
27. There are vital steps that are overlooked most of the
time and causes most people to fail.
28. Let's look at the factors that websites and processors of
they observe payments, some of them are less secure and are less
filled with validations than others, those sites are the ones that
commonly known as 'Cardable Sites', it means that from
the 23 factors that can be monitored, chose to apply many
fewer of them, maybe they will only check 3 or 4, while
Other processors like Paypal will verify almost everyone, let's see
the 23 factors listed below:
29. System Clock
30. Time Zone
31. Operating System
32. Operating System Username
33. Browser fingerprinting Cookies
34. Caches
35. Ip
36. Using Proxy
37. Unusual or large transactions
38. Location
39. User Agent
40. HTTP Headers
41. Browser Add-ons
42. Screen size and Zoom
43. System Sources (Times New Roman, Tahoma)
44. Nombres / DOB / SSN / Dirección
45. Card Labeling
46. Connection speed (due to proxies)
47. Authenticity and antiquity of email (.edu is
the best
48. Shipping address
49. Billing Address
50. I think that to be fair, the only things that most
the processors check are:
51. Location
52. I.P (on the blacklist or not)
53. Usando un Proxy (Sí / No)
54. Nombres / DOB / SSN / Dirección
55. User-Agent / Headers (Checking if it matches beginnings
of previous sessions)
56. Cookies and cache (check if it matches logins to
previous sessions)
57. Levels: Our goal
58. Now that we know what processors are
monitoring to prevent fraud, we will see what we have to
to do.
59. Please note that certain sites, quantities, items and
areas are much harder to load than others, for example it is
very easy to order takeout for a value of $100.00 for
On the contrary, it is almost impossible to buy a gift card.
iTunes / Amazon electronics for $100.00. This due to the
the fact that electronic gift cards have a high
value in the Deep Web, because it can be exchanged for BTC and for the
tanto era uno de los productos en línea más comprados con dinero
stolen / CC / Paypal. Obviously the security to charge a
the electronic gift card has been taken to the extreme. Said
this is still possible because it is still available to be
bought, only that it is very difficult and the method I used must
be perfect.
60. I would like to divide the security levels into three.
levels:
61. Level 1 (Easy Level): Everything that cannot be exchanged
for BTC online (Food, clothing, software, etc).
62. Level 2 (Moderate): Things that can be sold online,
but there is a risk (Electronics, hardware, some wallets
electronics, etc.
63. Tools:
64. VPN / RDP, Clean Socks5, CC with name, postal code,
address.
65. Level 3 (Difficult): Real money, BTC, gift cards
electronic wallets, popular electronic wallets (Paypal, Skrill,
Webmoney, ecopayz, etc), all things related
with money that does not lose value.
66.
67. Tools:
68. VPN / RDP, Clean Socks5, Full complete CC with details,
nombre, dirección, código postal, Numero de Acc, Codigo de
classification/ Route number, anti-detect / Fraudfox, agent of
user, Cookies, VBV bypass / password, certain Bins, VMWare,
Kali Linux (optional), you may also need
fake identifications and documents.
69. For now, I will explain up to level 2, in a separate guide.
explain level 3.
70. Configuration for your session:
71. 1. Identify the site. Choose a site that will send you your
product as soon as possible without too many safety measures and
verification, you need to obtain that article before the
cardholder realizes, at the end of the guide
you will find a list of sites that are easily cardable.
72. 2. Find the correct card / bin for your product.
Let's say we want to charge a Samsung mobile device for $600.00.
We will need a card of moderate to high quality, such as a
premier card, Gold, Platinum without VBV, or Fullz with
information of Dob, SSN / ID, account number and code of
route / classification. This information is sufficient to
reset the VBV / 3DSecure codes! Especially the
cards from the United Kingdom and some from the United States. Places that
I recommend for finding CC / Fullz:
73.
74. [Link]
75. [Link]
76. By searching, you can find many more places to get
the CCs, however many of them are just scams,
refer to properly before making any payment, because it could
lose your money.
77. 3. Now that you have your target site and product, with a
active card and with sufficient funds (Remember that the CC that
they do not necessarily have sufficient funds
to make the purchase), you can start configuring your system.
Basically, you must configure (fake your configuration) to
adapt the identity and location of the cardholder
Account holder. Must make the payment processor believe
that you are the owner of the card, I will detail next
the steps that must be followed.
78. Clean your PC to eliminate any trace of your
existence, first run Ccleaner and then Bleachbit.
It will delete all your cookies, cache, history, and other traces.
79. CCleaner - [Link]
80. Bleachbit - [Link]
81. Use a VPN or RDP to protect yourself. This is for defense.
since a VPN encrypts all the packets sent and changes its
location and this would make it difficult to track. An RDP would
it will allow you to connect to another PC, in another location and will not connect your
PC to the crime. Use an area in the same country as the victim. As
this is just for defense it doesn't have to be in the same
city / region, use the most stable and fastest server of the
country. Choose any of the following:
82. [Link]
83. Now he has three options and needs to use his judgment.
to determine the best possible. The options are:
84. Use VMWare / Vbox to load on a virtual computer
instead of hers.
85. Use su propia PC y Navegador.
86. Use your own PC with the AntiDetect / Fraudfox browser.
These browsers must be used with a user agent.
recent of the victim. Then it can configure its system to
that it looks exactly like the configuration of the victims.
87. 4. Whatever method you choose, step 4 is the
most important offensive step Socks5 Proxies, many people are
debating about Socks and where to get them. In my opinion
I say it doesn't matter where you get the Socks (As long as
they are clean), however I will mention some suppliers
of decent Socks:
88. [Link]
89. [Link]
90. [Link]
91. [Link]
92. [Link]
93. You can use various methods and tools to connect.
with a proxy. The two most commonly used methods are through
Firefox or Proxifier preferences. If you are new, I suggest you
just use the Firefox browser to connect, already
that proxifier can be complicated.
94. Use:
95. [Link]
96. [Link]
97. to see if your proxy is not listed on any blacklist
due to a previous fraud committed while using that proxy. A
once I find a proxy in the area (within 50 km) of
account holder and the IP is clean, you can proceed with the
step 5.
98. 5. You should now have your VPN / RDP as a base with your proxy
Socks5 connected, your IP should be the one used by the Socks5 proxy.
Go to:
99. [Link]
100. [Link]
101. [Link]
102. [Link]
103. and make sure that:
104. IP is in the same country as the DNS.
105. The time corresponds to the real time in the city of your
victim. If it is not correct, just change your time zone.
106. Your proxy must have a postal address and must not be
in blank neither N / A.
107. Check [Link] where they show your rating of
anonymity in%. It will explain to you what is still wrong and how
solve it. 90% is fine, depending on its configuration
and if you are going to enable or disable Javascript (AD or Not).
108. Let's remember that there is no defined method that works in
all sites, as mentioned at the beginning, the systems of
security varies in each place and payment processors
A method may work in one place but not in another.
109. You must study and experiment over and over again on the site that
he wants to load and determine exactly what causes it to fail and what
It makes it successful. Unfortunately, that is the only way.
110. Now I will briefly explain how websites load in
general. Some points may not be required and there may be some
additional things to do in other places. But in general
this will work as follows:
111. Select the site you want to upload.
112. Obtain a suitable credit card or PayPal to load the site
113. Start your VPN or RDP in the same country as your CC (not like
site
114. Connect to the closest Socks5 to the owner of
the card / account. In the U.S. It has to be nearby or inside
from the same city, but for the rest of the world you can leave
with yours only in socks in the same country. However,
I always tried to get as close as possible.
115. Obtain an email address in a
popular providers like gmail, yahoo, aol, Hotmail, etc.
116. Get a phone number with the area code
as close as possible to the cardholder. Some sites
they allow you to use virtual phone numbers, but others do not.
You can get virtual phone numbers at [Link] /
Google Voice. Real numbers you can get on Verizon.
117. Register an account on the site with the details of
holder of your card and the new email numbers
and phone for verification. Always try to verify the
the largest amount of information possible.
118. After registration, you need to do a final verification.
from its configuration to ensure that everything is at 100%.
You must check your IP if it is in the desired location and it is not.
on the blacklist. Clean your PC and finally set up your
browser / AD / Fraudfox to spoof the user agent
IF you have this information.
119. If all of the above has been done, you can proceed to purchase.
the article of your choice with your fake account. This is a
normal direct purchase procedure as if you were the
cardholder. Anyone can purchase something
online.
120. Some Cardable Sites are:
121. [Link]
122. [Link]
123. [Link]
124. [Link]
125. [Link]
126. [Link]
127. [Link]
128. [Link]
129. [Link]
130. [Link]
131. [Link]
132. [Link]
133. [Link]
134. [Link]
135. [Link]
136. [Link]
137. [Link]
138. [Link]
139. [Link]
140. [Link]
141. [Link]
142. [Link]
143. [Link]
144. [Link]
145. [Link]
146. [Link]
147. [Link]
148. [Link]
149. [Link]
150. [Link]
151. [Link]
152. [Link]
153. [Link]
154. [Link]
155. [Link]
156. [Link]
157. [Link]
158. [Link]
159. [Link]
160. [Link]
161. [Link]
162. [Link]
163. [Link]
164. [Link]
165. [Link]
166. [Link]
167. [Link]
168. [Link]
169. [Link]
170. [Link]
171. [Link]
172. [Link]
173. [Link]
174. [Link]
175. [Link]
176. [Link]
177. [Link]
178. [Link]
179. [Link]
180. [Link]
181. [Link]
182. [Link]
183. [Link]
184.
Method for purchasing physical goods online

You might also like