Carding with kali linux tutorial – How to Card with Kali Linux

Carding with kali Linux tutorial – How to Card with Kali Linux

Hi guys, let’s start with some easy terms “Hacking credit cards is an illegal act, this is only an informational post and I am not responsible for any actions done by you after reading this carding with kali Linux tutorial. This post is for educational purposes only”, I don’t recommend starting carding after just reading this tutorial. Please guys first read all the basics of carding, here is the full tutorial of what is carding. Next please understand post and cons of carding as well as the laws applicable related to cybercrime in your country.

If you have a basic idea about carding we can start. Let’s begin with basic terminology.

What is a credit card?

A credit card is a card issued by a financial company that enables the cardholder to borrow funds. The funds may be used as payment for goods and services. Issuance of credit cards has the condition that the cardholder will pay back the original, borrowed amount plus any additional agreed-upon charges.

There are two types of Credit cards:

Debit Card: Debit means you have a sum of the amount in it and you can use them.

Credit Card: Credit means you have a credit line limit of $5000 and you can use them and by the end of the month you have to pay it to the bank.

To use a credit card on the internet you just not need a cc number and expiry date but you also need much information such as:

  • First name
  • Last name
  • Address
  • City
  • State
  • Zip
  • Country
  • Phone
  • CC number
  • Expiry date
  • CVV2

BINS = first 6 digits of every credit card is called BIN (for example cc number is: 4121638430101157 then its bin is 412163, I hope this is easy to understand.

If you get that information you can use that to buy any goods and services on the internet, like software licenses, porn site membership, proxy memberships, or anything (online services like Webhosting, and domains).

If you want to make money through hacking then you also need to be very lucky. You need to have an exact bank and bin to get the cash.

SO

Now the question is how to make money through credit cards. It’s strange, well you can’t do that, but there is specific people in the world who can do that. They call themselves cashiers. You can take some time to find a reliable cashier.

Be sure cashiers are legit because many cashiers are there who take your credit card and rip you off and don’t send your 50% share back.

You can also find some cashiers on mIRC *( /server irc.unixirc.net:6667 ) channel : #cashout, #ccpower

Well, check the website where you have a list of bins and banks mostly 101% cashable. If you get the credit card of the same bank with the same bin, then you can cash out otherwise not. Remember for using a credit card on the internet you don’t need an ATM PIN. The first method of sql injection and shop admin hacking doesn’t provide pins, it only gives cc numb cvv2 and other info which usually need for shopping not for cashing.

How to card with kali Linux

Credit card

CC can be carded by two ways:

Credit Card Scams (usually used for earning money, sometimes for shopping)

Credit Card Shopadmin Hacking (just for fun, knowledge, shopping on the internet)

  1. Shopadmin Hacking

This method is used for testing knowledge or for getting a credit card for shopping on the internet, or for fun, or any way but not for cashing ( because this method doesn’t give a PIN – 4 digit passcode ) only gives cc numb, cvv2 and other basic info.

Shopadmins are of different companies, like VP-ASP, X CART, etc. This tutorial is for hacking VP-ASP SHOP.

I hope you saw whenever you try to buy something on the internet with cc, they show you a well-programmed form, very secure. They are carts, like VP-ASP xcarts. Specific sites are not cardable, but carts are cardable.

Below I’m posting a tutorial to hack VP ASP cart. Now every site which use that cart can be hacked, and through their *mdb file you can get their client’s credit card details, and also login name and password of their admin area, and all other info of clients and company secrets.

Let’s start:

Type: VP-ASP Shopping Cart

Version: 5.00

How to find VP-ASP 5.00 sites?

Finding VP-ASP 5.00 sites is so simple…

  1. Go to Google and search for VP-ASP Shopping Cart 5.00
  2. You will find many websites with VP-ASP 5.00 cart software installed.

Now let’s go to the exploit.

The page will be like this: ****://***.victim.com/shop/shopdisplaycategories.asp

The exploit is: diag_dbtest.asp

Now you need to do this: ****://***.victim.com/shop/diag_dbtest.asp

A page will appear containing those:

xDatabase

shopping140

xDblocation

resx

xdatabasetypexEmailxEmail NamexEmailSubjectxEmailSy stemxEmailTypexOrdernumbe r

Example:

The most important thing here is xDatabase

xDatabase: shopping140

Ok, now the URL will be like this: ****://***.victim.com/shop/shopping140.mdb

If you didn’t download the Database, try this while there is dblocation:

xDblocation

resx

The url will be: ****://***.victim.com/shop/resx/shopping140.mdb

If you see the error message you have to try this:

****://***.victim.com/shop/shopping500.mdb

Download the mdb file and you should be able to open it with any mdb file viewer, you should be able to find mdb file viewer at download.com, or use MS Office Access.

Inside this file you should be able to find credit card information, and you should even be able to find the admin username and password for the website.

The admin login page is usually located here: ****://***.victim.com/shop/shopadmin.asp

If you cannot find the admin username and password in the mdb file or you can but it is incorrect, or you cannot find the mdb file at all, then try to find the admin login page and enter the default passwords which are:

Username: admin

password: admin

OR

Username: vpasp

password: vpasp

  1. Hacking Through Scams

This method is usually used to hack for earning money, in this method you create a clone page.

Here your target is eBay.com or paypal.com for general credit cards, or if you want to target any specific cashable bank like regionbank.com then you have to create a clone page for that bank. Anyway, we will keep it simple and start with eBay.com.

How to get the emails of their users?

Go to google.com and type “Email Harvestor” or any Email Spider and search for eBay Buyers and eBay Sellers and you will get long lists. That lists are not accurate but out of 1000, at least 1 email would be valid. Hard work is needed af.

Well, you create a clone page of eBay, and mail the list you create from the spider with the message, like “Your account has been hacked, please response” or any reason that looks legit, professional and ask them to visit the link below and enter your information billing and the scam page have programming when they enter their info it comes directly to your email.

In the form page, you have the PIN required so you also get the PIN number through which you can cash through ATM.

Now if you run an eBay scam or PayPal scam, it’s up to your luck who’s your victim. A client of the bank of America or of Citibank or of the region, it’s about luck, maybe you get cashable, maybe you don’t it’s just luck, nothing else.

Search on google to download a scam site and study it!

After you create your scam site, just find some email harvester or spider from the internet (download good one at Bulk Email Software Superstore – Email Marketing Internet Advertising) and create a good email list.

And you need to find a mailer (mass sending mailer) that send mass – emails to all emails with the message of updating their account on your scam page). In form to, use email eBay@reply3.ebay.com and in the subject use: eBay – Update your eBay Account and in Name use eBay

Some Instructions:

  1. Make sure your hosting remains up or the link in the email you will send, and when your victim emails visit it, it will show page cannot be displayed, and your plan will be failed.
  2. Hardest point is to find hosting which remains up in scam. Even I don’t find it easily, it’s very hard part.
  3. Maybe you have contacts with someone who own hosting company and co locations or dedicated he can hide your scam in some of dedicated without restrictions.
  4. Finding a good email list (good means = actually users)
  5. Your mass mailing software land the emails in inbox of users.

Hope you will find this tutorial (using kali linux for carding) useful.

Henceforth, WE WISH TO ANNOUNCE THAT OUR SERVICES ARE NOT AVAILABLE TO PEOPLE FROM NIGERIA AND INDIA. THESE ARE USELESS TIME WASTERS AND THIEVES TRYING TO BEG OR SCAM US OF OUR PRODUCTS. OUR SERVICES ARE NOT FREE AND PAYMENT IS UPFRONT

A LOT OF FOOLS FROM NIGERIA AND INDIA. on the off chance that YOU DON’T TRUST TO USE OUR SERVICES, DON’T CONTACT US AS WE HAVE NO FREE SERVICE

CONTACT US FOR PURCHASE/INQUIRIES, WE RESPOND ALMOST INSTANTLY 

HI BUYERS, WE ARE A PROFESSIONAL CARDING AND HACKING TEAM. HOVATOOLS HAS BEEN AROUND SINCE THE TIME OF EVO MARKET, ALPHABAY, WALLSTREET MARKET AND MORE. WE REMAIN STRONG AND RELIABLE IN THE INDUSTRY, ALWAYS PROVIDING YOU WITH THE BEST QUALITY TOOLS TO HELP YOU MAKE MONEY AND MAXIMIZE PROFIT IN THE FRAUD GAME.

TO GET STARTED, YOU CAN VISIT OUR ONLINE SHOP/STORE TO BUY EVERYTHING YOU NEED TO START CASHING OUT.  AT THE SHOP YOU GET Accounts & Bank Drops CVV & CARDS DUMPS PERSONAL INFORMATION & SCAN.

BANK HACKING SOFTWARE – WIRE/ACH DARKWEB MONEY TRANSFER HACKERS

Buy Fresh Credit Cards for Carding, BIN LIST Buy Bank Login, RDP, Buy Hacked Paypal accounts. Contact us to buy all tools and carding software. CLICK HERE TO VISIT OUR SHOP
Buy Socks 5, Email Leads, Buy Latest CC to Bitcoin Cashout Guide, Buy Hacked Zelle transfer , Western Union Money Transfer Hack, Buy Hacked Money Transfer service to your bank account.
Enroll for Paid private Carding Class.

 

Admin

The enigmatic hacking blogger who unravels the digital mysteries through his captivating blog. With relentless curiosity and a nimble touch on the keyboard, I explore the intricate web of cyberspace, exposing vulnerabilities and advocating for responsible digital citizenship. My poetic and insightful articles paint vivid pictures of the ethical dilemmas surrounding privacy, encryption, and the convergence of technology and humanity. Join me on an exhilarating journey through the labyrinth of hacking and cybersecurity as he empowers readers to become guardians of their online identities.

Leave a Reply