Science of Carding
Special edition.
March 25, 2021.
Written by mewtor.
science of carding, special edition.
Table of contents
Introduction
Chapter 1 - Virtual Carding
1.1 How it works
1.2 - Account acquisition fraud
Why orders are canceled
1.4 - Drops
Chargebacks
1.6 - Guarantee fraud
1.7 - Choose the best cards
1.8 - Commercial fraud
Newegg and TigerDirect
1.10 - Removal of stripes
1.11 - Beyond the ATO - The PTO
1.12 - Fraud prevention algorithm of
Maxmind
1.13 - Verification procedures
orders
1.14 - Automated withdrawal from Stripe
1.15 - CC to BTC
1.16 - Squareup Withdrawal
1.17 - Flint withdrawal
1.18 - Cash withdrawal from PayAnywhere
1.19 - Request a photo ID
Chapter 2 - Protect Yourself
2.1 - Protect yourself online
2.2 - Burner phones
2.3 - Android impersonation device: the
perfect shape
2.4 - A.V.S.
2.5 - Airplane Tickets
2.6 - Fake emails
2.7 - Completely falsify your identity
2.8 - Safeguarding your VPN
2.9 - The 10 most common mistakes
2.10 - Glossary
Conclusion
Introduction
This guide was written by mewtor, moderator
from TCF, after a long list of requests
to make a guide. I am a carder
experienced, carding tens of thousands of
dollars in goods and I rarely miss. I share
my knowledge with anyone who is
willing to put a little money on the
table and obtain real information about cards
updated.
Now, at the moment of writing this
article, only a few members bi ai Pi
Selected ones are allowed to sell this guide.
If you see someone selling my guide on EVO or in
anywhere else, let me know. I took the time
to write this guide, I thank when it
People recognize my work.
Why don't I let this information be
free? Simple. If we publish methods
good and that work outdoors, all the
novices will try to exploit them in any way
good and bad way possible, by burning them
before professionals can begin
to make money with them. So, when asking them the
people who pay for a complete guide, us
we ensure that those methods do not burn
in the long term. We strive to provide
quality information!
This guide was written with the intention of
help people who are willing to
invest some money to make money. No
we can allow newcomers to register and
see ultra-secret methods in the section of
forum newbies, as that would destroy everything.
The withdrawal method of Stripe is the most
popular and it is the one with which people make the most money
due to its ease when explained in this
guide. On November 2, 2020, I made the money
enough with Stripe to buy a new one
Mercedes-Benz with a suitcase full of money.
Everything is possible, and since he bought that guide,
now has access to card methods
elite.
I have always dreamed of becoming
millionaire in the real estate field. All the
the world knows that, in order to pay a
real estate, it is necessary to have
money as an advance. Tons of money. And no
I believe in working 40 hours a week to bring
the house only $400 per week, minus all the
invoices, and count how many cents remain in
my pockets. I believe in living more than in
to survive.
And even with a real-life business, that
it's not enough. This is where I discovered the
world of online fraud. I lost a little of
money in my early days believing that
the landfills + PIN really existed, and Mr.
Fungi probably laughed at several people
that way. The teasing helped me, like to
other people, to accumulate money and to pay it
that we always wanted.
Carding is not everything; a field very
profitable is the processor refund of
payments. I will detail 3 commonly techniques
used by scammers to increase their
illegal income. The most important thing is that
when your things start going well and you see the
money, don't boast in front of anyone! You never know
when a friend will threaten you and then you
I will report you if you don't do a favor. I am a man of
legitimate appearance, I have never smoked in my whole life
life, I am just here to get something from
money
After reading this guide, you will have the
knowledge necessary for to note
practically anything. You can get
computers, electronic devices, clothing and
much more free. Given that this knowledge
it can be very dangerous, I encourage people to
to be ethical in their actions. For example, avoid
to fall in your local family store, since barely
They can eat losses. Go for the fish.
the fat ones, those who deserve it, like Walmart and
Newegg. They are cardable. If you failed many
Sometimes when you get them right, you have the correct book.
There is no website that is considered
impossible to load. Everything can be loaded
with the correct level of attack (the first
The chapter will discuss the levels of attack of the
site from 1 to 4). I personally uploaded each site.
that people thought were impossible to
copy. Some were really difficult, but
if "it becomes" in the card's title, it will be able to
perform miracles with fraud. Not on this date,
All online merchants are aware
from credit card fraud. Some
they will simply process each transaction that
some are presented, while others have
advanced fraud prevention. This only gives us
an additional challenge.
Some methods were found on the forum,
then they were perfected and adapted for
make it viable and adaptable. The majority of the
Sometimes, it's a game of cat and mouse, but there are
a point where stores cannot
increase security without compromising
seriously the customer experience. We must
take advantage of that and resemble that client who
he is confused about how to use his card.
Life is short; if you have dreams, go for it.
the money to carry them out! The methods of
refund in this book are here for this
purpose and they will give it a good kickstart
to obtain funding for your
projects. Regarding the question, "Is it possible
Live a life without scamming? The answer is yes,
but it did not encourage her. I recommend using cards and
withdrawals to obtain money for projects
legitimate, something that can show to society
so that people feel proud of you.
This is how you earn people's respect and
This is how you get all the girls.
Enough talking, let's get started!
Chapter 1 - Virtual Carding
This chapter is about virtual carding. The
carding virtual is the art of ordering products
online using stolen credit cards,
also known as 'CVV', 'pizza', 'cc'
"choco", "cecilia" or any other name that
the members of the community use for
disguise their intentions. Although this seems
easy, there are many traps that perhaps
you should take into account when doing it, especially
because merchants are becoming more and more
aware of online fraud. Do you want to know
How to get free products? Let's get started!
Section 1.1 - How it works
The first thing is to ask oneself, how much do you want
what do you want to do? Then, you will have to
choose one of those 3 levels. Each level
represents a level of difficulty and will see the
prerequisites.
Level 1: easy carding
This level is used for very easy things.
to register, for example, restaurants and orders
small phones, mostly below
of $50. This is the entry point for most
from the carders. For that, you will need:
Credit card number
Expiration date
Level 2: intermediate carding
This level is used for online transactions
they are a little taller, like reports of
background or a very small physical element.
You will need:
Credit card number
Expiration date
CCV Code
Cardholder's name
Full billing address
Sometimes, the phone number of the account
Level 3: hard teasing
This is not recommended for beginners.
Here we are talking about everything that is about to
above level 2, as physical elements of
large size or high-security websites like
Newegg, TigerDirect and sites that require
account acquisition (for ATO, please refer to the
section 1.2 of this guide). The components of the
computer, electronics, and many others
elements are included at this level. You need:
Credit card number
Due date
CCV Code
Cardholder's name
Complete billing address
Phone numbers
• SSN
Date of birth
Recommended background report
If your goal is to obtain a level card
1, just needs to call to order a pizza and
ordering a pizza to a different address is not
it is necessary to write long paragraphs about
This is easy and quite simple.
If your goal is level 2, you can score.
background reports or small elements
physical, mostly for less than $150. All
orders are placed online and you must
enter the billing address, the address
of shipping and the card information correct.
Now, you should see if the websites indicate the
billing phone number registered in
the bank, or simply the telephone number
contact. If the website requests the number of
billing phone, you must register the number
of the cardholder's phone at the bank;
otherwise, it is safe to enter the number of
burner phone (see section 2.1
from this guide). Now, will the website call you?
It depends on the order, its policy, and its suspicions.
about you, so there is no answer
Hold on to this question. Remember that the carding
It is usually trial and error.
When using a card to visit a site
web, do not visit another website with the same card
until your order has been shipped. Without
embargo, to place an order y to have a
approval of the charge is easy, but sending it to
this is where the challenge lies.
A level 2 site that is often labeled
it's peoplefinders.com. This is where the carders
they obtain most of their reports from
background. It is a good playground for
put your skills to the test and it will be useful for you
later.
Now, to level 3. He probably saw the
required information, now, how to obtain it?
First, if the subject is under 40 years old, it is
probably won't have luck. Otherwise,
keep reading.
First, you need to get the right type of
card. This is called finding the BIN
(Bank identification number) correct. The
BIN is the first 6 digits of the card and is
used to identify the type of card and the bank
sender. For more information, go to
bindb.com, at the top go to Bin
Search and enter the first 6 digits of the
card. They will tell you the issuing bank and the type of
card. It has debit and credit cards, and the
the type of card can vary. From the weakest to the
stronger, they are:
Insured: very low limits, sometimes
around $300
Classic: low limits, sometimes around
$1 million
Gold: average limits, can hover around $3
thousand
• Platinum: high limits, can hover around $8
thousand
Business: very high limits, in the 5 digits,
often around $15 thousand.
Company: the best, I received cards that
they had a credit limit of $30,000.
Please note that those numbers are
subject to changes according to the score
credit, the history and spending patterns of
cardholder. For the benefit of this guide,
we will only work with credit cards.
experience, debit cards often do not
they have funds and they have an extra security
strict for online shopping. In other
words are garbage for level 3 backcombing,
but they can have other uses, such as purchases of
level 1 or level 2.
Register an account on any site of
search for SSN like ssnfinder.ru o
ssndob.cc and search for your topic. At the same time,
Go to peoplefinders.com and get the report
complete background of your topic using
a level 2 card. Once you have the
background report, check if the
addresses and the date of birth match
in the report and in the stab in the back. If
everything matches, you can assume that the SSN will be
correct. Use your common sense to compare
the results of the stab in the back and of
people search engines to ensure
that did not obtain the incorrect information. It
you can find around 80% of the
subjects over 40 years old.
Do you have the SSN and the date of birth?
Great! Now is the time to get the
maiden name of the mother. This is a bit
more difficult and it will work if your victim
find in one of those states: Arizona,
California, Delaware, Idaho, Indiana, Kentucky
Maine, Maryland, Massachusetts, Minnesota,
Nevada, New Hampshire, New Jersey, Ohio,
Rhode Island, South Dakota, Texas. Go to
archives.com and load an account, then search
to the mother of his subject (look in the report of
background his name and date of birth
And I tried to search for his birth record. This
It is a case of trial and error and it works
approximately 50% of the time.
Why obtain all this information?
Because many level 3 sites will have
VBV (Verified by Visa) or MCSC protection
(MasterCard Securecode) during the process of
payment. This is a form that presents the
issuing bank of the credit card and requests
additional questions. Although each type of
the card is different, the questions more
frequent are:
Date of birth
Last 4 digits of the SSN
Full name on the card
Billing zip code
If any of those questions fail, the order does not
it will be processed. Now, why do we need
all this information? Because we will carry out a
ATO in the account. This is complicated. Read the
next section to obtain a description
detailed account acquisition fraud.
Section 1.2 - Acquisition Fraud
accounts
Do you dream of carding thousands of dollars in
computer hardware at Newegg? It is
feasible, but not easy. You have to follow the
correct steps. I loaded a platform of
game of $10,000 in less than 2 weeks using
platinum cards following that guide, so I am
in a position to tell you how.
First, check the balance of your card.
credit. Now, before going insane, remember
this general rule: Do not use verifiers of
letters! They burn the card very quickly. Let me
explain.
Each transaction is automatically obtained
a fraud score between 0 and 999. The
system used to evaluate transactions
it is the same one used by the 4 major banks and
it's called Fair Isaac. The transactions that
those with a fraud score above 300 will be
manually reviewed by an agent, who
it will decide whether to contact the holder of the
card or they simply leave it. Scores
greater than 500 with automatic rejection,
I blocked the card and an agent will contact you.
the cardholder. Some banks have
different criteria, but the things that can
affecting the fraud score are:
Comparison with the spending pattern
habitual of the cardholder
Location of the load
Amount
Risk factor of the associated trader
For example, a charge of $20 at Walmart
the cardholder's location will not activate anything,
but a large purchase of $2000 in
Newegg.com will have a high score of
fraud y probably himselfwill reject
automatically if the cardholder rarely
shop online.
So, how is this relevant? A
small charge for card not present followed
from a large position will make the score of
fraud is very high, because they assume that it is
testing the card. If you see a small charge of
$1, after a few minutes after a great
online shopping, they will automatically reject the
card and it is likely that your plan will fail.
There are much better ways to verify if
a card works. The best way is to call.
to the bank's toll-free number and use the
automatic indications. This does not imply
no danger, however, use Spooftel
to fake your number and display the number
of the cardholder. Once this is done,
will be ready to call the bank number
sender and verify how much is left on the card.
Let's do it.
Call the bank using your burner phone
and have the following information on hand, according to
the bank. The automated message will give you access to
the list of transactions, the balance and some others
options. Here is the information about the 4
largest banks:
Chase Bank - 1-800-432-3117
Complete card number
Postal code
Note: If you correctly forged the number of
phone, only the last 4 digits will be requested
from the card; otherwise, you will be asked for the
full card number.
Citibank - 1-800-627-3999
Full card number
Last 4 digits of the SSN
Bank of America - 1-888-421-2110
Full card number
Postal code
Capital One - 1-800-955-7070
Full card number
Last 4 digits of the SSN
Yes, for any bank, enter the number
of card y the system transfers it
immediately to an agent without questions
additional, it means that the account is closed
and the card is burned. It is not necessary
wasting time on this, just hang up and use another
card. The agent will only tell you the same and you will see yourself
foolish.
It is always a good practice to take note of
the latest transactions and amounts, in case of
that they may request them later. Listen to them and
note them down, I recommend up to 8 transactions
for maximum security.
So now you have the balance and the line of
available credit. Nice! So you know how much
you can spend online. However, before
go crazy, there is one more obstacle that must
take into account: many sites like Newegg or
TigerDirect refuses to make shipments to a
address that is not registered with the bank. And
it is likely that the cardholder does not reside
at your delivery address. This is how
we will solve this problem by introducing the
account acquisition fraud, also
known as ATO.
ATO is the process in which a scammer
(you) call the bank to make the changes
that I wish on the account, without the account holder of the
card knows it. This implies talking to a
customer service agent and use the
social engineering. Before even thinking about
press 0 to speak with an agent,
make sure to have, at the very least, the following
information at hand:
• Full card number, date of
expiry
Complete billing address of the account holder
from the card (and county)
• Date of birth (and also note the
age, not just the date of birth
• SSN
MMN (maiden name)
Employer's name (optional, if it is
possible, I tried to find it on Facebook)
• Car make and model
(optional, if possible, try to make a
Google StreetView in CH's house
• Size and value of the house (optional, if it is
you can possibly find it on realestate.com as it is
public information
• Driver's license number,
expiration
Previous addresses
Background report
In case you do not have the MMN, try
guessing using common last names in the report
of backgrounds. If it really can't
finding it, sometimes it is possible to circumvent with others
questions. Once you have this information
by hand, study it, try to remember it. Remember,
you are the cardholder, the card is yours
and has confidence, like when he calls his
own bank for a legitimate request.
When you call the bank, you are usually
they will request 3 security tokens. Those tokens
they can include, among others: date of birth,
social security number, address, CCV code
cell phone, MMN. If 1 card fails, it will be
they will ask for 2 more. At this point, 2 can happen.
things:
He did it correctly, so the agent it
will listen and will fulfill any request you have
What to do in the CH account, and I don't know.
they will raise flags.
The agent suspects that it is happening
an ATO and transfers it to the department of
security. This is called the Verid department and
Two Out of Wallet (OoW) questions will be asked.
These are multiple choice questions based on
in the credit history and public records
of the cardholder. They can be easy or
tricks, it is random every time it happens. If not
they will tell him that they cannot help him and will
they will suggest that you appear in person at your
bank. They will also call the cardholder.
So, if this one fails, forget about this card,
it is burnt.
The first thing you want to do in the account is
change the billing phone number.
Just that. Don ’t do anything else, since doing
too many changes will generate a red flag
on the account. Call to change the number of
main billing and let the card be
stay still for at least 5 days.
Alright, are you ready? Relax, sit down at
your favorite sofa, call the bank, listen to the
instructions and press 0. The message continues,
this call may be recorded for reasons of
quality.
This is the first example, if you have the MMN
correct (this is the most requested token).
Agent: Thank you for calling Chase, my
My name is Bob, who am I speaking with?
You: James R. Layton.
Agent: Thank you Mr. Layton, and for reasons
Regarding security, can I give myself the last name of
mother's maiden name on the account?
You: Lucile.
Agent: Thank you, what is your date of
birth?
You: October 1st 1965.
Agent: Thank you Mr. Layton, how can I
What can I do for you today?
This is the second example, if you do not have the
MMN. Guess, and don't doubt it. You know yourself.
himself better than the agent, and they only
they can trust the information they have in
on your screen to validate your answers.
Agent: Thank you for calling Chase, my
My name is Bob, who am I speaking with?
You: James R. Layton.
Agent: Thank you, Mr. Layton, and for reasons
of security, can I use the last name of
mother's maiden name on the account?
You: Smith.
Agent: In fact, I have something different here,
begins with C.
You: With a C? It's impossible! His name was
Lucy Smith never used another name!
Agent: Well, do you have any other name?
that can start with C? (if it has a last name)
that begins with C in the report of
backgrounds)
You: My aunt's maiden name is
Charlotte, but I doubt that's the answer.
What do you have in the file? (if it doesn't have any of that
in the report)
You: No, no one in my family uses that name.
Agent: Well, let me take note of this.
Can you confirm the last 4 digits of your
social security number?
You: 4456.
Agent: Thank you, what is your date of
birth?
You: October 1st, 1965.
Agent: And your billing address with the
postal code?
123 Fake Street, Fakeville, NY, 10008
Agent: Thank you Mr. Layton, how can I
help you today?
If you hear that, it means you entered. Of the
on the contrary, will be transferred to the department of
security for multiple choice questions,
keep your report handy. If it fails, the card is
dead. Make sure to fake the number of the
cardholder, otherwise, you may be
ask other questions like the number of
driver's license, the license plate number of
vehicle, etc. Those are questions for which
I probably don't have the answer.
Now, what he wants to do is change the
billing phone number. A dialogue
The sample with the agent can be the following.
You: I would like to change my number to
phone. This phone will be disconnected tomorrow
and I want to give you my new main number for
that you can communicate with me if there is something.
Agent: Alright, I see, what is the number?
You: 234-567-8901.
Agent: Thank you, is there anything else I can
do for you?
You: No thanks.
Agent: Thank you for calling Chase, that
have a wonderful night.
Once the verification part passed, the
the rest is quite simple and relaxing. Now that
the billing number changed, let it rest
card for at least 5 days. Do not make
no transaction. The cardholder
it will also continue to use your card with
normality. At the end of your call, if it failed.
the MMN question, is it possible that you want
remind the agent to change the MMN in the
file to avoid problems the next time that
call.
Also take note, at any time, if
the agent wants to put him on hold, or says that
He needs to verify something and will return, wait for him to do so.
put on hold and hang up. Basically
It means they are going to call the cardholder.
If this happens, you may want to wait until the
less than 48 hours before calling back, and you will see
only in the automatic instructions if the card
Is it burnt or not? Maybe they didn't call the person in charge.
from the card, but in 90% of cases it
they did. It happens, especially with Citibank, to
who likes to replace Verid's questions
by a quick call to the cardholder.
Questions often change when
they call, but they always follow a pattern
determined. From experience, I will give you the tokens
what the four big banks usually ask for, but
we are aware that they can change or
They can ask you other questions if they think that
you are fake. They can ask you for your age to
confuse him, since it is possible that he does not have to
calculate it quickly enough using the
DOB. If this verification does not pass, it will be
transferred to the Verid department.
Chase Bank, level: difficult
Full name
• MMN (if failed, last transaction)
Last 4 of the SSN
Citibank, level: intermediate
Full name
• Password (pet name, MMN,
favorite pastime or best friend, if it fails, the
last 4 of the SSN and CVV
Postal address
Phone number
Bank of America, level: easy
Full name
• (sometimes) Verbal password, which is MMN (if
failure, DOB)
Last 4 of the SSN
Capital One, level: medium
Full name
Last 4 of the SSN
MMN (if it failed, date of birth and
postal address
Since he has to wait 5 days, it is a good
idea to create an account on your target website,
browse through the articles, put some in your
cart
read descriptions. Try to seem a
legitimate buyer. Remember that $1000 is
a lot of money for the average American
and if it shows that it does not care about its money and
simply throws items in their cart,
raise flags. It seems that it matters to him how much
slope.
There is also a technique that works well.
with Citibank: when the automated system you
ask for the MMN, if it fails, you will hear "the agent could
need to ask verification questions,
if successful, it will be connected and everything will be very
simple. When the automatic system asks you for the
password, say "Jope" while putting on a tone
high in the sound O, then lower it slightly the
tone. Say the word at normal speed, like
when talking to someone. This
will trick the automated system into believing
that he did well. He may have to come back
try it 2-3 times to make it work, but it
I got with almost all my accounts. This it
it will save many problems with the agent and will make
that the call be extremely easy.
Once you have gotten rid of this
verification process will be easier the
next time I call the bank to request
this account. So let's assume that he/she followed me
and let it rest for 5 days. Call again
and this time, we will add a shipping address
temporary to the account. A transcription can
be the following:
(pass verification questions)
You: I want to make a purchase on Newegg.com
but they ask me to add a temporary shipment
address in the file. I'm not sure about
how does it work, do I just tell them where I want
Did they send my order? Agent: Allow me.
help you with that, we can add a
alternative address on the account, what would it be?
address?
123 Fraud Street, Cardingville, CA
98765.
Agent: No problem, Mr. Layton, I have
I have noted the account for you, is there anything else regarding it?
How can I help you today?
You: No thanks
Agent: Have a good afternoon.
Almost all banks allow it, except
Bank of America, which can only change the
postal address. That is why your cards do not
they are the best when it comes to cards of
level 3, but some stores will make a
conference call with the bank to avoid
this restriction. Chase works better for
temporary shipping addresses, but it's difficult
from ATO. It all depends on your skills and with
what you feel comfortable with. All the banks
Americans accept a address
Canadian and some banks may accept
an international address.
Once you have added the address
alternative in the account, it is time to do the
strike. Enter your account on the website that
if you wish to register, buy a little again and
then proceed to pay. Try not to exceed $
2000 per order. Enter the address of
correct billing, come back a check the
information. Enter the phone number of
billing (the one added in the file in the
bank), then your shipping address. Check
three times all the information to verify its
precision.
Then, send the order. You may receive
a VBV or MCSC form, but if it has the
required information, it should not be a
problem. Enter the information you wish
obtain and send the order. Also, some
websites like TigerDirect will ask for your date
of birth and they will ask you 3 questions about
verification to respond. These are records
public and can be easily found in their
background report, so don't be alarmed.
If you fail 1 question, you will be asked a question
Additional. If 2 or more fail, the order will be placed.
waiting and things will get better
difficult, so try not to fail.
At this point, two things can happen.
When you send the order. It depends on the habits.
of the cardholder's spending and will facilitate or will
it will make things difficult.
The order is processed without any problem and
go to 'pending' status.
The transaction is rejected and the website says
call the issuing bank. If this happens, call
to the bank, the system will act as if the card
it was burned (transfer without questions
additional) and a fraud agent will respond.
Remember, the card is yours, tell them you authorized it.
the transaction, but does not know why it was declined.
Generally, it is easy if you have the information.
correct, but if they already made the ATO account before, it is
likely that I have everything necessary. When the
agent tell him that he is ready, resend it
order on the website. Call as soon as
accept the rejection, do not wait, otherwise, the
the actual cardholder will receive a call that
does not wish for me to receive.
Very well, the order is now being shipped and the status
is "pending". The following section will tell you by
some orders are canceled (errors of
novice) and why in his case everything should be
Good. Breathe deeply and move on to the next one.
section.
Section 1.3 - Why Orders Are Canceled
When a website receives an order from
approximately $1000, we understand that
try to protect yourself. What is the first thing you will do?
a website to check the order? That's right,
they will call the issuing bank and check if the
billing phone number that
you entered is correct, otherwise I will
they will ask for
and it will ring. You can answer the call, or the
the cardholder will do it, depending on whether
ATO calculated the account correctly.
That's why the orders are cancelled.
when beginners place an order with
credit card and expect to receive an iPhone
free from the Apple store. They are not fools and
they want to protect themselves. However, if it was dealt with
change the registered billing number,
you will receive the call and will be able to confirm the order.
Not so fast, a call is not
simply 'Is everything alright?' rather
a verification call in which they want to see
if you are really the cardholder or not. A
sometimes they ask you verification questions
similar to the questions of Verid, but all the
questions are taken from public reports.
They can also ask him if he put the address.
of shipment in the bank file (hopefully it
they did), and they will call the bank to verify. Furthermore,
in some exceptional cases, they can carry out
a conference call with you and the bank,
but the usual questions will be asked,
what do the last 4 numbers of the insurance mean
social date of birth last
transactions, etc.
If he is a rookie and just enters
credit card information on a site
web with the hope of getting an iPhone
free, you will see that the order changes to the state
Canceled without any details and not even
you will receive a call. This is the reason why
people are posting threads about "the untangling doesn't
it works " and they get the same answers.
If the verification call went through, the
the representative will tell you that everything is fine and that
They will send the order today. These are good.
news! At this stage, I received 100% of my
articles, I never had problems beyond the
verification stage. You can now have the
temptation to visit another place; resist the
temptation. Your ATO card can almost be
consider a level 4 card in your account and
he can do whatever he wants, so he has a
high sentimental value. Wait for it to be sent
order and the package leaves the merchant beforehand
to go to another online store.
I recommend carding in the morning, to
avoid leaving a charge on the card for too long
time. You never know how often a
cardholder reviews their account statement on
line. I had cards that would expire in a few hours and
others lasted 3 months. Once it is sent the
package, you can load the card at another store,
without needing to call the bank, as your
Delivery address is already registered. Please repeat.
until the card burns. Once it
you have burned, never show your face again
face in the drop. The alternative direction is in
the bank records and can send to the
law enforcement forces to this place. A drop is like
a condom, use it once, do all your
business and throw it in the trash, because it gets dirty.
Another verification step they can take
is to send him an email requesting
scans of their identification documents,
like passport and driver's license. These are
they can be easily retouched and there are templates
available everywhere. The invoices of
public services are also quite easy
about forgery, so don't worry about this
Do what you have to do, but be
fast.
Another step you can take is to put the
shipping name on the package to a family member
yours, for example, if the name of the holder of the
The card is James Latyon, send the package to someone named
Harry Layton (I searched for a name that is in the
report and ask for your date of birth, just in case
perhaps) and say that you are sending the package to
your son / brother / any relationship you have
in his report.
Also, please note that no method
it is perfect and the website can cancel the
request simply because he/she believes it is not
sure to process it. Nothing is perfect, but if ATO
He made the account successfully, it should be easy.
Remember to stay below $2000 per
order. You never know what other tricks they may have.
use to catch you.
Always choose the fastest shipping method.
Some say that he raises flags, but if
he did everything else correctly, that will not be the
reason for your order to fail. In addition, it reduces
largely their chances of receiving a
package intercepted, which is a pain in the
head and makes their efforts futile.
This brings me to the topic of how to find a
place to send your order. You can send it to your
house without any problem, if you want it to
the police knock on your door and make you travel dirty to
the police station, and get into a lot of
problems. So keep reading to find out
How to send your order safely.
Section 1.4 - Drops
A "delivery" is a place or location to which
they are sent illegal products, loaded or
stolen. It has to be a place that does not have
no connection with your current life and none
way it is linked to you.
Finding a drop is not really difficult.
You can go to Craigslist and search for houses for rent, or
just driving through your neighborhood in
search for houses for sale where I can send
merchandise. Make sure the house does not have
large windows allowing the driver to see
that the house is empty. Does not want the package
It is returned to the sender for that reason. Just use your
brain to find a decent house at the
What do you think is worth sending a package?
Generally, choose a nearby city.
yes, but not in her neighborhood.
The big day has arrived: the UPS tracking
Ready for delivery. Yes! Now
check if the package requires a signature.
All carriers require it, except
UPS. For UPS, you can see if Signature required
It is written on its tracking page. If
nothing mentions a signature, or if not sure,
signature not required.
Method 1: act as if you were far away
If you don't need a signature, you can leave one.
note on the door, "we are out, please leave
the package here, take this as my signature " and
also can print the page of
order confirmation showing the number
for follow-up and put with your note
strengthen their case. The driver makes the decision
final about whether to leave the package or not, but for the
Generally, there is no problem with UPS when not
they need a signature. Sign the note, place the page
of order confirmation with her, stick it in
the door and wait in your car not far from the
place. When the driver leaves the place,
Take the package and put it in your car.
Then skip method 2 and continue reading.
Method 2: Act as if you were the owner of
place
The second method is when it is required
a signature. You will have to meet face to face
with the driver. Remember one thing, you can
relax. The driver's job is not
investigate the fraud, but just make sure that
the package is received correctly. So
you must make him believe that the package is yours, to
they don't care about fraud (but don't be
stupid and talk about your crime). Take a copy
company from the order confirmation page,
the tracking number opened on your phone
smart (use VPN!), and seem like you have
state waiting. You can wait in the warehouse,
to sit in the front yard or do what
I want. However, please note that
wait in the car when the driver it
getting out of the car is very suspicious. If
you choose to wait in the deposit while you are
visible, remove the signs of "for sale" or "se
rent " and call the automated system of
bank before presenting yourself to ensure
that the card is still valid and that the police
he is not waiting. you. Greet the driver,
show the papers, sign the name of the holder
from the card and proceed to the next section.
A sometimes, the driver can become
arrogant and ask why your name is not
the same as that which is written on the package or
Why is it not inside? You can say that it
moved recently and put it in someone else's name
person because he has "problems with customs"
. When they become conceited, it can
threaten them to file a complaint in their
local UPS center; generally, they calm down and
They deliver the package. I had a driver.
arrogant on my last trip with cards in
Minnesota, and I had to use this method, and
I finally received my package.
From experience, when you have to pay
brokerage fees (like a package
international), you can call UPS before
receive the order and ask for the amount. Leave a
postal order at the door and the driver will take it
y It will leave the package. It will avoid obtaining a
InfoNotice in that way and the driver will believe
that you are the owner of the place. I did that
many times and so far I have not failed.
Picking up your package at the facilities
from UPS
In some unfortunate circumstances, the
package can end up in the facilities
UPS locations and will require that a pickup is made.
identification issued by the government. This
It happens, for example, if the drop was lost. In that
if so, please do not bother to make an identification
false, as there is a better trick.
The package is generally kept for 5
business days before it is sent back to
sender. The day the package arrives at the
installations is day 0. Two can occur
scenarios:
Scenario 1: receives a call from the
UPS branch
They will probably call him and tell him something.
we have a package for James
Fakename waiting in the facilities for
Let them pick it up. Just tell them that you don't know this.
character. Here is a script sequence
as an example of how it should look:
UPS: Hello, can I speak with James?
Fake name, please?
You: I think you can have the number
wrong, who is speaking?
UPS: This is the UPS branch, we called at
phone number that we had in the package.
You: Oh, I was also waiting for a
package and they didn't deliver it to me. Is this a
Newegg package, a small box?
UPS: Yes, we have a small box
waiting here, for James Fakename.
You: I have a tracking number,
Can you check if the last 4 digits are
3382?
UPS: Yes, they are.
You: I am very surprised, because my
my name is Fake Name and I was waiting for this.
I have no idea who James Fakename is.
They also seemed confused when I did the
order.
UPS: Well, the package will be here, just
come pick it up when it's ready.
This worked for me twice. I had 2 drops.
to look at the same time and I got lost a
package. This allowed me to pick it up.
Scenario 2: does not receive a call
On the morning of the 5th, call the number
free and ask them to transfer it to the branch
local. You can create the same scenario and
ask about a package that is waiting for you there.
You should sound a little confused in your voice and look
as someone who was a victim of a mistake from the
online store, and they will gladly deliver it to you.
package. Every time I did it, I never me
they didn't ask for any form ID and it was
everything's smooth.
Do not give your real name. Try the card first.
Go to (call the bank) and do it only if the card
is still alive, otherwise it could be
dangerous. You can also send a mule if
he is too afraid, but I showed my face
sometimes when the card was still alive
and I never had any problems.
After receiving your package
Sometimes I skip this part when I'm lazy,
but you must be very careful. Your freedom is not
it has a price, so take 5 more minutes to
take this precaution.
Drive to a park or public place
close and open the cardboard packaging. Look for
any device that may be tracking
its position, like bugs, GPS devices, etc.
Then, destroy the shipping label (you can
burn it to make sure), throw away the packaging of
cardboard and now has in its hands a precious
article that he charged with his ATO card. Also
burn me the order confirmation page if
she decided to take this route and took her to the store! In
at this point, you can consider your robbery of
"Success!" Drive home, relax,
you are the owner of the bank and the website. You can
to boast about it in the forums rightfully.
If the card is still valid and there is no
no tracking device can return
to place the card in the same spot until
I burn myself. Take advantage of everything you can.
Burn the card until it is crispy.
Memory news obtained $10,000 in
electronics on a Chase card on the same
delivery, divided into 5 orders. This was a
week to make money.
Very well, the article loaded, ATO made the
account, obtained articles, more articles, burned
that drop until it becomes crunchy too, now
the card is dead ... either from above the
credit limit or marked by the holder of the
card. Don't ever show your face to that drop again
and enjoy your products!
What happens next? Keep reading to
find out.
Section 1.5 - Chargebacks
A recurring question in the forums is,
when the card is declared stolen and the
transaction is disputed for fraud, who receives
the blow?
In the case of a card transaction
present using chip and PIN in countries where
using that technology, the bank takes the hit
when the transaction is declared fraudulent.
In all other cases, it is the
unfortunate merchant who takes on everything
loss. So, if Newegg card for $2000,
they paid around $1600 for the merchandise that
they send him, and they are short on money because you
he loaded them, so they have to make 6 large ones
similar orders without problems to cover that
loss. Now understand why they do the
verifications and do not want to be loaded.
Some large merchants as
TigerDirect and Newegg will simply devour it.
the loss and will assume that they failed in the
fraud detection, but the merchants more
children will file a formal complaint in their
police department. Now, are you going to investigate
the police? It depends.
If a trader reports a loss of
$200 for an order shipped out of state with
a stolen credit card, there is a 99% chance of
possibilities that the police won't even open
an investigation for that. However, if
they report a loss of $3000 using a
stolen card from the same state and sent to a
nearby city, LE (Law Enforcement) could
act on that.
It also depends on the volume of complaints,
amount of loss compared to the
size of the city and if there is an obvious pattern
among the complaints of fraud or not. Must try
that their orders cannot be linked to each other and
use your common sense to avoid creating a
pattern what can trigger a
research.
It also depends on whether the holder himself of the
card decides whether to file a complaint or not.
Whenever your bank reimburses you (what is
they probably won't care and
just forget about all that. But
some crazier people may decide
file a police report for theft of
identity. Again, there will be an investigation.
if there is an obvious pattern. It all depends on the
city you are talking about.
So remember, when loading a site
They assume the loss in case of a web.
counterclaim, for which they want to protect themselves.
You have to be smart and ask yourself: if
if I were in the owner's shoes of the website,
How would I catch the scammers?
Sometimes, you may receive an email
store's email asking him to
provide more information about he
counter-claims, such as forms or documents of
authorization. Just ignore that email
electronic. Do not become arrogant and respond
"Got you!" Because it could make the difference between
an investigation or not. Keep it dead.
Sección 1.6 - Fraude de garantía
A very fun type of virtual card is the
guarantee fraud. I obtained some CPUs from
$1000 from Intel and ASUS motherboards using
this trick. This is how it works.
Many companies, especially those of
electronics, they offer what is called "RMA"
advanced. This is a type of replacement for
guarantee in which the company sends you first the
new product, along with a box of
return for you to return the
defective article. Sometimes, they ask for a number.
of credit card to ensure that
it will return the defective item. Here is where
we can take advantage of the system.
It works with Dell, Intel, and ASUS, maybe.
many others, but these are the ones I have
experience so far. You can send messages
by email to eBay sellers
to request the serial numbers of the
products, or it can simply label a
product and request an RMA using your
serial number. Call the manufacturer, say that your
the product is defective (use a diagnosis
that ensures that this product is really
defective, like "the graphics card does not display"
nothing on the screen, I tried 2 screens, but
works with other video cards
ask if they offer advance RMA, in their
most will do it. Use a level 2 card and
send it to your delivery address. If they ask
why, just tell them that it's for
vacation there and that his computer broke.
When you receive it, take the package and
disappear. You just got more free stuff
with a credit card that eventually, such
sometimes, get a chargeback, but
you understand the point.
For Intel, they ask for 5 lines of text in the own one.
CPU and a credit card to hold, therefore
What the unit must have in its hands so that
function.
For ASUS, the serial number is enough,
a credit card is required.
For Dell, it's the easiest, no card needed.
of credit, just ask for your free item for
phone without a credit card, just needs a
name and an address.
Feel free to discover weaknesses in the
systems from other companies, this is a type of
relatively new fraud and has not been
patched. Many people use it to obtain
Free Xbox One from Microsoft. Most of the
companies require that this claim of
guarantee is done by phone, but it doesn't
Don't worry, it's simple and most of them seem
do not worry about your job. I had 2 rejections
when cutting Intel, the third one worked as a
charm, and they didn't even become arrogant at
regarding.
You can keep one and sell the other in
eBay or Craigslist, it's easy to make money. The
the issue is that they have to try to detect the
fraud while offering a
fluid experience to legitimate customers.
We simply abused the system.
Section 1.7 - Choosing the Best Cards
If you do not have access to the complete ones, or you have
an automatic CCV store and wants to get the
maximum match, there is a trick that can
save you money, if you have a little time to
to invest. It works with any store
automatic whenever I can see the name and the
postal code of the cardholder.
First, look for the desired BIN. If you
They like ATO and want good cards, the BIN.
426684 and 438854 work well, but that
it's up to you. If you can't search by BIN,
simply choose Credit Cards from
any bank. Once it is on the list,
I searched the headlines of cards what
correspond to their gender, and for each one,
do the same.
Search for your name and check in Backstab
o SSNFinder to check if it can
find them. Most of the time (> 50%),
he will not do it, especially if the cardholder
is under 45 years old. So do the same for
the following result. When I have the SSN and the
date of birth of the cardholder, before
to buy the card, do the following to
verify the information
Go to peoplefinders.com and get your
background report. Check if the DOB
they coincide, and if the list of addresses does too
match, to ensure that your SSN and DOB
be 100% accurate. When I am sure,
I bought the card and I bought SSN and DOB. Now
You have a complete. You can go to archives.com or
ancestry.org to obtain your MMN. Here it is
how to search;
Card an account in either of those 2
sites (the level 2 card is sufficient, it is very
easy). Get the name of the mother in the
background report and search using your
name and surname, and the date of birth
correct. Look for records of "marriage", yes
cannot find any, search records
of 'birth'. If you don't find anything, try
search for the marriage records of the father.
Please note that not all states /
counties make their records public, therefore
it is possible that I do not find them in
absolute; it's fine, just make one up when
I authorize the card.
In this way, you can clean the stores
automated and select only the cards
where you can have complete information. This
it's my trick to get only good cards.
Of course, the best option is to find a
full provider, but there aren't many like this
that you scale your cards as you wish.
Make sure your cards are fine.
organized. I have included an Excel file of
show where you can see how they are
organized my cards. All the cards are
they can be classified by name, address,
number
social security number, etc. Check the
file to obtain more information. Also,
use line colors for different meanings.
For example, the white rows mean that the
the card is mine and it has not been used yet. Call the bank
before adding the card to the list, because
wants to get rid of junk cards from
immediate. Yellow means that the card is
burnt and blue means
that the card is being crossed out
Currently, so I know what to focus on.
Green means that I ruined the credit history.
of the cardholder using their date of
birth and your social security number.
When I searched for complete ones, I looked at your file of
Excel and, with the colors, you will be able to find your
quick card.
Then, simply check the balance.
I studied the background report and it will be ready.
to go to the big stores and get things in
your store.
Section 1.8 - Commercial Fraud
Do you want another one (and probably easier) for
send items to your store and get tired of carding
Newegg and TigerDirect? Very well, I will show you.
another method for that. This method works
better for Canada, but it's also very good
for the U.S.
Can find any supplier
important that only sells a clients
commercials. For computer parts, for
for example, you can select ASI, Synnex, etc. The
The objective is to obtain the registration certificate.
advertisement of a company in the city that
wants to have its delivery. This certificate is usually
it is public information and can be found at
the registration records according to the state or
province in which it is located. Once that
you have obtained the registration documents
advertisement of a company that operates in the
same field of activity for which you wish
get articles, ready to hit the
supplier.
Request an account in one of those
suppliers using that document, place
all the information of the business address,
but put a delivery address near
that place and its recording phone number.
Both suppliers (ASI y Synnex
they usually don't call, but just in case, it is
better to stay safe. Generally, one
they need between 24 and 48 hours to open a
account. 'His name' is the name of
true owner of the company. In the
credit application, do not request net terms,
just write 'no credit' and leave them
to know that you will pay before they send you the
articles.
On the card authorization form
of credit, write the name of the account holder
card (pizza), the address, the number of the
card, the expiration date and the CVC code.
Let them know that this person is an 'officer'.
in his business, as a sales representative
remote. Once the request is approved, it is
ready to go and get large amounts. The
the reason is that they do not perform verification when sending
orders, since they hardly ever receive orders
fraudulent. They assumewhat the clients
commercials will always be legitimate, but from
Indeed, we use the commercial documents of
another person to deceive them and make them believe
that you are the owner of the company.
I was able to take out more than $5,000 per order using
that technique; the merchant considers himself low
risk, which is why there are very few decreases
and the verifications are almost non-existent. With
computer parts, it is extremely easy
do it, you can try with other suppliers
commercials. Now you are playing in the big
game and the possibilities are endless. Make sure
not to show your face in the fall once it
card burns out, as they will really try
discover what happened.
Section 1.9 - Newegg and TigerDirect
Did you always want cards from those 2 big ones?
merchants for obtain products
electronics? I'll tell you how. This is a
normal difficulty if you know what you're doing and
if it is good in social engineering. You need,
at least:
1) The ATO of the cardholder's account and
the billing phone number is
they changed their burner
2) Shipping address registered with the bank
Complete background report of
cardholder
4) Story about why he/she sends that
address
5) Local area of the cardholder:
restaurants, shopping centers ...
And remember, the forwarding companies of
emails are included in the blacklist of those
merchants. Do not attempt to send to MyUS, Bongo,
etc., as it will automatically cancel the
order. What American would use a card
American to send it to a company of
transport to take her out of the country? None. To have
a normal delivery address.
The number 5 may seem strange, but it is
true. To some people, including myself,
they have been asked "can you name a
local restaurant near your house?
make sure that you are the cardholder.
So it's not a bad idea to familiarize yourself with the
surroundings (large shopping centers and
restaurants) in case that happens. I'll tell you
You will appreciate it later.
Therefore, take your time to browse,
look around, read descriptions and
appear as a legitimate buyer. Once
that I did that a few days ago and the account is
list, send the order and try not to exceed the
$2,000. The order will be placed in 'pending' status.
wait " y you will have to talk to him
verification department. I will describe the
procedure for TigerDirect, but Newegg is
quite similar.
The TigerDirect website will ask you
addresses, credit card information,
then you will have to pass VBV / MCSC. After that
they will ask you your date of birth.
Then, 3 verification questions will appear.
They are public registration information about the
cardholder and can be found in your
background report. Try to have as much
information that the cardholder feels
He is your friend. Answer the 3 questions and be
quickly. If one fails, a question will be asked.
additional. If 2 or more fail, forget about your order.
Once I send everything, your order will be in
state "on hold". You must call to
verification department. The conversation
it is the following, generally:
Representative: Thank you for calling the
verification department of TigerDirect,
Can I have your order number?
You: 123456
Rep: Very good, what is your name?
You: James Layton
Representative: Thank you Mr. Latón, allow me
check the order for you. (it will be on hold
about 2 minutes
Representative: Thank you for to wait
Is <name on the package> a tenant in the
shipping address?
You: Yes (giving an incorrect answer nullifies the
order)
I couldn't locate that person in the
system. Then you will be offered 2 options. Or
We send to your billing address or must
call your bank to add the address of
send as an alternate address in the
file so that we can send it there.
I already did it.
Representative: Oh, really? Okay,
Let me check that for you. Please wait.
he will be on hold while they call his bank,
sometimes they can make a 3-way call
Representative: Very well, I see that the
Shipping address is archived. Thank you, is it
Well, if I call that phone number,
123-456-7890? (any phone that is the
main billing number
You: Yes, of course.
Representative: Thank you, wait.
(the phone will ring, answer the call or the
the order will be canceled
Representative: Very well, we have verified
successfully your identity, Mr. Latón. We will send you
the order tonight.
See the traps in the dialog box of
above. It must assume that the shipping name is
a tenant at the address. For example, if the
the cardholder's name is James Latyon,
can you send it to a Joseph Layton and assume that
he is your son, but make sure that name
be in the background report and have your
date of birth. Sometimes
they can request it if they suspect.
It is also a good practice to avoid the
Hotmail addresses; anyone can do it
a fake Hotmail with someone else's name.
You must use a personalized email.
with a custom domain. If you read the
next part (section 1.10 - Stripe Cashout),
you will see how to configure your own domain.
Let's say your fake store is bestclothes.com,
and the name on your card is James Layton,
you can create a mail electronic
jlayton@bestclothes.com and it will look like a
business email address and
he will lower the red flags. Believe me, he plays a lot
when the hard merchants are loaded.
Next, you need to ensure that you can
answer the phone when they call the number of
billing. If you do all that correctly,
will be ready and will get its parts. They do not ask
document scans, everything is done by
phone.
Section 1.10 - Withdrawal of payments with thresholds
If you are not really interested in carding
physical products, you may want
interested in how to make real money with your
cards. For this technique to work,
will need:
A bunch of level 2 cards (I don't know)
requires the address
2) HTTrack program (can be downloaded)
free)
3) Notepad ++ program (can be downloaded
free)
4) Delete bank account
5) Dead full (name, address, date of
birth, SSN), referred to as "holder of the
card
Basic computer skills
The first step is to check stripe.com for
see if your country is on the active list. From it
on the contrary, you may want to obtain a
banking collapse in an active country, generally,
The U.S. is the easiest.
The first step is to create an online store.
false. This is very easy, you can search in
Google, for example, "US clothing online"
and jump to page 12 of the results for
get smaller stores. Try to
find a store that has a very design
simple, around 100-200 articles, avoid the
big ones. Take one that doesn't seem to be used much
Javascript. You might have to look in 4 or 5
stores to find that.
Then, open HTTrack, start a new
project and reflect that website. This will create a
local copy of this website on your computer.
In the best case, try to stay for
below 800 - 900 MB. Once I have a
local copy of the store, check if you can
browse, view articles, etc. Of course, all the
store will not work, for example, will not be able to
registering, that's normal. Try searching
item descriptions, browse through
categories and seem like a normal user. Once
Having done this, you now have a copy of that store.
online, already prefabricated, and took a few minutes
(maybe hours) in duplication, but it doesn't have to
to stay in front of your computer.
The next step is to open the page of
contact using Notepad ++ and edit the
contact information with a name
customized that he decided to do, and the address /
phone number to match the
address and the phone number of the cardholder. If
There is a Google map, make sure to edit it.
also. This is where the skills
Basic computer skills are useful. If you do not have the
no idea how to edit HTML, I suggest that
obtain an online course, as it can be a
invaluable skill. It is very easy to learn.
Look for some footnotes, policies of
privacy and terms of use where I can
appear the previous name, and edit it. Use the
common set here. Now you have your store of
customized clothing, which took less than 1 hour
in manufacturing, and it seems that he has a business
legitimate. Hooray!
Use Notepad ++ to search and replace
the regular expression "<! - Mirrored [^>] * GMT ->"
never include the quotation marks in any example and
replace with nothing. This will remove all the
comments 'Reflected by HTTrack' in the
source code, in case they see it.
However, it is possible that you will get a
a bunch of folders in your site's directory
web. Let's say the duplication is finished.
and it has a folder www.fakeshop.com and a
img.fakeshop.com. Do you wish to move the folder?
img.fakeshop.com and place it inside the folder
www.fakeshop.com. Then, search and replace
... / img.fakeshop.com and replace it with
img.fakeshop.com in all files *
.html, and everything will be fine. Repeat for each
concurrent folder that you have. Make sure to
who can open the index.html page in your
folder www.fakeshop.com and everything is displayed
correctly.
Search and replace the phone number of
the store and replace it with a toll-free number to
luck (they will never call). Do the same with the
directions. For the phone, make sure to
include all formats such as 123-345-6789 and
123.233.2133, etc. Review everything again. Then,
remove the email addresses.
Haga a search y replace "@"
realshop.com " y replace it with "@"
fakeshop.com
Ultimately, get rid of all the
occurrences. Change the names of the folders
what includes 'realshop' and replace it with
fakeshop, search and replace all
files for "realshop" and replace it with
fakeshop. In this way, there shouldn't be
ways to recognize that the store is fake. It can
change the logo at the top of the
page, or if it is vague, change the name of the
file of the logo to another name and the
browser will simply show a 'no image
found, it's no big deal.
We have finished with the creation of the
store. It may seem like a large amount of
steps, but doing all that search, replacement
and preparation should take less than 5 minutes
when I am used to it.
The next step is to host your website. It is
important to use an anonymous host, for this
that for this example we will use Arvixe. It used to
having this much with my fraud sites.
Use a fictional Hotmail address that
correspond to the name on your card, open a
account in your hosting company and host your
files in it. Almost all the hosts
they will allow to register a domain. It is possible that
they ask you for information about the address, so
give them the information about the address of the holder of
the card. So set up the account, register the
domain and host your files for the fake store.
Just upload them via FTP (if not
Do you know how to do it? Get basic lessons.
Make sure your store is online and
works, for example, let's assume that your
the store is myfraudsite.com. Make sure that
myfraudsite.com show your store and what
can navigate.
It is also important that it changes the
WHOIS information to match the
name that you will use for your Stripe account. Your
web hosting provider will allow you
do it for free. Anyone can
search it on whois.net since it is about
public records. If the bank account, the
the store and the WHOIS have different names, they
They will raise flags. Assign the 4 types of
contact to match the information
of the victim. It can be changed later and
many times anyway.
Then create an email address
electronic related with this host
generally with the prefix 'admin '. In this
for example, we will create "admin@myfraudsite.com".
This makes you look legitimate. At this point,
must have its online "store" up and running and
an associated email address.
Everything must be hosted on an anonymous host.
They usually charge $10 per month in bitcoins. Now
We are ready to start making money
with our fraud site.
Before opening the account on Stripe, you must
make sure to completely spoof your VM.
It also disables the Flash plugin.
Stripe has a very smart way of
identify themselves, which means they can
identify oneself
even if it changes IP and changes
browser. Better take precautions and see the
section 2.6 to appear completely as
another person.
Open an account at stripe.com using this
email address and keep the
account in 'test' mode. Create a page
called "charge.php" and upload it to your store
web. This will be the file you will use when
send a shipment. Here is the code that you must
put on the page. Please note that you can
adapt the code as you wish, but that is my
personal example:
<?php require_once('./lib/Stripe.php');
Stripe :: setApiKey ("sk_live_xxxxxx"); // <-
This is your Stripe key
try
Processing ...; Stripe_Charge :: create
(matrix (
$_GET['monto']
usd
matrix
number => $ _GET number
$_GET['mes']
año
),
This will appear in the
extract from the card
Load OK; //Success!
catch (Exception $ e) {
$error = $e->getMessage();
Error:
}
?>
For your convenience, I have included this file.
in the package, as well as the package of the
Stripe library. They are difficult to find in your
site and I am doing you a favor by including them.
Take your time to understand what
do this code. It will call this page
using this query:
Translation cannot be performed on URLs or non-text content.
4266841200000000
2016
This will charge an amount of $68.00 to the
card 4266 8412 0000 0000 that expires in February
from 2016 with the CVV code 333. It's that simple.
Change the parameters to connect the cards
to have and try to vary the amount of the charge
also.
Make many variations using the key of
test to make it look like you really did
some tests. Make charges and see the
result, and get familiar with this fragment of
code.
When I have a work example, I will change.
your Stripe account to live mode. You will be asked
that provides the name, the address, the date
date of birth and the last 4 digits of SSN
of the cardholder, so please continue. Ignore
the tax number part, place it
website address, put a small
description of your choice and put the account in
live mode.
Now you will be asked for your bank information.
Here is where you will provide the route number and
the bank account number where you want
receive the money. All the information is full
and you are ready to make money!
You can use any automatic store to
get many cards. You only need the
card number, the expiration date and the
CVV code to continue. Get cards
cheap, this is the easiest transaction that
you will have to do. You can try Vault Market,
that offers $4 U.S. cards at the moment
to write this article. However, please have
be careful, you must take precautions to avoid
that your operation is closed, so read the
next part before going crazy with the
cards.
First, you must maintain a rate of
approval higher than 50% in all of its
transactions. This means that more than the
half of their transactions must be
approved. Therefore, it must have a good
source of cards. If the rejection rate is
too high, will refund all payments to
the cards and will close their account.
Secondly, you should use cards from the
same country where supposedly
Find your fake store. If you have a store in
the United Kingdom, uses cards from the United Kingdom,
even if they are more expensive. Not 100% of their
cards must follow this rule, but try to
keep it above 90% to avoid
suspicions.
Thirdly, vary the amount of the charges
what it does. They vary greatly, for example, between $50
and $300 per transaction. Do not exceed $300, already
that could receive rejections that are included in
your approval rating of 50%. You don't want to
they turn you off. Also, try to wait a little
between transactions, even if you love money. A
we all love money, but we make it that
seem real.
The rest should be common sense. The money
It is deposited after 7 days for the first one.
transaction and 2 days for transactions
subsequent. There is another method that has been tested
once and has proven its effectiveness: the card
anonymous. We may be afraid of the
chargebacks (I will talk about them more later)
forward) before 7 days, so that's how it is
how we can avoid it. When your account is
in live mode and working, use a card
anonymous to carry out a transaction of
around $100 (you will recover it anyway
money in your bank account), and 3 days later,
use another card to make a transaction of
$50. Obviously, the money will not be refunded and will
will deposit in 7 days. When finished, begin
to hit with real pizzas. In this way, it
breaks the 7-day barrier that could
make it close.
Now, what about returns?
charge? If a customer disputes a charge,
mainly with a "Fraudulent" code,
you will receive an email that will inform you
that the charge has been disputed, a fee of
chargeback of $15 to pay and the
The amount will be deducted from your next transfer.
It depends on you if you believe that the amount of
chargebacks are acceptable in comparison to
the number of cards it can process. Do
your calculations, and when they begin to appear
too many rechargeable batteries, it's time to throw them away
to the trash.
From experience, chargebacks
they take an eternity to arrive and less than 25%
of its transactions will end in a
chargeback. I shouldn't see a
cargo back at least 10 days in advance, and
probably more. I kept one of my
previous accounts and, after 2 months of
inactivity, 38% of the transactions had
a chargeback has been received, therefore not
It is something I should worry about.
To delete an account, simply close
your bank account or upload the information of
your account on Stripe to another random account (the
same route number). Remove all the
files of your hosting, place the files
of a new fake store, register a new
domain, open a new Stripe account and
start again.
Repeat until your wallet is full.
Always use a VPN when accessing your website
Oh Stripe, you don't want to leave your real IP for them.
communicate with you and knock on your door!
However, a piece of advice, I do not recommend.
use Ally or Netbank, as they often mark
the transfers coming from Stripe and
they block the accounts. You should go to Evo and
obtain a real bank crash, it may be that you
it costs a little money, but I'm sure it's worth it
the investment is worth it.
Based on experience, Stripe analyzes the antiquity.
of the domain of your domain. You must wait for a
shortly before setting up your Stripe account or
buy a cheap site on Flippa just to
obtain the domain name. This is not
extremely important, but can decrease
the flags even more.
Another way to avoid fingerprints and
looking newer is to use an RDP. It can
buy some in the market and they work
quite good for setting up an account
Stripe. Just log in from that RDP and if the
RDP dies, I simply no longer log in to
the Stripe panel. You will still receive the deposits from
anyway.
If the account is closed, they often say that
the charges will be refunded to the holders of
cards. If this happens, be faster than
they and reimburse all charges yourself.
Refund as much as you can. This way,
you will be able to reuse those cards for another store and
will save a lot of money. Most likely,
the cards do not get burned due to fraud, because the
cargo was refunded. However, when it
do, wait at least 5 days before returning to
use them. This will reduce the fraud score.
For UK cardholders,
Stripe may request a scan of a
photo identification issued by the government in
some time. It's a good idea to make one.
when I start making money with Stripe, to
that I can provide when requested.
It's not difficult to do using Photoshop.
I made several thousand dollars with this
method and it really cannot be burned.
It depends on you to discover what works best
for you!
Section 1.11 - Beyond the ATO - The PTO
When committing an acquisition fraud of
account, also known as ATO, takes the
"property" of the victim's account. Even
if the registered phone number changes, still
they keep a record of the phone number
previous. This is where this section will be useful.
useful. I will give you the transcription of a failed ATO
that I had two months ago and he will understand it.
(pass verification questions)
I call you because I tried to place an order
online, but it was rejected. The charge is $
1500 and the merchant is Newegg.
Agent: No problem, Mr. Johnson,
Let me see what I can do for you, can you
wait?
(from experience, if you put it on hold,
Hang up, it's most likely burnt.
Here it took 5 minutes) Agent: Hello?
Yes ma'am, I am still holding on.
Agent: Unfortunately, I will not be able to cancel
the position and I can no longer provide service in this
account.
Me: How is my card? What do I have to
do?
Agent: You can destroy the card, as it does not
He is the real Robert Johnson.
This is a stinky situation, and there is a
way to avoid it. It must be done before calling
to the bank. What happened here is that the agent
called the previous number, even if I changed it
a few days ago. The cardholder received
the call, and you can imagine the rest.
First, take the phone number
real of the cardholder and use WhitePages
to find out who the provider is
phone. If you can't find it, it may be that
I want to use Spooftel and call different ones.
providers (AT&T, Verizon, Sprint, etc.) and
use your automated system to try to
find out if the number is registered with them.
You can use phonevalidator.com to see if the
phone is a mobile or landline phone. When
you have the victim's background report,
you can see that they often have many
phone numbers. Use the service for
find out which one is a landline phone and which one is a
cell phone. For cell phones, it is
very easy to find the supplier, since the
most of them allow you to call the phone and
press * (asterisk) to go to settings
from the voicemail, so that it recognizes the greeting.
Use your logic and write the telephone numbers,
probably like this:
Phone 1, landline, 555-123-4567, Verizon
Phone 2, cell phone, 666-234-5678,
AT&T
Now, remember, you have the complete address,
date of birth, social security number and
more information about the cardholder, and
Do you know what your phone company is?
What are we going to do? That's right, call diversion!
Call the phone company using the
opposite phone (if the billing number is
the landline, call with the cell phone and vice versa
I falsified the number. When I talk to him.
customer service department, it could be the
next. Don't forget that it is less safe than
the banks, since it is not about finances. But
it can have worse consequences.
Agent: Thank you for calling Verizon, my
My name is Mohammed, how can I help you?
Hi! I will be out of my house at the
next few days but I am waiting for a
important call on my landline. As not to
I can communicate with the other person, me
I would like to set up call forwarding for
receive the call on my cell phone.
Agent: No problem, can I have your ...
name?
Yo: Barack Obama.
Agent: Thank you Mr. Obama, what is your
full address?
123 fake Street, Washington DC, 12345
Agent: Thank you, can you give me your date of
birth?
October 1st, 1845.
Agent: Thank you. Did you know that you can press
72 on your phone to activate call forwarding
calls? This is an easy way to do it.
without calling customer service.
Me: Thank you for the information, however, no
I am at home right now, so no.
I can do it.
Agent: It's fine, no problem, I'll
I will activate it for you. What is the number of
phone to which you would like the calls to be diverted
calls?
That's my cell phone, 456-123-3245.
(your burner phone)
Agent: Alright, do you want me to start?
now?
Yes, please.
Agent: No problem, I activated it for you.
When you are at home, you can use * 72
again to deactivate the forwarding.
Thank you.
Agent: Is there anything else I can help you with?
help him?
Me: No, thank you.
Some phone companies, AT&T for
experience, requests a 4-digit PIN, but it
you can easily skip using the date of
birth and the last 4 of the SSN. The good thing is
that if he has a lot of bad luck and fails (what
it shouldn't happen because it's easier than the
banks), the card will not burn. This is the
PTO, phone takeover fraud.
This word was invented by me.
Now he is ready to call the bank at ATO.
If they decide to call the billing number
(it happens very rarely), you will answer the phone
and will destroy all the suspicions they have. The
the cardholder probably will not be able to
access your account, but that is not your
problem. The first dialog box (ATO
failed) can be avoided if you do it beforehand.
When you finish your business, don't forget to call
a Verizon (or its company) to deactivate the
call diversion. The goal is to obtain things
free, do not make the cardholder lose
friends, why can't you communicate with him,
use a little compassion. If you believe that
you will need your phone line for a few days,
you can use the RingCentral phone system and
decide which numbers you want to receive the
calls and which ones do you want to transfer blindly to
cardholder. It probably will never happen
It accounts for someone messing with his line.
phone company, but you will notice the charge on your card!
Some websites do not require that the
shipping address is filed in the company;
in those cases, you can take a PTO without making a
ATO and enter the correct billing number
on the website. Receive their call and
confirm the order, and restore your telephone line.
Use your imagination for the rest.
Section 1.12 - Prevention Algorithm
Maxmind frauds
The most popular software used by the
traders for fraud prevention is the
Minfraud software, designed by Maxmind. It
used to keep fraudsters at bay,
but its formula is not so secret. I will give you the
formula and I will explain the variables. There is a
way to keep this score low.
Many stores have their own limits.
pre-established, which are not made public
because each store is different. For example,
a store can say that more than 7 send the
request for manual review and more than 9 they cancel.
The definition of the variables is as follows:
1. IsFreeEmail Is the email address
free supplier electronic like
Hotmail or Yahoo?
CountryDoesntMatch Are they different
Shipping and billing countries?
Is the user using an anonymous proxy?
an anonymous proxy like a VPN or Socks in the
blacklist?
4.
High-risk country
Does the order involve Ghana, Nigeria or
Vietnam? Updated list frequently.
5.
BsDistance
Distance between billing addresses
and shipping, in kilometers.
6.
MaxEarthArc
The half circumference of the Earth,
currently set at 20,037 kilometers.
7.
BinDoesntMatch
Is the BIN from a different country than the address?
IP used to place the order?
8.
Bin name doesn't match
If the user is asked for the name of the
bank, did it respond correctly?
9.
CarderEmail
Was email used to commit
fraud on other sites that use Maxmind?
HighRiskUsername Was the name used
user to commit fraud on other sites that
Do they use Maxmind?
HighRiskPassword Is the password
the same one used for fraudulent orders?
12.
Ship Forward
Is the shipping address a company of
email forwarding?
13.
ProxyScore
Is the IP address a proxy or socks?
The algorithm used for the calculation of the
the fraud score is the following:
2.5 * IsFreeEmail
+ 2.5 * CountryDoesntMatch
+ 5.0 * IsAnonymousProxy
+ 5.0 * High-risk country
+ 10.0 * min (BsDistance, 5000) / MaxEarthArc
+ 2.0 * BinDoesntMatch
+ 1.0 * BinNameDoesntMatch
+ 5.0 * CarderEmail
+ 5.0 * High-risk username
+ 5.0 * High-risk password
+ 5.0 * Direct shipping
+ 2.5 * ProxyScore
Maxmind score for this order
Now that you have this formula, let's see how
we can reduce the score to almost 0. Although
many stores use proprietary software, this
it is the most used and the most popular. Given that
there is no way to know what software the uses
store, just pay attention to all the variables
and I tried to look legitimate. Here is a
more detailed explanation of each variable and
how to pay attention.
IsFreeEmail
This variable is set to 1 if you use a
free email like Hotmail and
Yahoo, so don't use it. I'll give you a trick.
Do you remember the Stripe withdrawal part? I created
an email address of the same
domain, like shopper.name@myfakeshop.com
and use it. Since it is an email from
payment, this flag will not be raised. I always did
that for my orders.
CountryDoesntMatch
This variable is set to 1 if it performs
shipments to a different country than the address of
billing. This can be solved using
a card from the same country as the address of
shipping. This is easier if you ship to the U.S.
UU. Please note that this is not a big deal.
since you can make an excuse, but not
let's raise flags for nothing.
3. IsAnonymousProxy
This variable is set to 1 if it uses a
VPN or a public anonymous proxy. This too
it is valid for the socks included in the list
black. You can use an RDP instead, or if not
you can get one, try to find socks
clean, but it is mainly trial and error.
HighRiskCountry
This variable is set to 1 if it has the
billing or shipping address in a country
that is considered high risk. Given that this
list always it update no I can
provide the list, but no western country
it is on that list, so if it is found in the
United Kingdom or in the U.S., there is no danger.
BsDistance
This is the distance, in kilometers, between the
billing and shipping addresses, up to a
maximum of 10. Can you solve this problem?
obtaining cards in the same condition as
is sending. The use of a California card
to send to New Hampshire will increase this
punctuation.
7. BinDoesntMatch
This variable is set to 1 if the BIN is from
a country different from the one at the address of
billing. This is the problem with the cards
that they are not AVS and why I do not recommend them.
Stick to AVS and get a BIN from the
same country. Use common sense.
8. BinNameDoesntMatch
This variable is set to 1 if the user
answer incorrectly to the question "name"
from the issuing bank. So, for this, do
a BIN verification and write the name
correct, exactly as it appears in your
information about BIN, and it will be fine.
CarderEmail
This variable is set to 1 if the address
The email was previously used.
for the card. All websites send data
regular use of Maxmind and they have a list of
the email addresses of the
card. One mistake that carders make is
reuse email addresses,
thinking that the stores do not know that the store
previously it was carded. Maxmind has a list
of email addresses of cards
sent by the stores. Use each address
email only once and use a
different email next time
charge.
10. High-risk username
This variable is set to 1 if the name
the user was previously used for the card.
Read the previous statement and do the same.
email addresses.
High-risk password
This variable is set to 1 if the
password was used previously for the
card. Pay attention not to reuse the
passwords on all sites.
12. ShipForward
This variable is set to 1 if the address
Shipping is a mail forwarding company.
They include MyUS, Bongo, and many others. Some
sites will directly prohibit those addresses
and they will cancel all the orders that are placed.
Do it. Avoid sending there, there are many others.
options for obtaining deliveries.
13. ProxyScore
This variable is set to 1 if the address
The source IP is a proxy or a sock.
the objective of the proxy is to be anonymous, the variable
IsAnonymousProxy will also be set to 1.
Having all this information at hand
will allow the use of nuclear systems of
fraud prevention and still get your things
more easily. The list of high-risk countries
it is always updated, but it can always
search for it on Google if you want to have a list
updated.
Always use a VPN with your proxy.
socks. The TrueIP technology used by
many fraud prevention software to
sometimes it can bypass its proxy and obtain its real IP,
so pay attention.
Section 1.13 - Verification Procedures
of requests
The decision to accept or reject an order
is based on many procedures of
verification that stores do, therefore
I will make a complete section about that part for
that you can avoid cancellations. It's frustrating
when you have a platinum card and you burn it.
So keep reading.
Utility bill
Some stores will ask you to send them by
email a copy (front and back)
from a recent utility bill. The
most of the time, they require that the invoice does not
it has been more than 3 months. To deal with that, I have
including a PSD file of an invoice from
electricity, and the text of the name and the address
It is editable so that you can edit it at will.
without too much knowledge of Photoshop.
Make an invoice with that PSD and send it along.
with the back image of the invoice (format
JPG). There is no need to complicate anything else.
Credit card scanning
They can ask him to send a scan of the
credit card used for the purchase. He
including the PSD of a credit card, with the
same exact font used for the cards
real. Edit it at will, change the logo and
export it to JPG. It's a good idea to search in
Google an image of your BIN (for example, 'visa')
of platinum persecution), so see how
it is supposed to be seen. With the PSD included,
this should also be a piece of cake.
photographic identification
It is difficult to provide scans because each
state and each country is different. In that case,
you should search for the identification on Google
requested, for example, "driver's license of
Michigan " and edit it with Photoshop. The number
the driver's license can be invented,
because they cannot verify it. Simply
focus on making the issuance dates
and expiration are logical, change the image of
the license and put your name and address and
It should be fine.
Phone verification: easy
They can call him for a call of
verification and ask if the order is legitimate
y, a Sometimes, asking him to confirm both.
directions. This is quite easy and the order is
will fulfill.
Phone verification: difficult
They can be angrier. y to make you
verification questions. All of those questions
they come from public records and are included in
your background report. If you did your homework
and studied his background report, will be able to
to respond to them. They have multiple options (4
options), and most of the time, a
the question has "none of the above"
as the correct answer. By heart, B&H
Photo makes this type of verification. This used to
it was a place where I liked to shop, but
how they increased their security, Geoffrey (the
verification agent) is a little more difficult to
convince.
Have the shipping address registered in the
bank
They can ask you to call your bank and
make sure that the shipping address is
archived with them. Read the section on ATO and
you will learn how to do it, it's not that difficult, but
You will need a complete one to achieve it.
This completed the list of procedures of
verification used by online stores.
Learn from this section, study it and prepare yourself
for anything.
Just because your last order was easy, it doesn't mean that
the next one should be easy. Some sites increase
their security procedures for any
reason and decide to be angry.
In general, you must respond within the
24 hours to avoid order cancellations.
Be quick. If you plan to make a big heist, it is
It is possible that you want to have the scans ready.
before placing the actual order.
Section 1.14 - Automated Withdrawal of Stripe
In the new version of this guide, I have included
a small software created by myself: the
Stripe withdrawal script. It allows you to send
automated queries to your server. I will tell you
how to use this small piece of engineering.
First of all, make sure that your
Stripe server is configured (see the
section 1.10 for more information) and from
that it can perform live loads. Make sure to
that charge.php is loaded and that everything
function. Okay? Now let's make charges
automatic.
Open the file cards.txt and put your
credit card numbers, dates and codes
for security. If your credit card number
is 4123 4567 8901 2345, expiration 04/2034 and
code 343, the lines must be the following:
4123456789012345
4444444444444444
One card per line. No characters
additional, without spaces, nothing. Just the
card information in the file cards.txt.
You can put as many as you want.
When you open launch.bat, you will be asked for 5
questions before the sequence of
commands start to execute. Here are
those questions and how to answer them.
Q1: URL of Charge.php
This is the full URL of charge.php in your
server, without any additional parameter.
Make sure the file is uploaded and that
can access it with your browser.
Example:
The provided text does not contain translatable content.
Q2: Minimum delay between loads
Since loading times are random
to avoid an obvious pattern, this parameter is the
minimum number of seconds that must be
wait between charges. We recommend a minimum
of 3600 seconds (1 hour) to avoid lifting
flags of suspicion from Stripe. This
the parameter must be an integer without
additional characters.
Example: 4400
P3: Maximum delay between loads
After the second quarter, this is the
maximum number of seconds to wait between
positions, and this number is inclusive. Again,
there are no additional characters or spaces.
Example: 8200
Q4: Minimum freight charge
The charges are also random, so
must provide the minimum and maximum amount of
the charges. I recommend staying below
$200 to avoid suspicion. This is a number
whole, it is only the part of the whole number and not
it must have decimals. For example, 54 means
a charge of $54.00 (or any other currency that
have put in your charge.php file) and this
number is inclusive.
Example: 50
Q5: maximum load amount
After the fourth quarter, this is the
maximum amount (included) of the charges.
Again, try to stay below
$200, and it should be fine.
Example: 140
The script will run while your file
cards.txt is not out of stock. Please note that
all the cards are charged at the moment of the
execution, so if you add cards to your
file cards.txt, they will not be taken care of before
to restart the program. The file log.txt
will contain all the processed cards and the
returned result (OK, rejected, invalid, etc.)
so that I can exchange the dead.
There is no limit on the number of cards that
you can withdraw, and if you use this software in a
smart, it will prevent the suspension of the account.
If you are familiar with the command line,
you can also start it using the line of
command: java -classpath . main application
Q1
This last method (command line) is
useful when you have many servers to test
at the same time, to obtain the maximum
benefit. If you want to be simple, just open
launch.bat and provide the parameters.
It is not necessary to pay thousands of dollars for
a withdrawal software when you can use this
small script to do the work for you!
Section 1.15 - CC to BTC
Many people are also looking for methods
CC → BTC. I will explain some here, but be
Keep in mind that it is possible that some methods
no longer work or that there are other new ones
available. Attempt keep it as much
updated possible.
Method 1: Virwox
This is one of the most popular methods.
Virwox is hard to card, but there are ways to
do it. First of all, almost everyone
socks are included on the blacklist;
should use an RDP near the location of
cardholder. Create an account using
an email address that is not
free, like the email address
from your fake Stripe store. Once it is created
the account must wait at least 72 hours before
of doing nothing.
During those 72 hours, the account must be ATO.
from the credit card and change the number of
billing (you can still use that card to
buys later, so don ’t worry) already
that there is a high probability that the
bank make a verification. call. Skrill is a
high-risk trader and even for me
legitimate account, I receive calls from my bank
when I use Virwox.
Then, use the Skrill method to make a
payment to load this account and stay for
under $100 for the first time. At this point,
Three things can happen.
The transaction is completed and the account
receive funds. That is what we expect.
Skrill requests a verification via SMS.
You cannot use public SMS numbers.
RingCentral numbers or Google Voice. You need
a real cell phone for that, and Skrill is very
selective with the numbers they accept.
You will need a mobile phone with a burner.
physical to accept that SMS. When you do, the
the transaction will be made and the account will be funded.
3: The transaction is denied, in this
point will be happy to have an ATO account at the
what can call.
the bank and authorize it, then return to
to try it.
Now that the account has funds, convert
USD to SLL, then SLL to BTC and make a withdrawal to
a bitcoin address that has never been used before.
If fraud is reported, that address of
BTC wallet will be included in the blacklist.
continue, you will receive a message asking you
that I wait 48 hours before it takes place
withdrawal. In reality, the transfer takes time to
average of 30 hours to complete.
Now you can enjoy your bitcoins
fresh!
Method 2: Coin.mx and Coinmama
You will need a fake ID, a
utility bill and a scan of the
credit card to insert the card into those
sites. Make sure you are good at
Photoshop and what you can do with it. It should
I prepare the accounts and be ready to receive
a confirmation call.
Given that the policies of those sites always
they change, I will not go into the details of what
they ask, but I will use their skills for
Photoshop and I will create some bitcoins with them.
cards.
Method 3: card things and sell them
This is the method that most recommend.
from the people. Use virtual cards for cards
of items such as electronics and sell them. Use
the money from sales to buy bitcoins.
Use eBay for to sell products
electronics with a card is safe. It is not
It is necessary for you to provide the serial number.
of those articles, so sell them as if
they were legitimate. Craigslist is also safe.
There are many ways to get rid of those
elements, so use your imagination.
Section 1.16 - Squareup Withdrawal
Sometimes, Stripe may not be enough for
Yes, if you like to become greedy. It can
take advantage of another method with transfers still
faster: Squareup.
You will also need a fake website, just
follow the same procedure as Stripe for
create a fake but attractive online store. Wow
go to www.square.com and open an account with the
same information as your Stripe account.
Now, here is the difficulty. To process
the payments, the mobile application is needed. They have
version for iPhone or Android, however, there is
cheaper ways than buying a
burner phone. In addition, phones
burners can easily track our
location with signal triangulation, even if
use counterfeiters or any type of device.
For the sake of this tutorial, we will do everything in its
computer. And I will show you how to set up
todo!
First, we will download Genymotion.
Make sure to choose the latest version that includes
Virtualbox. At the time of writing this
document, this version is 2.2.2. Before
thinking about installing Genymotion, keep reading!
You cannot install Genymotion on your VM.
it is simply not compatible. The graphics card
VM is not compatible with the functions
advanced OpenGL and no adjustment will be made
possible this installation for lo what
we will need to install Genymotion on the
host computer. There is a way to protect yourself.
First, turn on your VPN on your machine
host. You will need to create a TrueCrypt volume
For all those things, 10 GB should be enough.
Then, install Genymotion, use its volume
TrueCrypt as installation directory and not
do not create any shortcuts. Open Genymotion and
open the settings. Change all the
directories to your TrueCrypt volume (e.g., Z :)
and create a new virtual device. I recommend
Samsung Galaxy S4 - 4.3 - API 18 - 720x1280
to achieve better results. Make sure to
What can your virtual device execute and what
You can use the basic functions of Android.
(calculator, etc.). Where is Google Play (the
app store)? It doesn't come with the
device. Luckily, I thought of you and you
I will show you how to add it! By the way, if you can't
see that exact type of machine, choose the most type
close to having version 4.3 of the system
operational.
Run your virtual Android phone and drag
y loose the file
Genymotion-ARM-Translation_v1.1.zip in the
telephone. When a message asks you if
If you wish to implement the file, select
Accept. When finished, restart the phone.
Repeat the same process with the other zip file.
and I restarted the phone. Now, if you go to the menu
main phone, you will see the application of the
Google Play store. Now, before you
you go crazy with Square, we need to make a
a little protection before.
Create a Google Play account with
fake credentials, any information is
well, it's not really important. Later
download the Fake GPS application and use it for
set your GPS location at home
cardholder. You can do it simply
dragging the map to make the point on
your house.
Download the GPS Test app and
try some things to ensure that your
the GPS location is correctly falsified.
It goes without saying that a VPN connection in your
The host machine is also mandatory.
Once this is done, download the application
Square Register and log in with your profile
created (false completes). Now it's ready for
accept manual charges! For each card, only
you need to enter the credit card number
manually to process the charge.
Don't get too greedy with this.
method, maximum 4 loads per day. The funds
They must be deposited every 48 hours, so repeat.
this process until the account burns.
Since this runs on Android, there is no
an automatic withdrawal script available as
Stripe. However, entering a payment takes 30
seconds of your time and it's quite simple.
The security measures of Squareup are
much more relaxed than those of Stripe and can be
easily defeated. If the method is burned
for any reason, I will make sure to update
the guide with the newly found information.
In addition, the deposits are sent at 8 p.m.
PST. If you observe your interface at that moment,
you will see that the next deposit amount is $0.
Don't panic, this is normal and stays
so for an hour or two, then everything goes back to
the normality.
I highly recommend that you do not use
none of its real-life details in this
Android device. Any LE officer with
a citation can request Google to
get your fake device identification and
can you match this with what Square
It has in the file. They obtain many details.
about your device, so it's better to be safe
to heal. It can always create a second
legitimate instance of an Android device if
he also wants to do real life things,
indeed, you can create as many devices as
wish.
In a final note, you can reuse your site.
Stripe's website to use Squareup, so
save money. However, I advise against it.
reuse your credit cards as a rate
a rejection rate of over 50% may indicate the
account closure. If your
Use this method, use it this way
correct and it will be a gold mine for everyone!
In addition, I would like to add that Squareup
it has a threshold of $2,002 (I have no idea why
what $2,002 instead of $2,000, but life has
decided) per week for punch cards
manually. They do not mention it in their terms
of service, but any amount that exceeds
this will trigger a manual review, like
the request for documents. You don’t want that.
happens.
If it reaches a point where you are asked to
provide a identification the what
it might be an idea after a
time, there is no need to waste time on
Photoshop documents, since 90% of the
accounts are closed. Just don't give them one
response and get a new account in your
place. Don't waste energy on this. If this happens,
just do like Stripe and refund everything
the charge to the cardholders as quickly as possible
possible. You will be able to reuse those cards, but with
another withdrawal method, not on Square!
I also discovered an alternative method that
It works well for Square at first. The time
The deadline for deposits is at 5 p.m. PST.
This means that all transactions
performed before this hour will be deposited the
same night (and they will appear the next day
(skilled). When your account is new, you can
start with 2 daily transactions and, during
4 consecutive days, perform both transactions
between 4:20 p.m. and 4:50 p.m. PST. No
they will have time to retain the account and their money
it will arrive the same night without any problem.
After 3 days, you must change your pattern
because a transaction pattern 'too
identical will activate the account verification.
Then you can make 3 transactions daily.
for 1 week and then update to 4
transactions. Add 1 daily transaction for
activity week of the account until it
burn me. Your dispute rate must remain at
below 5% to avoid the procedures of
account verification.
When I start a new account, change
always the version of Android (create an emulator
new) and appears as new. New version
of the operating system, new type of phone and
it should be fine.
Section 1.17 - Flint Withdrawal
This is another withdrawal method that works.
very well, because Flint is still not very well known
for the carders. This is a company where
You can make a lot of money! To get started,
will need:
- Complete information (name, address,
date of birth, full SSN
Account real banking (banks like Ally
they don't work)
- Background report on the
complete information that you have
- Android emulator (see the section)
previous to configure Genymotion)
Go to flint.com and open a new account.
You can reuse the same store you used for
Stripe and Squareup. Use the same one as well.
email. In this way, just your mere $
7 for a month of accommodation turned out to be a
profitable investment! Get your report on
backgrounds now!
This is because, when submitting the form of
application, you will be presented with 3 questions from
verification. You can consult section 1.9 for
obtain more information, since those questions
they are the same as those of TigerDirect. To
less, come from the same source, so that
shouldn't have any problem, except that
there is a secret rule that allows only 1
minute to answer those questions, therefore
that it is not the time to start looking for
everywhere. Be quick. You will know right away if
she was right, because she needs 3/3 for it to the
the account is approved. If you fail, simply
you will receive a message of I'm sorry y
you wasted everything.
When linking your bank account, make sure to
that the account is not a prepaid account. If used
a prepaid, Flint will accept it silently and
will hold your money forever. When the
call, they will tell you to put another bank account. And
when you take this last step, you will be asked
documentation and scans / all the shit with
the one you don't want to waste time on. Therefore,
use a real account from the beginning and it will avoid
problems in the future. I learned this from the
hard way, when my account with $3,000 was
seized. I was fast enough to
refund all charges and reuse the
cards in Square, but it's better if it's simple
and obtain your deposits as planned. And
remember that your support by email
It will respond when they wish. It is better.
call them if you need help.
You will need the phone number, the name,
the email address and the amount in
dollars from the last transaction when I call.
In my opinion, it is not very safe, this can
make ATO very easy for such accounts.
If you want to be creative, you can find a
merchant who uses Flint and change their account
banking so that the money flows in your bank.
I recommend this only for expert users,
but it can be an additional source of income.
Open your favorite Android emulator and
install the usual Google Play packages
(see section 1.16 on Squareup for
this part) and will have again an emulator of
Fully functional Android. Also
You can reuse the same emulator as Square
if you wish.
Now, if you enter the Google Play store,
you will see the Flint app, with a dreaded message
saying that this application is not compatible
with your device. Regardless of the
emulator that you use will receive this message. You
I will show how to avoid it.
Put your emulator on the main screen
and I searched in the guide package for the .apk file
from the Flint application. Just drag it and
release it on the home screen of your emulator and
the application will start. Press the button of
start. Now go to the menu and you will see that the
the Flint application appeared on the list of
applications. Open it and log in with the
information about your created account.
At this point, before carrying out any
transaction, you must link your bank account in
flint.com if you haven't done so yet. You need a
real bank account, not a prepaid card or
a shitty account. I will also point out that
putting money in an Ally account is so
sure how to play roulette, so that
I highly recommend avoiding Ally. For
experience, the accounts of Bank of America are
the best for this type of work.
Now that your bank account is linked,
is ready to start accepting payments. You must
use the same rules as Square: avoid
exceed $300 per transaction, do not return
greedy and do not exceed 3 or 4 transactions
daily. If, after 2 weeks, the account still
is active, you can start a increase
slowly, but I repeat again, do not turn back
too greedy!
Every time the account burns, you need
create a completely new emulator, but yes
master your things, it takes less than 5 minutes,
so don't be lazy. After all, the
people work all week and still don't earn
half of what you can withdraw in a single day.
Enjoy the opportunity you have, withdraw the
slowly make money and hug your cat.
Finding bank drops is relatively
easy; Several people asked me in
private how to get a drop. This is very
Simple, there are many providers in Evo, and
even in the forum, if you post in the section
desired, you will see how many people have those
accounts. I never had problems finding
a partner to withdraw money. You can expect a
50% participation with the owner of the
gotta, unless you can get your own
drops, but this is a more difficult job.
It is also important that you create a new one
Google account every time I create a new one
emulator. In this way, you will prevent your pattern
You will be traceable and you will see yourself as new. It may
use Square and Flint in the same emulator and
reinstall both on another emulator once that
both are burned. From experience, the
Flint accounts take a long time to burn, rare
I used to have burned accounts before a
week, so there is still a lot of money
what to gain there. The payment processors are
really a gold mine for people
that seek to make money in the world of the
cards.
The first deposit may take a few days to
arrive; this is due to the fact that Flint has
pseudo-random deposits, usually 2 days
among them. This is a weakness of their system,
but it is still a good source of income.
I had to send an email to you
support the first time, to discover that the
the first deposit always gets delayed a little.
This is not a problem, I always got a
minimum of 2 deposits before burning one
account for high-risk activity, except for the
first time (I had used a prepaid account,
what is the worst thing that can be done, and they swallowed
all the money).
Avoid spreading those methods outdoors. If you
took the effort and the money to buy this
guide, will want to fully enjoy your
combing methods and making money without
hundreds of novices try, fail and
raise flags. It will be harder if
too many people try those methods,
so let's keep those tricks between people
they bought that guide. You won't want to cut one out.
from your sources of income just to look good.
While exploring those reimbursement systems, it can
it is surprising to see how many lawsuits
they must receive from legitimate traders
those whose money is confiscated due to the
security features. They still put that
information in a dark way in their
terms of use, so they legally have the
right to do that, but we just have to
be smarter than them and seem
legitimate. After all, the reimbursement of
payment processor has been and will always be a
lucrativo flujo de ingresos para las personas que
they want to obtain additional income in the
scene of the fraud without involving anything physical.
With all those reimbursement methods,
whenever I feel like becoming greedy
and charge more, just think of this proverb
Chinese with much wisdom:
Is it better to see $100 in your bank account or
$500 in your blocked Stripe account?
Wise Alpha
Section 1.18 - Cash withdrawal from
PayAnywhere
This is a payment processor that receives
very little amount of fraud and it is not yet
aware of all the risks; try not to
burn this, since it is a gold mine from
from now on. Same principle as Flint, but more
easy to withdraw. On the other hand, to open the account
it requires a bit of skill.
Prepare your SOCKS and VPN proxy for
protect yourself. Go to www.payanywhere.com and
open an account. You will need a report of
background because 4 questions will be asked of him/her
verification. You must obtain 4/4 to open the
count. If it fails, 4 new questions will appear,
but this means it is already burnt. Try
with others complete and I cleared all the cookies
user agent / etc.
For some reason, the questions of
verification is more complicated than in others
places, which requires a bit of luck. If
wants to be close to 100% security, must
to create a credit report in Equifax or
TransUnion. Once you succeed, the site will
will say to wait up to 24 hours to obtain your
count. Just do it.
You will receive a welcome email.
and now you can log in to your interface at
PayAnywhere line. Link your account.
banking and wait 48 hours. You can now
download PayAnywhere
Apply on Google Play on your burner
Android y begins a perform charges.
Stay below $200 for the charges
and do not exceed $1,000 per week, or you will fall into the
audit category and you will be asked for 3 months of
bank statements.
At some point, after some
successful charges, you will receive an email
asking him to call the department of
commercial information. You will be provided with a
telephone number and an extension for
call them, and you should have their number handy
merchant. You will need the full name, the
last 4 of the SSN and the identification of
merchant. You must also falsify the number
to reflect the number you put in your account
PayAnywhere. Don't be afraid, this is just
a welcome call. That's usually how it goes
this call.
Agent: Thank you for calling the department
of knowledge of Bancard merchants,
My name is Bobby, can I have your number?
of the merchant?
You: 93932973423
Agent: Thank you, who am I speaking with?
You: Barack Obama
Agent: Thank you Mr. Obama, can you verify
the last 4 digits of your social security number
social?
You: 1234
Agent: Thank you. It was me who sent this.
email, the reason for this call is
to help you get started with processing
of payments with us and wish you welcome
to our services. I see that you have already processed
the transactions, what do you think so far?
You: I like it so far, the application is
quite simple and fast.
Agent: I'm glad to hear that. Me too.
we wanted to explain to you the procedures for
disputed and rejected payments. (the agent
he will speak for about 1 minute
explaining some key points)
I understand.
Agent: And in case we decide to put
we will request more on your audit account
information about cardholders.
(other explanations of the procedure)
You are well.
Agent: And what exactly is your business?
You: I sell skateboard accessories online,
I am a reseller.
Agent: Do you have a registration certificate?
commercial or does business with its own
name?
You: My proper name, Barack Obama.
it is important to respond to that, otherwise you are
fucked
Agent: Thank you. And to finish, do you have a
website address where customers can
see your store?
You: Sure, www.myfakeshop.com.
Agent: Thank you Mr. Obama, do you have more
questions?
You: No, thank you.
Agent: Thank you for returning the call
after my email, have a
Good afternoon!
And you are ready. Stay below $
1000 per week and the deposits will be made
every 2 days. In this way, it will remain under
the radar and will receive deposits every 2 days. It's a
extremely profitable refund method,
so use it wisely.
It is also a good idea to write a
brief description of the charges made,
for example, "Order 22178" so that it can be seen
more legitimate. You can search on Google for a
fake invoice generator
generator that allows you to generate invoices.
You will need Adobe Acrobat to get rid of the
text 'generated by' at the bottom, if the
the site decides to put a watermark.
Section 1.19 - How to request a
photo identification
Sometimes, merchants may ask you for a
photocopy of a photo ID issued
by the government. This is easy to
omit if you have the right tools,
for example, do not send a JPEG image with the
watermark 'Adobe Photoshop CS6' in the
file metadata. I tell you the secrets.
I have included an SSN card with this guide. The
the card is in PSD format and has exactly
the same source as real SSN cards. The
baseline layers are the bottom part of
the characters. You can simply copy and
move the digit layers to form the SSN, and
for the name use the characters
provided. If you are missing some characters,
I place a font layer in the PSD file.
Just write it using that font, and
put some black brush strokes and strokes
of draft so that the letters look like the
others.
For driver's licenses, the process is
a little more complicated, but feasible. Given
that DL templates always change and
they vary by state/country, it is impossible
include a scan, but you can search on Google
Images the template you are looking for.
Obtain a high-resolution image if it is
Possible. Once I find it, I will need to edit.
the information it contains, the number also
and the expiration dates. I tried to find the
victim's Facebook profile to see if
you can find a decent photo; of it
on the contrary, you can obtain a stock photo of
the photo of the driver's license on sites like
iStockPhoto.com. Simply upload the image
what you want to use.
For the utility bills, I have
including a scan of an invoice of
electricity. It is very easy to work with this
template. I also included the font you need
use for that. Edit the correct information in the
invoice; this should be very easy to do. Leave
the back part as it is, we will not need
edit nothing there.
Once you have finished, save the
image in JPG format. Do not send the file
still, since the Exif data of the image
Made with Adobe Photoshop CS6
Any smart trader will notice it.
Create a new document in OpenOffice Writer,
import the image into the document and save it
in PDF format. You can now send this PDF from
a secure way for the merchant, who will not have either
the idea that the image has been edited with
Photoshop. If your skills with Photoshop
they are not that bad, it must pass the verification of
this way.
That's all for the first chapter! Win
money is something good, but what is more
important, it must be protected. That will be the topic
second chapter. Charging and avoiding LE can
become a way of life if you like it
easy money. Let's go!
Chapter 2 - Protect Yourself
This chapter is about how to protect yourself when
create cards online. When to obtain
free articles are fun, the police side of the
operation is less fun. You will learn
techniques to ensure that it cannot be
trace when committing online fraud.
Section 2.1 - How to Protect Yourself Online
Let's go a discuss how it can
protecting oneself online when placing orders
fraudulent. We will talk about your top 3.
VM, VPN, SOCKS.
Friend 1: The VM
The VM (virtual machine) is an installation of
Oracle VirtualBox or VMWare, whichever you prefer. It is
like a computer on your computer. Its
computer is the "host machine" and its VM is the
guest machine. On your guest machine,
put everything related to carding. Never
put nothing related to fraud out of
this virtual machine. Keep everything in the same
place, you won't want to leave evidence in your
computer. Once your VM is ready, create
a TrueCrypt volume and place your files from
VM in it. Just mount your TrueCrypt volume.
when you wish to access your carding material.
By using TrueCrypt, you ensure that your VM
is encrypted and that everything related to
the checkered "disappears" when it turns off
energy y you need to decipher the volume
again to access it. So, if YOU
breaks into his house, disconnect your computer
and all the evidence will disappear. It is not
it is necessary to start deleting files here and
there. If they confiscate your computer for
analyze it, there will be nothing to find. Its
virtual machine is completely invisible and only
access it when you want to load something.
Now that your physical computer is
protected, she should think about hiding her identity
online. If you don't know much about VirtualBox and
TrueCrypt, you should investigate about them,
they also have many uses outside of the world of
the cards.
Friend 2: The VPN
The VPN is the way you can use to
hide your identity online and appear anonymous.
Route all traffic from your computer to a
VPN server that hides your identity and forwards it
traffic to the desired site. I personally use
PureVPN, but you can choose any provider,
but read your privacy policy for
make sure they do not keep records.
If you do not use a VPN, your IP address will be
visible. The police just have to call your ISP
and obtain information from your IP, and they arrest him.
Therefore, using a VPN is crucial for
anything sensitive online. Once that
make sure that your VPN is connected correctly,
you can write 'what is my ip' in Google to
find your location. Make sure that the
location is the announced location of the
VPN server and not its real location.
With the VPN, you are anonymous, so everything
what you are doing is hidden. The only problem, the
merchants also know it. Although not
they can know who you are when you browse
on their site, you can see that it is using a
anonymization service and, therefore, it is more
This order is likely to be fraudulent.
Raise flags. Many merchants
important have a list of the servers
Known VPNs and mark the orders that are
They originate in those directions. Then our
The next friend will solve that problem.
Friend 3: The SOCKS
We are not talking about underwear here,
What is a Socks 5 proxy?
Simple. To ensure that the merchant
to see it as legitimate, it must become the holder of
the card. If you go to vip72.org, you can buy
socks from many cities around the world. Yes
choose a sock in the city of the holder of the
card, it may appear as if it were that
city when making the purchase and, therefore,
has a higher chance of success.
When you install the VIP72 software, you will be able to choose
between a variety of socks by city and the
that are not on the blacklist, as they are not
public anonymity services. It's like using
another person's computer (in that city)
to make the purchase. In this way, you
it really seems to be the cardholder and
eliminate all problems.
Use SOCKS over your VPN to obtain the
maximum security (in case the proxy of
the socks are committed) and will not be
traceable. By combining that with your machine
encrypted virtual, a configuration is ensured
solid as a rock without the possibility of being
tracked. Once you pick up your item at the
delivery and go away, it will have gone forever, no
There is a way to respond to him/her. Good luck!
I see a question that often arises in the
forums, how do we chain socks and Tor?
Simple. First, do not use Tor. Use any
browser like Google Chrome. This is how
we use the full setup.
1) Get a VPN (like PureVPN) from the US.
UU. (Vip72 likes to hang when using a)
VPN location outside the U.S., so not
take risks).
2) Connect the VPN, open the VIP72 program.
3) Log in, select country, state,
city, then double click on the proxy
desired.
4) When the proxy is on the list
selected, open Proxifier.
5) In the proxy settings of your
browser, select "use settings from
system.
6) Google 'what is my IP' and make sure to
appear in the desired city.
If 'what is my ip' shows the desired city
and its VPN is connected, now it is invisible and
You can register whatever you want. Do not skip the VPN.
you never know when / if the socks
They will disclose their location. Better safe than sorry.
Another way that LE can catch you is
through your username. In TCF and in
Evolution Market, some LE officials have
accounts and are looking for "big fish" to
catch. A step that LE takes is to look in
Google your username and find sites
clearweb in which I could be registered, in order
to have a starting path for your research,
so use a different username than
its clearnet operations.
They will check who lives in their place and will make a
list of family or friends, so make sure
that is not linked to that place in any way
way (business, friends, family, etc.)
They can use voice recognition to
capture your voice on a call. This is not the
way for them to catch him, but it will serve him as
additional test if he is ever convicted for
that crime.
If you want to be paranoid about security,
you can make a door protection for your
computer. If you have your virtual machine
running on TrueCrypt and you have to leave your
computer on while in another
place, sleeping, for example, is a good
practice using an extension cord to
feed your computer y fix that
extension to disconnect when the door
it is open. In case of a raid, all the
tests will be destroyed. This is not
mandatory, but it can be an additional layer
of protection in case the police indicate
your
location and decided to pay him a visit. But,
generally, when I leave the house or go to
another place, at least it must dismantle its volume
TrueCrypt. If you do not want to lose all the state of
your virtual machine (sometimes it has several
running applications), you can Save the
state of the virtual machine when shutting it down for
prevent everything from reopening.
If you started carding before acquiring this
installed carding material on a disc
hard, do not just delete the files.
Any competent LE officer can
easily recover them. To avoid this, download
the DBAN software and burn the iso to a CD or DVD.
Insert the CD into the computer, start it and
safely wipe your hard drive using the
DoD standard or the RCMP method. From this
way, it will erase all traces of files
related to the carding and will be safe in
in the event that it seizes your hard drives or
USB units for research purposes.
When they break into your house, you won’t have time.
to destroy all their hard drives. They take a
average of 3 seconds to take what
they want. Besides, do you really want to sleep with
worries and being afraid that you
caught? Me neither.
Section 2.2 - Burner Phones
This section is about how to call the
banks safely and avoid being traceable.
If you use your home phone for that,
surely they will arrest him. Here is how
solve that problem.
The first step is to register an account.
RingCentral (you can load it with a card of
level 2) where you will buy the phone numbers
necessary to pass oneself off as all the
cardholders. Go to ringcentral.com and
register an account. Next, you will be asked
a phone number where you can be reached.
Can you make an excuse as if you were in
the work and you will call them when you have 2
seconds. Call them and talk to them and accept
an office plan. You can say that you are leaving from
vacation for a few months and needs a
IP phone to call home for free.
This process is quite simple.
Once you have set up the account
RingCentral, take some time to explore the
options in its interface and learn to register
phone numbers. You can select by
state and city to register numbers of
phone and point them at the face of your burner.
They often change their interface, so it does not
I will go into the details here, but make sure to
that all the numbers of "burner" sound
on his burner cell phone. How
an alternative to that, you can get a phone from
desk, configure the SIP information on it,
configure port forwarding on your router
and, if your router supports it, select VPN in
the type of WAN connection, to have a phone
protected desktop. which can be 24 hours
every day, 7 days a week. A mobile phone
burner works, but since there is no
possibility of VPN for calls, it can be a
a little dangerous. You can always get cards
Prepaid SIMs with a fake name for your
cell phone, but since the IMEI of the
phone can be dialed, we recommend
get a cheap $10 phone and throw it away
after each great heist.
If you choose the desktop phone, it is not
it's not necessary to throw anything away, since the location
it can never be tracked by any means if your
router uses a VPN connection. This is the
option that I personally use. Only
make sure to be available to attend to the
merchant confirmation call, since
a missed confirmation call often
it's a synonym for failure. They are paranoid sometimes.
Many phones from Polycom, Aastra or Cisco
they function as desk phones, since
they also have legitimate uses. It can also
to have a legitimate line and a fraudulent line if
your phone supports 2 SIP lines, which makes
majority of the models. Every time it burns
a card, I change the card in RingCentral and
I still don't see a canceled account due to
chargebacks. So far everything is going well, and they have
months ago. By falsifying the account holder's number
of the card, there are 2 very popular services,
Spooftel and Spoofcard.
Spooftel only accepts bitcoins for payment.
but they are quite cheap, only $0.10 each
minute for anyone
number and they do not block numbers for anything.
Spoofcard accepts credit cards for the
payment (you can charge them with a level 2 card)
but often, the calls get cut off afterwards
30 seconds for no reason, for all kinds
for reasons, so I stay away from
they and I use Spooftel even if I have for
disburse some bitcoins.
Be careful, as HE may summon you to
any of those 2 companies to reveal
the number used to make the call
forged, so do not use your real phone to
have the conversation, since there is a way
to trace it back to you. Use your burner
combined with Spooftel for a maximum
security.
As soon as RingCentral receives a
contracargo, you will be notified by email
electronic and the account will be cancelled. They ask
supporting documents, but they do not respond.
Just open another account with another card.
Section 2.3 - Device Spoofing
Android: the perfect form
This section is one of the most important,
if not the most important, if you want to have luck in
collect large amounts. If your goal is
just make a quick robbery and take $1,000 and
then move on to something else, it's okay if this is skipped
section. However, if you want to follow me and
earn 5 figures per month in fraud money,
You definitely need to improve your game.
Intensifying the game means obtaining a
physical Android device in your local store, which
it will cost around $100. You can also
get a used one on Craigslist, in fact,
whenever I have a physical device in your
hands, it will be fine. It doesn't need to get any
SIM card or any plan, just get the
phone, he will not use it to call everyone
ways. However, if you are already using a device
Physical recording on Android, you can reuse it.
for that.
This section also deals with resigning
completely to the Genymotion emulator, because
has too many restrictions and will not be able to
to completely falsify it. The applications
Square y Flint has many permits
specials that include obtaining
MAC addresses, serial numbers, IMEI, IMSI,
phone numbers and much more information.
This section will tell you how to falsify that data and
send junk data (but with a real appearance)
to deceive those applications into believing
that you are someone new. If you follow this
tutorial, there is no way that even the
most advanced application in the world can
to discover that he is falsifying his identity.
Step 1: unlock and root the phone
First of all, prepare your phone,
connect it to a VPN (any will do), create
a junk Google account (any name)
It's okay, it doesn't matter, but don't put your name
real) and download the IMEI App .info. Only
you will need this for now.
The next step is to unlock the manager of
start of your phone. Since each model
the Android phone is different, I can't give you
exact instructions, but I will put you in the
correct path for some of the main ones
brands. I have included the ADB folders and
Fastboot, in case you need to use one.
from those files during the process.
Motorola Devices
Head over a
http://motorola-global-portal.custhelp.com y
You will have all the necessary instructions. The
the website is well made and you will find it easy.
LG devices
Head to a
Invalid input, please provide text for translation.
p?t=2224020 and you will see the instructions, it is not
very difficult.
Samsung devices
There are too many different models, and each
the model is different, you can only search for it. The
most phones can also skip
this step and go directly to the next one.
Now that the starter charger of your
the phone is unlocked, you will need to root it
telephone. This varies by device, but it
I will give the usual procedure. The procedure
normal is more complicated, but I created files
in batches to make it faster, for its
convenience.
Connect your Android device to the USB port.
and place "UPDATE-SuperSU-v2.02.zip" (from the
folder "Android ClockworkRoot " at the root of
the phone's SD card. Turn off your phone and
turn it on again while maintaining
press the "volume down" key and it will be
the start menu. Then double click on the
file "ROOT.bat" in the same folder and
you will install the recovery ROM. Start the
phone in recovery mode and will be in the
Clockwork startup menu.
From there, install a package from the SD card.
and I searched for your SuperSU file (the zip file that
we put earlier) and your phone will be
rooted. Optionally, if you want to restore your
logo y get rid of the message of
warning when you turn on your phone, you may
search for its firmware, download it y
unzip it, replace the file "logo.bin"
in the folder provided by the download, place
the phone in the start menu mode and do
double click on "LOGO.bat" to restore its
logo.
Now your phone is rooted, but that was
only the first part. Now we will install the
spoofing tools that will allow us
becoming another person without anyone noticing
account. We want to make money, so
let's do it of the way correct.
Optionally, you can download the application
"Root Checker" from Google Play to verify
that you have successfully rooted your phone.
Step 2: Install the package and the framework
Xprivacy
Start your phone in normal mode and place
"xposed.apk" and "xprivacy.apk" in
the root of your SD card. On your phone, open
Google Chrome and go to the address "file:
//sdcard/xposed.apk " and this will download Xposed
Framework. Go to your Downloads folder and
install that file. Once it is finished,
restart the device.
Repeat the process but for the file
. Then, you should open the application
Xposed, enable the framework and enable Xprivacy.
Restart the phone again. Xprivacy is a
modification of the operating system that you
allows sending false data to applications that
they request device data such as IMEI, IMSI,
series and some more parameters. We will use this
to deceive applications into
fool them into thinking we are someone else.
Connect to your VPN (Android has a)
native VPN function in the Settings menu,
open Google Play, create a fake account and
download (but do not open) your applications from
payment favorites how Square Flint,
PayAnywhere, etc. and install them on your phone.
We have finished with the installation of the
application, now we will move on to the part of
impersonation. This is the most interesting part and
important.
Step 3: falsification of privileges of the
application
Be careful in this part. Make a
error may result in revealing your
identity, so proceed with caution. I do not assume
no responsibility for anyone who is
arrested for having incorrectly followed the
instructions. You have been warned.
Unplug your phone from your computer
before continuing.
Open the Xprivacy application and click on the
icon in the upper right corner of the window,
then go to Settings. There will be a button
Randomize data
continuation that the IMEI, IMSI, serial, etc. have
they have been forged. You can click as many times as
As you wish, everything is fine. Uncheck
Randomize data on startup and make sure to
that there is nothing marked next to the
parameters. Click on the Number field
phone and enter the 10-digit phone number
digits of your target, and place the latitude and
length of the victim's house. Leave the menu
of configuration.
You are on the main screen of Xprivacy.
Check the box to the right of your application and
click on the application icon to open
the advanced properties panel. You must
check the boxes next to all items
that have a small key icon next to them,
except for the Internet. Do not check the boxes if the
the background is red. Lastly, but not least
important, make sure that the option
Restrict
Congratulations, he/she device is
forged! But there's one more detail: to have an IP
legitimate is essential. So we will move on to
the last part of this section.
Step 4: Connect your device to the proxy
SOCKS
First of all, you will need to set up your
router to use a VPN connection.
Any VPN provider is fine. The same
the procedure will be detailed in section 2.2
(burner phones). Configure PPTP as
the type of WAN connection and, on your PC, look in
Google "what is my IP" to make sure that
is behind a VPN.
On the computer (or virtual machine) where
is using VIP72, configure the firewall for
always allow incoming TCP port 9951
all domains. Make sure to open the client
VIP72 and Proxifier and test your connection for
ensure that it appears in the location of
proxy.
On your Android device, go to Google
Play and install ProxyDroid. Open the application and
put the local IP address of the computer (or
VM) running Proxyfier, port 9951, without
username or password. Check the
global mode
it will vibrate and emit a sound, and you will be connected
the proxy.
Open Google Chrome on your device and
I searched for 'what is my ip', at this point, the IP
the IP of the proxy must be shown that is
using. You will also appear in that location.
It is now safe to open your application for
payment processing. The garbage data is
they will send to those applications instead of data
real, which will provide you with total protection.
Your accounts will take a long time to burn out;
This method is a spoofing method
identity proven not to be found in
no other place but this book and
It will surely take an eternity to burn.
You will notice that some options of the application are
they will block and Xprivacy will display a message; for
for example, Square wants to record audio from its
microphone, which is an invasion of the
privacy. Flint wants to read data from the
computer connected via USB; from there
the importance of disconnecting your device.
Section 2.4 - AVS
AVS is a verification system
directions, a fraud prevention system
used by stores to ensure that
the billing address is correct.
It works by calculating the numeric part of the
address (postal address and postal code)
against what is in the bank file for
ensure that it is accurate. Compare only the
numerical part; therefore 123 Right Street is the
same as 123 Wrong Way. The postal code is
compare in its entirety.
Why is AVS important? Because it causes
automatic declines in many places if the AVS
does not completely match. If the titleholder of the
card cannot write its own address, the
the website will not believe for a second that you
he is the actual cardholder. Many
sellers sell cards not avs. Is this
Good? We'll see.
Let's say you have a non-AVS Amex card.
from Colombia (they are very popular). The people
They tend to use them in online stores in the U.S.
And they put the billing address and the
shipping address to be the same,
with the hope that the card passes AVS. It goes
But...
An intelligent fraud detection agent
You will see that the BIN is from Colombia. What is the
probability that someone with a card of
Colombia has a billing address of
U.S. Registered, especially knowing that
The card is not AVS? That's very thin.
I hope the order is canceled immediately at
unless the fraud agent is very stupid
they are becoming increasingly intelligent in
those days).
The non-avs cards should be taken with
caution. Do not assume you can register
any store with these just because not
they use address verification systems.
Section 2.5 - Plane Tickets
Another popular question is, 'how can I
get plane tickets? "Although this is
feasible, I advise against it because it is dangerous. If
do you still want to do it? I'll tell you how.
About 1 year ago, I landed in
Japan, and upon exiting the plane, still at the dock
at the boarding gate, there were 2 security men
blocking the way. They shouted: "Everyone take out
"your boarding pass!", and people passed one by one.
a, "ok", "go ahead", until there was a guy
of strange appearance that showed his pass and the
the goalkeeper said "follow me", as they were leaving, the
security shouted, " everyone else can go! ".
If you don't want to be this type, keep reading.
If you rent a local flight, there is usually no
danger. You must use a card from the same country
that the country you are traveling to. You can put your name
real or the name of the cardholder and use
a fake identification. If you choose to use your own
name, make sure to have evidence that
support your case if you are detained while boarding
He leaves the place. He can say that he bought tickets.
on Craigslist or in a forum, but has some
evidence (false?) to back it up. Wants to avoid
any suspicion of credit card fraud
in case problems arise. Better safe
better to prevent than to cure, although I have done it many times
sometimes and I have never had problems. If you use your
real name, use any identification
except for your passport, this can save your
back later. Use an ID not
government-issued such as the student card, in
In many cases they accept it. Submit a
identification of the government if requested, but
no passport.
If you are checking in for an international flight, that
it's harder. You have to use your real name and
passport number. Please note that you do not
becomes a fraud suspect in the case
of chargeback, as they cannot
prove that you loaded it yourself, as long as
haya taken your precautions in the
computer. Show at check-in and go to
auto check-in to avoid people so much
however possible. I tried to book a short flight and
avoid first class flights (iza flags).
extremely profitable refund method,
so use it wisely.
It is also a good idea to write a
brief description of the charges made,
for example, "Order 22178" so that it can be seen
more legitimate. You can search on Google for a
fake invoice generator
generator that allows you to generate invoices.
You will need Adobe Acrobat to get rid of the
text 'generated by' at the bottom, if the
the site decides to put a watermark.
Section 1.19 - How to request a
photo identification
Sometimes, merchants may ask you for a
photocopy of a photo ID issued
by the government. This is easy to
omit if you have the right tools,
for example, do not send a JPEG image with the
watermark 'Adobe Photoshop CS6' in the
file metadata. I tell you the secrets.
I have included an SSN card with this guide. The
the card is in PSD format and has exactly
the same source as real SSN cards. The
baseline layers are the bottom part of
the characters. You can simply copy and
move the digit layers to form the SSN, and
for the name use the characters
provided. If you are missing some characters,
As if he had bought it from someone else.
Do not leave any evidence of any card test.
This is common sense, but it is always
welcome to remind our colleagues
carders. To have a solid story, create
a bitcoin wallet with a random name.
Create a new Virwox account with your details
I bought bitcoins for around 30%.
of the flight value and send it to that wallet
false. Then, create an email address
fake email with the name of the same
person and exchange with your email
real as if I were negotiating a rate of
approximately 30% of the retail price.
Once your flight is over, use the bitcoins.
in that wallet as you wish. In case you
stop at the airport, you can show those
emails and transactions and act
like an innocent victim. However, if
booked through a third party, the possibilities
the chances of that happening are very low.
In addition, ATO is required for tickets for
airplane over $300, since most of the
sites will call the billing number to
verify and they will cancel the order if it is not
available to take the call, so please have
your recorder is ready if it does.
Section 2.6 - Fake Emails
Sometimes, you may have to pretend
by someone and forge an email by
various reasons. There is a clean way e
undetectable to do that, and that is what I am going to
explain here. The email will look 100%
legitimate.
To forge emails, you will need to
create the email yourself. This
it means creating the headings and everything. For
to do a test, just send a "Hello"
"world" to a test address of Hotmail,
click on 'View message source' and you will see the
upper headings. Paste everything (the source)
in a Notepad ++ document. You will see a
header that looks like:
From: Real Name <real name@tcf.onion>
Modify it to what you want to show, it is quite
self-explanatory. For example, change it to that:
From: TCF Hack <tcf@tcf.onion>
So you have the email
complete in a Notepad ++ document. A
continue, obtain a Telnet client.
I recommend Putty, it can be downloaded for free.
continuation, make sure to use a connection
anonymous (I advise against the VPN, as it is obvious
that comes from a public proxy; use something
like a hacked wifi, a 3G dongle, etc.) and its
security is correct.
Look for the mail exchange server
for your domain. For that, go a
http://www.dnsqueries.com/en/mx-lookup.php e
enter your domain, example 'hotmail.com' and
you will obtain the exchange addresses of
email. If there are many, choose one at random. In your
the case will be "mx3.hotmail.com".
We have everything we need! Open a
Putty Telnet connection a on your server of
email exchange port 25. The
"conversation" will be the following (it may vary)
a little, depending on the software of
messaging)
Send: EHLO mx.spoofedserver.com
Response: Welcome mx.fakeserver.com
Send: EMAIL FROM:
spoofedemail@dsfdsagsdg.com
Response: 250 2.1.0 Ok
Send: RCPT A: destination@fdsgsfdg.com
Response: 250 2.1.5 Ok
Send data
Response: 354 data finals with
(take all your data here, the one who edited with
the Notepad, then press Enter, place
a point (.) and press Enter again)
Response: 250 2.0.0 Ok: in queue as
43958340634
Your fake email is sent. Have
take into account that for some suppliers such as
Hotmail, if you try that (from Hotmail to Hotmail), it
will be put in spam because of the source IP
it is not one of the Hotmail servers and it
they recognize it as forged. However, if
send an email to Hotmail from another one
server (for example, @ tcf.onion), will work
wonderfully. For messaging servers more
Little ones, everything will be fine. Now more people.
they will fall for their scams.
Section 2.7: total forgery of your
identity
These are people who take seriously the
possibility of hiding your identity. The novices
they would assume that by changing the location of their
VPN, you are someone new. The users more
advanced users will say that by changing their VPN, their
socks y the to use a browser
completely new with user agent,
change the fonts, the resolution and the time of the
system, is better. In fact, both are
mistaken. The payment processors and
Paypal they have forms extremely
advancements in taking fingerprints of the
people and here we will learn how to avoid it.
What software or websites (through
complex JavaScript calls) can use
to take fingerprints, it may include
motherboard serial numbers, UUID
(unique identifier) of the system, etc. That's a
a ton of things to mock! To save you from the
investigation of replacing everything, I have prepared a
small program, DMI Spoof, included in this
package. This program was written by me
same and is used to modify a machine
virtual VirtualBox for what seem
completely new!
Run DMI Spoof and you will be asked for 2
parameters.
1) Path of VboxManage.exe. This is the path
complete path of the file VboxManage.exe,
generally located in the same directory of
installation that VirtualBox.
2) Name of your VM. When you open VirtualBox,
this is the name that appears in characters
blacks in bold in the list. You know what this is.
Please note that you can also
provide those parameters in the line of
commands to execute it faster, the first
the parameter will be the path of VboxManage.exe and the
the second parameter will be the name of the
virtual machine. Provides another way
quick to forge everything.
Once you have provided those 2
parameters, DMI Spoof will alter the VM to
change the BIOS brand, the information of the
motherboard y the serial numbers, the
CPUID information y some others
parameters. It will appear as if it has a
completely new computer made of
completely different hardware, no way to
to know that this has been falsified.
Once you start your VM, change the
following configurations in Windows, since
they can also be used to take your fingerprints
digital and cannot be modified using DMI
Spoof:
- Screen resolution (normally
you can drag a corner of your VM
- Install or remove a font in the folder
Sources (the list of sources can be found
using JS
- Change the name of the computer
(requires reobot)
- Use Tmac to spoof the MAC address
from the network (it can be found using Javascript
advanced)
- Disable Flash (some sites place
silently cookies Flash in I
computer)
- Change user agent (use the
user agent switcher extension for
Firefox
Change the VPN or proxy location of
Socks (this is obvious)
Once everything has changed, don't go back.
access their sites from the same IP as
Otherwise, you'll have to restart the whole process!
This is enough to protect you from everyone.
the processes of taking fingerprints; for
payment processors y high sites
security, this is essential. It does not exist
too much security
Please note that all of this amounts to
to have a new computer. It will appear as
completely new and there is no way to trace it
this to the original machine. The impersonation
from DMI is something easier to do in a
virtual machine y if you read this chapter
correctly, you will know that you should always place
your card software on a virtual machine
to achieve maximum security.
Section 2.8 - Protecting Your VPN
When it comes to using a VPN, many
people have a connection Sharky and its
VPN connection sometimes disconnects. What?
It happens if you are using a withdrawal script
automatic or has logged in with his name
about fake users in an online store? That's right.
The connection will be established and reveal your real IP.
For Windows 7+ users, there is a
native Windows protection that you can use
to avoid such a thing.
When you connect your VPN for the first time,
Windows will ask you if this connection is a
domestic, office, or public network. It must
select Audience. Then, go a the
advanced Windows firewall settings
and follow these steps to protect yourself:
Go to the 'traffic rules' section
outgoing " from the settings window
advanced.
2) Right-click on 'rules
of outgoing traffic" and select "add rule
".
3) You will be asked what type of rule you want.
create. Select 'program'.
4) Click on 'browse' and select the
executable file of the application you wish for,
example, Firefox.
5) Select 'block connection'.
When asked when it will be applied
the rule, mark 'home' ” ofice
uncheck "public".
7) Assign a meaningful name to this
rule, for example, "VPN Firefox".
Create the same rule for each program
that I wish to protect.
In this way, all the connections that do not
are in the public domain (not carried out through
the VPN) will be blocked for the
selected programs, without stopping
allow system requests to follow the
standard path. If your VPN is disconnected,
you will not be able to use those programs. You should
do this for:
Firefox
Google Chrome
Browser Tor
Process Tor
Client VIP72
Proxy
Pidgin
Thunderbird
- Any other program you consider
useful.
Please note that you cannot block
all packages that are not shipped through
the VPN. Many programs, including the program itself
operating system, must communicate on the network
local without restrictions, and the use of the rule
block all programs
selecting a program can make the
the system is unstable and has consequences
unpredictable. In addition, it must utilize traffic in
the domain "Home" to be able to connect to your
VPN.
This ensures that your IP will never be revealed.
in case of a disconnection. In that case,
just reconnect your VPN and everything
it will continue normally. You will not have to monitor
constantly the status of your connection.
In case you do not know the file path
what should he choose, he can open the administrator of
tasks using Ctrl + Alt + Delete (or click
right-click on the taskbar and select 'open'
task manager), right-click on
the process and select 'open the location of '
file ". This will give you the full path of the
file, so that I can add it to the rules
from the firewall.
For earlier versions of Windows like
XP, you can use the Comodo firewall to achieve
the same, however, this is beyond the
scope of this tutorial and has been shown to cause
instability in the system. The native method of
Windows 7 has proven to be the most stable and
sure so far, so enjoy your
protected system!
Section 2.9 - The 10 Most Common Mistakes
This section talks about the most common mistakes
common mistakes made by beginners when
they start to card. Some can be fatal,
others simply are not important, but it is
it is important to understand those points.
Bragging about your things
When you get free things, don't brag.
before your friends, your family or your girls. Never
you know when someone will get angry with you and
he will decide to report you. Keep it to yourself and don't
Don't worry! Just say that you have a way to
getting cheap things and it's private. That's it
all.
Connection with your personal life
Don't ask a friend to use their house as
a drop. Do not send to your workplace, to the
his father's house or, worse yet, his own house!
If the police show up at your friend's house,
sure it will betray you. Don't trust it too much in the
people.
3 - Starting too big
When I start to card for the first time,
in the attack on merchants such as Newegg or
TigerDirect. They are not easy and they will give you a
negative feeling about the carding even
before you get free things. Start
with something small, for example, with clothing.
4 - Use the same nickname on boards
piracy and on clearnet sites
Many beginners forget that, y yes,
There are probably law enforcement officers in TCF.
observing what is happening. If they can
search Google for your username and see your
Facebook or anything else, you're screwed.
Use a name that you don't use anywhere else.
place!
5 - Responding to allegations of fraud
Sometimes, they might catch you outside of
balance y, for example, a store will respond
the order was fraudulent, so I
we cancel. If you successfully carded them 3 times
First, don't talk about that. If you only want
show them that it possesses them, it can persuade LE
to track it, because it just linked the
fraudulent orders. Just do not respond
nothing.
6 - Do not wash your bitcoins
If you buy (or use a card) bitcoins with Virwox,
they can use the blockchain to
trace where those bitcoins went and,
eventually, link it to you. Use a
service like BTC Fog to wash them and obtain
new bitcoins, not linkable to you, for
its underground operations.
7 - Talk to your partners on a site
traceable
Don't use Facebook to talk to your partner
about the carding. Any LE official can
citing Facebook to obtain its history of
conversations and catch it. Use Pidgin + OTR
to encrypt your conversation and use a VPN to
connect to ICQ. Make sure it is not
traceable.
8 - Staying out of balance during a
ATO
When ATOing an account, keep the
calm down, don't be fooled by the questions. Yes
you respond incorrectly (because very to
they have inaccurate information), keep the
calm down and explain yourself, remember, the card is yours. No
Show fear, because they will catch you.
9 - Hitting the same drop
This explains itself; Finding
drops is a pain, but make an extra effort and
get a virgin drop. It is already hot in first
place, so don't put more and you run the risk
of that I caught you. A drop is good for 3
Days; after that, it's time to move on.
go ahead. You can also apply this principle.
with the girls.
10 - Accessing your fake online store without
VPN
When your Stripe account gets burned and they
they are calling your fake online store to give them
the access log, you wouldn't want them to see your IP
they can track you down. Always use a VPN to
upload files, test your store, etc.
Section 2.10 - Glossary
This is a list of common words that are
they are used in the world of cards and many
people are not sure of their meaning.
These are some of them.
ATO: Acquisition of accounts. This is when
call the bank while pretending to be him
cardholder to carry out any
operation you wish to perform on the account.
CC: Credit card. You know what this is.
CH: CardHolder. The true owner of
the card.
COB: Billing change. This is
changing the billing address when making
an ATO. Be careful, as this may make
let the cardholder sound.
CVC: Card verification code.
Also known as CVV or CVC2, this is the
3-digit code on the back of the card near the
signature panel (4 digits for Amex cards).
DL: Driver's license. It is used for purposes
for verification.
Date of birth: Date of birth.
You also know what this is.
MCSC: MasterCard Security Code.
Also known as MSC, this is the
security mechanism that requests questions
verification during an online purchase
made with MasterCard.
RC: RingCentral. Your favorite source of
burner phones.
SSN: Social Security Number. Do you know what it is?
this.
VBV: Verified by Visa. The same as
MCSC but for Visa cards.
Conclusion
I hope this guide has been useful to you. I tried
to put all my possible knowledge to
help my fellow carders in the
underground world. Use any part that
I find it useful and I will try to achieve great success.
Again, thanks to everyone who bought
the guide, and if you have any questions, publish them in
the forums so that everyone can see the question
and provide better assistance.
I don't like to receive PMs with
cards questions; the reason is that sometimes
there may be a member who knows more than I do
about a particular topic and if everyone can
see your question, you can get more help and
it will benefit the entire community. That's why to you
I encourage you to make your question public.
In addition, I do not provide personal support.
about ICQ. This guide has sold more than
300 copies and if it would help everyone who
they bought, would spend the whole day doing it. Said
this, thank you for purchasing this guide, now it is the
moment to make money!
Mewtor