Sunday, 3 November 2013

List of unsecured Net Cams

Only Some of them works...Try yourself...


  1. http://108.20.75.6/anony/mjpg.cgi
  2. http://108.230.18.104/anony/mjpg.cgi
  3. http://108.23.26.5/anony/mjpg.cgi
  4. http://108.38.11.47/anony/mjpg.cgi
  5. http://119.234.201.114/anony/mjpg.cgi
  6. http://128.135.92.138/anony/mjpg.cgi
  7. http://129.120.202.17/anony/mjpg.cgi
  8. http://129.120.35.102/anony/mjpg.cgi
  9. http://129.120.35.111/anony/mjpg.cgi
  10. http://129.2.52.207/anony/mjpg.cgi
  11. http://130.111.26.24/anony/mjpg.cgi
  12. http://130.212.12.78/anony/mjpg.cgi
  13. http://134.53.138.54/anony/mjpg.cgi
  14. http://138.123.96.2/anony/mjpg.cgi
  15. http://138.47.70.240/anony/mjpg.cgi
  16. http://142.68.39.188/anony/mjpg.cgi
  17. http://152.14.56.162/anony/mjpg.cgi
  18. http://152.14.56.185/anony/mjpg.cgi
  19. http://152.14.56.188/anony/mjpg.cgi
  20. http://152.14.56.212/anony/mjpg.cgi
  21. http://152.14.95.51/anony/mjpg.cgi
  22. http://163.180.127.46/anony/mjpg.cgi
  23. http://173.11.239.250/anony/mjpg.cgi
  24. http://173.11.86.155/anony/mjpg.cgi
  25. http://173.15.101.233/anony/mjpg.cgi
  26. http://173.165.86.60/anony/mjpg.cgi
  27. http://173.167.145.165/anony/mjpg.cgi
  28. http://173.167.157.229/anony/mjpg.cgi
  29. http://173.196.179.29/anony/mjpg.cgi
  30. http://173.20.121.114/anony/mjpg.cgi
  31. http://173.212.93.252/anony/mjpg.cgi
  32. http://173.70.221.233/anony/mjpg.cgi
  33. http://174.0.212.78/anony/mjpg.cgi
  34. http://174.100.41.91/anony/mjpg.cgi
  35. http://174.103.100.66/anony/mjpg.cgi
  36. http://174.126.59.228/anony/mjpg.cgi
  37. http://174.55.17.190/anony/mjpg.cgi
  38. http://174.57.16.27/anony/mjpg.cgi
  39. http://174.60.14.186/anony/mjpg.cgi
  40. http://174.96.51.39/anony/mjpg.cgi
  41. http://178.157.197.71/anony/mjpg.cgi
  42. http://178.192.24.207/anony/mjpg.cgi
  43. http://178.196.199.207/anony/mjpg.cgi
  44. http://184.58.138.48/anony/mjpg.cgi
  45. http://184.79.57.89/anony/mjpg.cgi
  46. http://184.88.169.30/anony/mjpg.cgi
  47. http://188.154.110.75/anony/mjpg.cgi
  48. http://189.106.100.202/anony/mjpg.cgi
  49. http://190.223.164.185/anony/mjpg.cgi
  50. http://190.223.95.109/anony/mjpg.cgi
  51. http://190.255.178.34/anony/mjpg.cgi
  52. http://190.255.191.194/anony/mjpg.cgi
  53. http://190.92.16.189/anony/mjpg.cgi
  54. http://190.92.17.124/anony/mjpg.cgi
  55. http://190.92.17.125/anony/mjpg.cgi
  56. http://190.92.35.134/anony/mjpg.cgi
  57. http://190.92.35.140/anony/mjpg.cgi
  58. http://190.92.4.181/anony/mjpg.cgi
  59. http://190.92.5.10/anony/mjpg.cgi
  60. http://190.92.5.232/anony/mjpg.cgi
  61. http://190.92.8.5/anony/mjpg.cgi
  62. http://193.231.40.12/anony/mjpg.cgi
  63. http://193.40.243.156/anony/mjpg.cgi
  64. http://194.186.250.34/anony/mjpg.cgi
  65. http://195.74.102.231/anony/mjpg.cgi
  66. http://200.114.12.155/anony/mjpg.cgi
  67. http://200.189.190.179/anony/mjpg.cgi
  68. http://200.32.183.124/anony/mjpg.cgi
  69. http://200.69.209.249/anony/mjpg.cgi
  70. http://201.194.97.250/anony/mjpg.cgi
  71. http://201.203.0.33/anony/mjpg.cgi
  72. http://201.221.184.212/anony/mjpg.cgi
  73. http://201.232.16.197/anony/mjpg.cgi
  74. http://201.235.37.144/anony/mjpg.cgi
  75. http://201.245.67.70/anony/mjpg.cgi
  76. http://202.44.15.199/anony/mjpg.cgi
  77. http://202.78.81.144/anony/mjpg.cgi
  78. http://205.232.27.5/anony/mjpg.cgi
  79. http://206.53.84.77/anony/mjpg.cgi
  80. http://207.13.77.7/anony/mjpg.cgi
  81. http://207.213.140.80/anony/mjpg.cgi
  82. http://207.231.91.93/anony/mjpg.cgi
  83. http://208.100.33.174/anony/mjpg.cgi
  84. http://208.105.17.62/anony/mjpg.cgi
  85. http://209.119.5.4/anony/mjpg.cgi
  86. http://209.119.5.6/anony/mjpg.cgi
  87. http://209.121.28.211/anony/mjpg.cgi
  88. http://209.147.13.119/anony/mjpg.cgi
  89. http://210.6.93.152/anony/mjpg.cgi
  90. http://212.42.63.190/anony/mjpg.cgi
  91. http://212.63.59.14/anony/mjpg.cgi
  92. http://212.63.59.19/anony/mjpg.cgi
  93. http://213.131.234.20/anony/mjpg.cgi
  94. http://213.251.201.196/anony/mjpg.cgi
  95. http://213.3.23.167/anony/mjpg.cgi
  96. http://216.161.8.134/anony/mjpg.cgi
  97. http://216.186.179.122/anony/mjpg.cgi
  98. http://216.75.124.29/anony/mjpg.cgi
  99. http://217.112.61.198/anony/mjpg.cgi
  100. http://217.66.25.133/anony/mjpg.cgi
  101. http://24.107.102.29/anony/mjpg.cgi
  102. http://24.126.192.110/anony/mjpg.cgi
  103. http://24.155.150.53/anony/mjpg.cgi
  104. http://24.188.0.167/anony/mjpg.cgi
  105. http://24.230.208.217/anony/mjpg.cgi
  106. http://24.246.9.101/anony/mjpg.cgi
  107. http://24.49.134.172/anony/mjpg.cgi
  108. http://24.68.206.198/anony/mjpg.cgi
  109. http://31.36.162.177/anony/mjpg.cgi
  110. http://38.107.185.237/anony/mjpg.cgi
  111. http://50.11.33.90/anony/mjpg.cgi
  112. http://50.131.113.108/anony/mjpg.cgi
  113. http://50.53.224.238/anony/mjpg.cgi
  114. http://50.53.232.84/anony/mjpg.cgi
  115. http://62.108.179.82/anony/mjpg.cgi
  116. http://62.34.81.143/anony/mjpg.cgi
  117. http://63.116.95.25/anony/mjpg.cgi
  118. http://64.139.72.161/anony/mjpg.cgi
  119. http://64.190.245.226/anony/mjpg.cgi
  120. http://64.22.77.22/anony/mjpg.cgi
  121. http://64.5.138.151/anony/mjpg.cgi
  122. http://64.81.142.163/anony/mjpg.cgi
  123. http://65.15.164.95/anony/mjpg.cgi
  124. http://65.167.91.229/anony/mjpg.cgi
  125. http://65.182.79.35/anony/mjpg.cgi
  126. http://65.182.79.56/anony/mjpg.cgi
  127. http://66.152.214.2/anony/mjpg.cgi
  128. http://66.166.166.156/anony/mjpg.cgi
  129. http://66.249.230.10/anony/mjpg.cgi
  130. http://67.11.205.252/anony/mjpg.cgi
  131. http://67.148.242.39/anony/mjpg.cgi
  132. http://67.165.139.67/anony/mjpg.cgi
  133. http://67.166.124.40/anony/mjpg.cgi
  134. http://67.171.234.129/anony/mjpg.cgi
  135. http://67.181.87.150/anony/mjpg.cgi
  136. http://67.197.233.236/anony/mjpg.cgi
  137. http://67.208.104.218/anony/mjpg.cgi
  138. http://67.251.10.119/anony/mjpg.cgi
  139. http://67.33.52.88/anony/mjpg.cgi
  140. http://67.78.177.82/anony/mjpg.cgi
  141. http://68.150.27.42/anony/mjpg.cgi
  142. http://68.238.152.8/anony/mjpg.cgi
  143. http://68.32.250.147/anony/mjpg.cgi
  144. http://68.33.59.19/anony/mjpg.cgi
  145. http://68.35.29.70/anony/mjpg.cgi
  146. http://68.35.50.248/anony/mjpg.cgi
  147. http://68.42.20.85/anony/mjpg.cgi
  148. http://68.43.6.214/anony/mjpg.cgi
  149. http://68.84.137.207/anony/mjpg.cgi
  150. http://69.205.126.54/anony/mjpg.cgi
  151. http://69.207.113.102/anony/mjpg.cgi
  152. http://69.224.255.22/anony/mjpg.cgi
  153. http://69.233.74.57/anony/mjpg.cgi
  154. http://69.250.85.209/anony/mjpg.cgi
  155. http://69.54.131.101/anony/mjpg.cgi
  156. http://70.154.118.200/anony/mjpg.cgi
  157. http://70.63.207.29/anony/mjpg.cgi
  158. http://70.70.2.150/anony/mjpg.cgi
  159. http://70.79.231.18/anony/mjpg.cgi
  160. http://70.91.73.117/anony/mjpg.cgi
  161. http://70.91.73.118/anony/mjpg.cgi
  162. http://71.123.172.211/anony/mjpg.cgi
  163. http://71.123.240.176/anony/mjpg.cgi
  164. http://71.159.226.158/anony/mjpg.cgi
  165. http://71.191.188.25/anony/mjpg.cgi
  166. http://71.195.48.118/anony/mjpg.cgi
  167. http://71.238.95.169/anony/mjpg.cgi
  168. http://71.48.226.66/anony/mjpg.cgi
  169. http://71.61.226.223/anony/mjpg.cgi
  170. http://71.95.175.35/anony/mjpg.cgi
  171. http://72.130.154.165/anony/mjpg.cgi
  172. http://72.214.3.171/anony/mjpg.cgi
  173. http://72.224.237.101/anony/mjpg.cgi
  174. http://72.227.87.110/anony/mjpg.cgi
  175. http://72.38.229.242/anony/mjpg.cgi
  176. http://72.47.172.102/anony/mjpg.cgi
  177. http://72.93.103.31/anony/mjpg.cgi
  178. http://74.108.111.189/anony/mjpg.cgi
  179. http://74.166.15.35/anony/mjpg.cgi
  180. http://74.171.4.174/anony/mjpg.cgi
  181. http://74.255.79.26/anony/mjpg.cgi
  182. http://74.255.79.28/anony/mjpg.cgi
  183. http://74.65.167.184/anony/mjpg.cgi
  184. http://74.71.239.153/anony/mjpg.cgi
  185. http://75.100.254.22/anony/mjpg.cgi
  186. http://75.133.70.133/anony/mjpg.cgi
  187. http://75.150.229.5/anony/mjpg.cgi
  188. http://75.151.35.245/anony/mjpg.cgi
  189. http://75.183.20.121/anony/mjpg.cgi
  190. http://75.24.124.30/anony/mjpg.cgi
  191. http://75.42.167.57/anony/mjpg.cgi
  192. http://75.73.31.116/anony/mjpg.cgi
  193. http://75.75.57.134/anony/mjpg.cgi
  194. http://75.80.192.205/anony/mjpg.cgi
  195. http://75.86.139.44/anony/mjpg.cgi
  196. http://76.101.68.121/anony/mjpg.cgi
  197. http://76.102.101.250/anony/mjpg.cgi
  198. http://76.116.210.124/anony/mjpg.cgi
  199. http://76.122.40.158/anony/mjpg.cgi
  200. http://76.14.54.147/anony/mjpg.cgi
  201. http://76.169.222.73/anony/mjpg.cgi
  202. http://76.169.250.29/anony/mjpg.cgi
  203. http://76.182.38.119/anony/mjpg.cgi
  204. http://76.19.163.13/anony/mjpg.cgi
  205. http://76.23.125.74/anony/mjpg.cgi
  206. http://76.88.119.191/anony/mjpg.cgi
  207. http://76.94.55.158/anony/mjpg.cgi
  208. http://78.138.156.43/anony/mjpg.cgi
  209. http://78.156.66.188/anony/mjpg.cgi
  210. http://78.230.21.73/anony/mjpg.cgi
  211. http://78.233.164.226/anony/mjpg.cgi
  212. http://78.240.194.161/anony/mjpg.cgi
  213. http://78.29.200.249/anony/mjpg.cgi
  214. http://80.13.26.222/anony/mjpg.cgi
  215. http://80.14.63.132/anony/mjpg.cgi
  216. http://80.236.68.84/anony/mjpg.cgi
  217. http://80.64.173.49/anony/mjpg.cgi
  218. http://81.116.161.148/anony/mjpg.cgi
  219. http://81.20.148.158/anony/mjpg.cgi////////
  220. http://81.56.219.120/anony/mjpg.cgi
  221. http://82.209.67.188/anony/mjpg.cgi
  222. http://82.22.197.141/anony/mjpg.cgi
  223. http://82.224.89.211/anony/mjpg.cgi
  224. http://82.227.243.195/anony/mjpg.cgi
  225. http://82.230.210.122/anony/mjpg.cgi
  226. http://82.231.232.5/anony/mjpg.cgi
  227. http://82.232.93.31/anony/mjpg.cgi
  228. http://82.237.194.47/anony/mjpg.cgi
  229. http://82.243.156.215/anony/mjpg.cgi
  230. http://82.244.74.155/anony/mjpg.cgi
  231. http://82.245.218.49/anony/mjpg.cgi
  232. http://82.247.119.136/anony/mjpg.cgi
  233. http://82.66.41.119/anony/mjpg.cgi
  234. http://82.67.56.204/anony/mjpg.cgi
  235. http://83.157.76.59/anony/mjpg.cgi
  236. http://83.94.232.9/anony/mjpg.cgi
  237. http://84.73.177.24/anony/mjpg.cgi
  238. http://85.170.41.122/anony/mjpg.cgi
  239. http://85.69.138.33/anony/mjpg.cgi
  240. http://87.102.176.118/anony/mjpg.cgi
  241. http://87.117.174.6/anony/mjpg.cgi
  242. http://87.231.31.32/anony/mjpg.cgi
  243. http://87.245.130.3/anony/mjpg.cgi
  244. http://87.90.60.31/anony/mjpg.cgi
  245. http://88.116.181.190/anony/mjpg.cgi
  246. http://88.117.197.58/anony/mjpg.cgi
  247. http://88.167.80.83/anony/mjpg.cgi
  248. http://88.171.31.37/anony/mjpg.cgi
  249. http://88.176.237.86/anony/mjpg.cgi
  250. http://88.177.114.202/anony/mjpg.cgi
  251. http://88.178.218.60/anony/mjpg.cgi
  252. http://88.183.241.107/anony/mjpg.cgi
  253. http://88.186.117.73/anony/mjpg.cgi
  254. http://88.196.100.25/anony/mjpg.cgi
  255. http://89.137.72.239/anony/mjpg.cgi
  256. http://89.156.201.187/anony/mjpg.cgi
  257. http://89.179.247.135/anony/mjpg.cgi
  258. http://89.84.137.91/anony/mjpg.cgi
  259. http://90.190.196.175/anony/mjpg.cgi
  260. http://91.143.40.187/anony/mjpg.cgi
  261. http://91.183.9.7/anony/mjpg.cgi
  262. http://91.193.168.90/anony/mjpg.cgi
  263. http://92.107.122.106/anony/mjpg.cgi
  264. http://92.79.166.218/anony/mjpg.cgi
  265. http://93.163.38.90/anony/mjpg.cgi
  266. http://93.188.159.92/anony/mjpg.cgi
  267. http://93.191.14.224/anony/mjpg.cgi
  268. http://94.18.168.77/anony/mjpg.cgi
  269. http://94.246.211.218/anony/mjpg.cgi
  270. http://94.246.211.222/anony/mjpg.cgi
  271. http://95.156.203.104/anony/mjpg.cgi
  272. http://95.166.199.10/anony/mjpg.cgi
  273. http://96.232.81.194/anony/mjpg.cgi
  274. http://96.245.214.203/anony/mjpg.cgi
  275. http://96.252.11.123/anony/mjpg.cgi
  276. http://96.4.3.59/anony/mjpg.cgi
  277. http://96.52.109.76/anony/mjpg.cgi
  278. http://96.60.111.14/anony/mjpg.cgi
  279. http://97.81.133.61/anony/mjpg.cgi
  280. http://97.82.93.28/anony/mjpg.cgi
  281. http://98.119.61.148/anony/mjpg.cgi
  282. http://98.155.56.205/anony/mjpg.cgi
  283. http://98.192.82.54/anony/mjpg.cgi
  284. http://98.196.16.153/anony/mjpg.cgi
  285. http://98.216.191.216/anony/mjpg.cgi
  286. http://98.216.198.58/anony/mjpg.cgi
  287. http://98.220.123.194/anony/mjpg.cgi
  288. http://98.225.64.171/anony/mjpg.cgi
  289. http://98.230.155.88/anony/mjpg.cgi
  290. http://98.231.51.199/anony/mjpg.cgi
  291. http://98.235.174.112/anony/mjpg.cgi
  292. http://98.235.178.38/anony/mjpg.cgi
  293. http://98.238.66.89/anony/mjpg.cgi
  294. http://98.247.234.223/anony/mjpg.cgi
  295. http://98.248.63.6/anony/mjpg.cgi
  296. http://99.1.173.119/anony/mjpg.cgi
  297. http://99.191.33.41/anony/mjpg.cgi
  298. http://99.226.128.216/anony/mjpg.cgi
  299. http://99.5.91.161/anony/mjpg.cgi
  300. http://99.8.186.105/anony/mjpg.cgi

A to Z of Carding

My goal is to make more of an all-inclusive intro to carding guide to help people get started. Keep in mind however, this is meant to guide you along the way, and will not be a tutorial on how to card specific sites, though I may give a few specific site examples along the way.

Points that will be covered in this guide

1.Introduction to Carding + Accronyms You May Encounter
2.Security Basics/Methods to Stay Safe
3.Basics of a Credit Card and the Different Types
4.The Ordering Aspect - Before and After
5.Links to applications I have mentioned

Introduction

Carding (or scamming as some would call it) is an art, and as such, expect to fail a few times while you are getting started. The key to being successful is to not give up and keep trying different sites, methods etc. When you fail, DO NOT automatically start asking people to "teach" you how to card, or asking people for their methods. Most carders have endured tireless periods of 'trial and error' which is how they eventually came upon specific methods that work for them, and they will not just give away their hard earned work to someone who hasn't worked equally hard to find their own methods.

**One point I need to make early on and will repeat it at the end is this:
PAYPAL IS NOT ACCEPTED ANYWHERE IN THE CARDING SCENE SO DO NOT ASK TO PAY WITH IT!!

*There are also many accronyms and terms are you likely to encounter in the carding scene, here are some of the most frequent:

LR - Liberty Reserve - an online form of currency that is most widely accepted in the carder scene
WU - Western Union - another form of payment that is accepted
WMZ - WebMoney - yet another form of payment that is somewhat accepted
CVV - Most often used to describe a credit card that you buy, includes cardholder name/address/ccn/cvv2. I'll go more into this later
CVV2 - Credit Verification Value - The number on the back of the card used for verification purposes. 3 digit number for visa/mc and 4 digit for AMEX (American Express) (There is also CVV1 which is a verification number that is written into the mag stripe on the back of the card that is read when the card is swiped)
Drop- an address where you can send carded goods, NOT YOUR OWN HOUSE OR FRIENDS/RELATIVES!!
CCN - Credit Card Number - Includes the number of the card and expiration date, no name or address.
MMN - Mothers Maiden Name - Comes in handy when bypassing security measures on VBV/MCSC.
DOB - Date of Birth - Used to bypass some security measures.
SSN - Social Security Number - Same as both above, used to bypass security measures.
COB - Change of Billing - Some stores will only ship large/high priced items if the shipping and billing info match, these can be obtained through some cvv sellers, usually in the form of a 'Full'
Fulls - Same info as CVV but with more info eg. security question answers, SSN, DOB, MMN, etc. which can be used for COB, etc.
AVS - Address Verification Service - System that checks the billing address entered against the credit card company's records.
VBV - Verified by Visa - Extra verification process initially added by visa, there are different types of authentication used, most notably would be a password, date of birth, social security number, or mothers maiden name.
MCSC - MasterCard SecureCode - MC (MasterCard) adopted this process after VBV came out, basically the same thing but with mastercards.
POS - Point of Sale - Terminal at a physical shop where the card is swiped/read
Dump - The information that is written onto the magnetic stripe on the back of the card, the only way to get these is with a skimmer, comes in different 'tracks' which I will not be explaining - a dump would look like 4131980030032319=11101010000000006460
Skimmer - A device that is normally attached to an atm where you insert your card, which records your card information (there are other varients, that is the most common)
Embosser - A device that 'stamps' the cards to produce the raised lettering
Tipper - A device that adds the gold/silver accents to the embossed characters
MSR - Magnetic Stripe Reader/Writer - Used in the carding scene for writing dumps (and drivers license, student ID) info to blank cards or giftcards (if you want to use blank white cards, you will need a printer for the card template, embosser/tipper also, which can get costly to buy)
BIN - Bank Identification Number - The first 6 digits of a card number (this will be gone over in more detail later on)
Novs - Novelty ID - AKA a Fake ID - Commonly used for signing at drops, store pickups, WU Drops, Bank Drops, etc.

Before You Get Started - Security Aspects


Security (some may disagree) to me is a key aspect in carding. However, an important thing to note is that IF THEY WANT TO GET YOU THAT BADLY; THEN THEY WILL NO MATTER WHAT. Here are a few key security aspects you should take into consideration before getting started:

RDP - Remote Desktop Protocol - These are normally hacked or bruted desktop computers that you connect to from your computer.
If you buy them, you will get an IP Username/Password, which you connect to by going to start>run>typing 'mstsc' without the '', you will be presented with the login screen, and voila you are on someone else's computer.

Socks5 - Is a proxy protocol, which you insert in your browser (on firefox via Tools>Options>Advanced>Network>Connection Settings>Manual Proxy Configuration>SOCKS Host>Tick Socks v5 and insert the IP and Port Number). When you have a CVV, the next step is to get a socks5 in either the same city and state as the card holder, or as close to it as you can find. There are a few different vendors and suppliers that I will give at the end of this guide.

VPN - Virtual Private Network - This will change your IP to wherever the location is of the VPN server. This is used with a application rather than through your browser as with socks. Watch out as some VPN providers will keep logs.

Hacked Routers - These are used more to just stay anonymous while browsing, unless you can get a router in the same city+state as your CVV. The upside to these is that you are on a dedicated line that is less likely to go down and isn't oversold much like many VPN's, and these are rarely blacklisted much like many socks5.

TrueCrypt - A program used to encrypt your hard drive, which requires a password to decrypt upon booting your computer up. I definetly recommend this software, and would also recommend you encrypt your entire hard drive. Remember though, use a STRONG PASSWORD, mixed case, special characters, etc and keep it a min. of 15 characters if you can.

TMAC/SMAC - These are programs used to change your MAC (Media Access Control) address, which is a unique identifier given to your NIC (network interface) card (the card in your computer used to connect to the internet). Also recommended by me.

CCleaner - A VERY handy tool to clean your browsing history (temp files, cookies) and also your Flash cookies, which many people neglect or don't even know about. Flash cookies are stealthier than regular cookies. Flash can install cookies on your computer without your permission by default, and store the same info that regular cookies do (when you visited etc).

Other security aspects to keep in mind

- Don't shit where you sleep, meaning if at all possible, don't card from your home network. If you have a laptop and a means of transportation and somewhere with free public wifi, then by all means USE IT!

- I personally use firefox since it is stable, easy to use, you can load many unique and helpful plugins (tamper data, sniffers, etc).

- Many carders get sloppy over time and will neglect to clear history, or instead of shutting down their computer just put it to sleep so they dont have to wait for it to decrypt, etc. Moral here? DON'T BE A LAZY FUCK!

- Lastly, remember, if they want to get you, they will. If you get arrested, then that usually means they have enough information on you already without even needing your computer, that would just be a plus, so encrypted really doesn't matter at this point. However, it is still a good practice to follow since if they do get it un-encrypted there will probably be more charges to follow.

- Emails - I personally use a new email for every site I card. Either Gmail or Yahoo work good for me.
Basics of a Credit Card

Types of Cards

Each credit card company starts their cards with a different number:

3 - American Express (AMEX)
4 - Visa
5 - MasterCard (MC)
6 - Discover (Disco)

Each card company has their own specific types of cards, here are some of the basics:

Visa

Classic - a universal payment tool, which was adopted worldwide in any locations designated by the logo of Visa, including ATMs, real and virtual stores, and shops offering goods and services by mail and telephone. This card is intended for those who already have experience in the use of bank cards. She also enjoys popularity among consumers of middle-income, as guaranteed convenience, choice and financial flexibility.
Gold - One of the leading products, has been adopted worldwide and allows you to enjoy
an impressive financial freedom (aka higher limit)
Platinum - These usually have limits over $10,000 (but remember, just because it has a high limit, doesn't mean it isn't already maxed out)
Signature - No preset spending limit - great bin to get
Infinite - Most prestigious card, virtually no limit. Though there are less in circulation so be cautious when buying these, stick with reputable sellers!
Business - Used for small to medium sized businesses, usually has a decent limit.
Corporate - Medium to large size businesses, larger limit than Business.
Black - limited membership, $500 annual fee, high end card, no limit

MasterCard

Standard - comparable to visa classic
Gold - comparable to visa gold
Platinum - comparable to visa plat
World - very high limit
World Elite - virtually no limit, high end card.

Amex

Gold - usually around 10k limit
Platinum- usually higher limit, around 35k
Centurion - High limit, 75k+ (also known as the black card, not to be confused with visa's black card)

**There are many more cards than this, these are just some of the basics. If I made a mistake on the card descriptions feel free to correct me as I gathered this information from other tutorials, online sources, so some may be outdated/wrong.



When you buy a cvv on a forum such as blackservice, it will usually come in a format such as this (probably not the same order though)

| credit card number | cvv2 code | exp date | name on the card | address | city | state | country | zip code | phone # (phone # sometimes not included depending on where you get your cvv's from) |

Example:
Code:

4862362667787439 | 693 | 07/10 | scott j. sawyer | 10566 parkington lane |
highlands ranch | Colorado | United States | 80126 | 7203140318 |

If we dissect this a little bit we can find out more -

- The first string of numbers is the credit card number.
- From the first digit we see that it is a Visa.
- The first 6 numbers of that string is the BIN number.
- So from this example the bin is 486236
- Searching for this bin in a BIN Database we find this information:

Code:
486236, Capital One Bank CREDIT PLATINUM USA Richmond Virginia

Platinum - Credit, so this is a nice card. Platinum is better than Classic so we would have a better chance of carding higher priced items with this. And Credit is always better since it's a line of credit instead of debit where the card holder needs to have the money physically in the bank in order to use that card.

Things to Keep in Mind When Getting Cards

AVS - Address Verification System - a system used to verify the identity of the person claiming to own the credit card. The system will check the billing address of the credit card provided by the user with the address on file at the credit card company. This was an attempt to help identity theft and fraud over the internet. This is a system we as carders dont have to worry about since we have the billing address of the credit card holder. I mentioned it since it is good to be aware of it and that almost every site has this system. It emplifies the importance of typing in the address correctly.

**If you get Non-AVS cvv's, then that means you can put in whatever you want for the billing address**

VBV - Verified by Visa - Extra verification process initially added by visa, there are different types of authentication used, most notably would be a password, date of birth, social security number, or mothers maiden name.

**In order to get by VBV you need the password, if you want to reset the password then you will need the DOB (date of birth), MMN (mothers maiden name), and SSN (social security number).

MCSC - MasterCard SecureCode - Same thing as VBV, with same info needed to bypass.

Checking the CVV's - Most shops/sellers/vendors that you get your cards from will give you the option if you want checked, or unchecked cards. Checked, depending on the method used, may kill the card, as some checkers will charge a small amount ( >$1 ) to the card, if it goes through = card is good. I won't get into all the codes that cards can return, but when starting out, it's better to just get checked cards, as most of the checkers now won't kill the cards.

Balance Checkers - I have seen some services around for balance checkers, which how they work is (this is an older method, but to my knowledge still works) by checking out on a site with however much you want to test the card for, when it comes time to enter the card info, put in fake billing information. If it says the card is declined then the card doesn't have high enough balance, but if it says something about AVS mismatch, then you know the card is good, with a high enough balance.

Using the Cards (finally, right?)

This is where a drop comes into play. When carding directly, you always want to use a drop, so if it is investigated, they won't be led straight to your house. Also, sometimes, when you order high priced items from the same company too many times they may blacklist the address.
A drop is usually an abandoned house/house for sale where you can have items sent to, and either the delivery guy will leave it there, or depending on the sites terms that you ordered from, you may have to be there to sign for it when it arrives. I won't go much more into detail as this guide is meant for beginners, and if you are beginning then just use someone else's drop for now, there are a few sellers offering drops right now in the marketplace. The key thing to remember is to
NEVER USE YOUR OWN ADDRESS OR THE ADDRESS OF ANY FRIENDS OR RELATIVES!

When you find a site you would like to card, check the Terms and Conditions and make sure that:

- They will ship to an address other than the billing address (some sites will but don't say this directly)
- Check if they require a signature on pickup
- Check they payment processors that are accepted
- Check if they do next day shipping
- Check the company they use for shipping (UPS, Fedex, USPS)
- Check if they require phone verification (some sites that sell virtual items such as Runescape Gold require it)

Things to Remember

- Next day shipping is ALWAYS BEST!
- If they require a signature, don't count them out as many droppers can do signatures
- If they do require a signature, coordinate with your drop so you know the name to send it to as they may ask to see ID
- Always try to put your orders in before noon with next day shipping, that will give most companies time to process and ship it out the same day.
- Use CCleaner BEFORE AND AFTER you do the carding. (remember to clear flash cookies also)
- Only create/use the disposable emails while on your vpn/socks
- It's good practice to keep a disposable phone around in case you do need phone verification

Steps to Take Before and After

Start with a fresh format
Get on a hacked or public WiFi
Download and install FireFox, TrueCrypt, CCleaner in that order then clear the history with CCleaner
Scope out the site you want to card, checking all the info I mentioned earlier
Use CCleaner, clean everything
Get your CVV and socks5 that you should have by now ready
Connect to a RDP if you are using one
Start up your VPN
Open FF and insert your socks5 (I gave a 'how-to' earlier)
Create an email (gmail/yahoo/hotmail doesn't matter where) with the same name as your CVV info (doesn't really matter, just easier IMO)
Checkout on the site (should be doing this in the morning, with next day shipping)
Use your freshly created email if they need it for verification purposes
Order goes through - use CCleaner again
Remember to take the socks5 out of FF
Exit the VPN/RDP

Come back on here and post a pic when you receive your item in the 'Recent carded items' thread :tounge:

There are a few more points I would like to briefly go over before this guide comes to an end.

- Giftcards are sometimes easier to card than directly carding sites, so if you have problems carding the site directly, try to card a giftcard instead and go that route.
- Start with easier sites such as Fandango and Thinkgeek carding giftcards/movie tickets to get the hang of it
- Don't try to card $1000 worth of shit on your first day of carding, wait a while until you feel confident in your abilities
- NO ONE ACCEPTS PAYPAL!

Links to Products/Applications I have mentioned during this guide

Liberty Reserve - http://www.libertyreserve.com
Western Union - http://www.westernunion.com
WebMoney - http://wmtransfer.com/
TrueCrypt - http://www.truecrypt.org/
TMAC - http://www.technitium.com/tmac/index.html
CCleaner - http://www.piriform.com/CCLEANER

Saturday, 20 July 2013

How To Make your Viruses, Payloads, Rat, Key-logger, fully Undetectable From Anti-viruses

Hi To All The 

Requirements:-
1. Backtrack 5 or any Linux Distro Having msfencoders
2. your own virus/rat/keylogger engine mine is test1.exe
follow The commands shown in figure:-
 perform all steps having root permission
Note:- click on image to see a bigger image

if You Have Any Query Write in Below Comments...
We Will Try To Figure out