ZERO TRACE DARKNET CARDER's GUIDE Table of Contents Introduction 2 Security 2 Spoofing
Total Page:16
File Type:pdf, Size:1020Kb
ZERO TRACE DARKNET CARDER'S GUIDE Table of Contents Introduction 2 Security 2 Spoofing Spoofing Software 11 Other Factors 23 A brief overview about carding 35 How to organize your Illegal data 36 Checking Cards like a Pro AVS and BINs 38 39 Sourcing Fullz@ JayFountains 41 Personal Bank Drops Business Bank account 42 52 3Dsecure Phone carding 52 Mobile carding 63 Physical items carding 64 66 Digital items carding Self-carding: Stripe 66 PayPal 68 How to process carded PayPal transfers 70 Venmo 77 86 Final words 98 100 1 Introduction Thanks for putting you trust on me I’m 100% confident this guide will be a HUGE time saver, especially for a newbie rand above all,, if you actually put the effort, will make you a ton of money THIS GUIDE IS FOR EDUCATIONAL PURPOSES ONLY. Security ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE@ JayFountains TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ 2 Hardware: you will require a burner laptop, avoid at cost desktop pcs, as you can` t bring them with you, plus if there is a raid going on from LE, you will find it harder to get rid of it/hide it. Here are the general specs that you will need to work proficiently: a minimum of a 6GB laptop will be enough to handle all the apps and processes running into the VM. I personally have a refunded Alienware 17, that`s kind of expensive though in general, you can find the same specs for a much lower price. Finally, yet importantly, the more processing cores the better. ★ PURCHASE TO UNLOCK ★ ★ PURCHASE@ JayFountains TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ 3 ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE@ JayFountains TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ You will need an Windows 7 ISO, so that you can use it to create a Win7 machine, also get an activator so that you remove the annoying trial, Google is you best friend in this case. Make sure you give as many GBs as possible to the VM so that functions properly. No install the following softwares on the machine: Mozilla Firefox (Regular Browser), Mozilla Thunderbird (E-mail Management), Tor Browser, ICQ(Mesaging), Team viewer, Viscosity (DNS leak prevention), CCleaner (System Cleaner) Bleachbit (Additional Cleaner) ★ PURCHASE TO UNLOCK ★ @ JayFountains ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ Encryption: ok, lets touch a fundamental topic about security, encryption. Here’s the bad news, encryption wont always hide 100% your illegal files, as a matter of fact many fraudsters get caught and the evidence extracted, but I still highly suggest to encrypt your illegal data. You can use Veracrypt to encrypt your virtual Machine. 5 VPN: Now you also need to install a good VPN. It stands for Virtual Private Network, it will aid in hiding you real IP and keep you protected online. A good VPN must pass this ckecklist:1) Does not store logs: this is important as if they store you IP and Law Enforcement demands for it, you are practically screwed. ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ 3)fast: Virtual Carding is slow itself when you add a VPN and Socks, so make sure your VPN is blazing fast and Pick a server@ that JayFountains is closest to your location. 4)Has a Killswich: Lets assume that tha coneecion from vpn server drops, your IP is practically naked! (except if you are under a socks5, but LE can still do a traceback and find you), so you VPN Provide must have a killswitch ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ 6)Payment by BTC Allowed: Of course you want to keep yourself anonymous even buy payment method wise, so make sure the VPN accepts BTCs. 6 ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ Luckily, NordVPN has all of these ( I use it myself) it’s a great VPN so get it ASAP, its just $8 per month. Add the key apps to the killswich setting: Mozzila Fifefox, Pidgin, Tor Browser, Mozilla Thunderbird, Remote Desktop Connection: Click Settings ---- Browser Bellow the image its shown how to do it: @ JayFountains 7 Now that you have a VPN we do some more pre-elimary steps: Go to ★ PURCHASE TO UNLOCK ★ and register an e-mail, add it to Thunderbird. ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ is the safest email provider in the world, you don’t have to worry about potential opsec leaks with them. You will use this email for all your fraud related activities. Here is an issue I faced, as a fraudster I had to deal with plenty of login credential and it was getting frustrating, ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ the solution for this was★ PURCHASE TO UNLOCK ★ . With the new email, ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ make a lastpass account. ★ PURCHASE TO UNLOCK ★ will help you to manage all the@ usernames JayFountains and passwords, has been a huge time and frustration saver for me. Install the extension on both portable Firefox , regular Firefox and chrome. After your illegal operations , you have to clear all your traces from both your host and Virtual Machine. We do so by running CCleaner and Bleachbit. 8 Follow the instructions of the image below for CCleaner: you have to check@ all JayFountains the checkboxes, ensuring that all the traces in your computer will be removed, don’t check wife free space or its going to take too long. Also you have to use the 35 Gutmann steps cleaning , ensuring that the files will be permanently deleted follow the image below for instructions: 9 ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE@ JayFountains TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ ★ PURCHASE TO UNLOCK ★ Spoofing All these websites can read a plenty of information about our fingerprint. The browser fingerprint will be used to identify us and also used as possible evidence agains us (in case they have ou real IP and other sensate data). And if they find something phishy, most likely they will put your fraudulent order on review or simply declined. The secret here is to look like the average guy, and spoof as many details of the victim. Remember that the greatest skill of a fraudster is to look as genuine as@ possible JayFountains if not more genuine than a legit customer. ★ PURCHASE TO UNLOCK ★ If you go on ★ PURCHASE TO UNLOCK ★ you will see that its able to read many thing about you. ★ PURCHASE TO UNLOCK ★ Contrary to widespread belief, having 100% score on whoer it totally bad, that’s an anonymity score, not a spoofing score, and generally speaking when you want to be anonymous, you have to hide stuff. 11 ★ PURCHASE TO UNLOCK ★ Another good one is ★ PURCHASE TO UNLOCK ★ .com, when you check you spoofing setup you have to check on both of them. I’m going to give you and ideal fingerprint that has high success rate for desktop based carding: Do Not Track(DNT): DNT is a HTTP header that allows the user to avoid tracking his or her actions by third party websites. When you work online, all your actions are saved in your browser cache: visited URLs, search queries, purchases your made in stores, etc. all this data can be read by websites and then used for marketing or analysis purposes. For example,@ a user JayFountains typed ¨buy a bike¨. This querie is saved in his or her browser cache and is now available for third parties to view. From now on, this user will be able to see bike ads all across the Internet. Do not disable this like whoer recommends, no legit user deactivates DNT. CCleaner/Bleachbit are enough to delete that fingerprint. OS: You will want to spoof your OS as Win7. Why? Because Win7 is the most widespread one at the moment. 12 User Agent: I recommend to spoof Chrome, as it’s the most widespread browser, always try to use the most recent version. Source: ★ PURCHASE TO UNLOCK ★ Screen Size: As for Scre n resoluction, the most widespread is 1366x768. e Source: ★ PURCHASE TO UNLOCK ★ Canvas Fingerprinting:@ JayFountains The HTML<canvas> element is used to draw graphics, on the fly, via scripting (Usualy JavaScript). The <canvas> element is only a container for graphics. You must use a script to actually draw the graphics. Canvas has several methods for drawing paths, boxes, circles, text and adding images. Well-developed websites sometimes has this fingerprinting measure called canvas to recognize you every time you browse that site. Firefox has an extension to randomize Canvas, Anti- detect something, same goes for Fraudfox. 13 Webrtc: About webRTC: ( Web Real-Time Communication) is an API definition drafted by the World Wide Web Consortion (W3C) that supports browser-to-browser applications for voice calling, video calling and P2P file sharing without the need of either internal or external plugins. We might be vulnerable to Webrtc IP leaks, WebRTC leaks your actual IP address from behind your VPN, by default.