Virtual Carding 🕵️ The Art of Digital Reconnaissance: A Carder's Guide (Part 2) 🕵️


kathrynlaurab

Newbie
Joined
09.01.25
Messages
10
Reaction score
0
Points
1
asc-logo.png
🕵️The Art of Digital Reconnaissance: A Carder's Guide (Part 2)🕵️

Welcome back ambitious bastards. If Pt 1 was the starter, then get ready for the main event of carding recon. Were about to get into the technical stuff that separates the noobs from the pros.

This part is all about Man in the Middle (MITM) tools like Caido and Burp Suite. These arent just fancy names - theyre the real deal for dissecting your targets defenses.


View attachment 6048

Well break down how these tools work, teach you to spot AI antifraud systems and payment gateways, and show you the ins and outs of HTTP packet tampering. By the end youll see websites in a whole new light.

Warning: this isnt for noobs. If youre still trying to figure out how to use a VPN you might want to build up your skills first. But if youre ready to level up, this guide is your ticket to really understanding the websites youre trying to hit.

So sit back and focus. Were about to get technical and class is in session. Advanced carding recon ahead.



What are MITM Tools?

Burp Suite and Caido arent just fancy toys - theyre the scalpels youll use to dissect your targets.

At their core, these tools work by inserting themselves between your browser and the target website. Every request you send and every response you receive passes through them first. Its like having a nosy bastard reading all your mail, except in this case, youre the nosy bastard.

Heres the basic flow:


  • You type a URL into your browser
  • Your browser sends the request to Burp/Caido
  • Burp/Caido forwards the request to the website
  • The website sends its response back to Burp/Caido
  • Burp/Caido passes the response to your browser

But heres where it gets interesting for us carders. These tools dont just passively observe - they let you intercept, modify and even replay requests. Think of it as having a pause button for the internet.

Say youre scoping out a big e-commerce site. With Burp or Caido, you can:

  • See exactly what data is being sent when you add items to your cart
  • Identify what APIs are being called during checkout
  • Spot any hidden fields or tokens used for fraud prevention
  • Detect what kind of payment gateway theyre using

This intel is fucking gold for crafting your carding strategy. You can see precisely what info the site collects, how its formatted and where potential weak points might be.

For example, you might notice the site sends a "riskScore" parameter during checkout. Bingo - youve just identified part of their fraud prevention system. Or maybe you spot calls to a Stripe API. Now you know to use cards that havent been burned on Stripe-powered sites.

The real power comes when you start modifying requests. Changing parameters, altering headers, even injecting your own code - its all possible. This lets you test the sites defenses without actually placing orders. You can probe for weaknesses, see how the site reacts to unusual data and fine-tune your approach before risking a single card.

Setting Up Your Digital Scalpel: Burp Suite

Before we dive into the juicy stuff, you need to get your tools ready. Burp Suite is like the swiss army knife of web app hacking, and for us carders, its fucking essential. Heres how to set this beauty up:

  • Download and Install: Head to PortSwiggers website and grab the Community Edition. Its free and packs enough punch for what we need. Once downloaded, install that shit.
  • Configure Your Browser: Were using Firefox for this guide cause its less of a pain in the ass with certificates. Open Firefox, go to Settings > Network Settings and set your proxy to manual. Use these settings:
    HTTP Proxy: 127.0.0.1 Port: 8080View attachment 6050
    View attachment 6051
    View attachment 6052
  • Install BurpsCertificate: This is crucial. Without it, youll get more security warnings than a government whistleblower.
    • Open Burp and go to http://burp
    • Click "CA Certificate" in the top right
    View attachment 6053- In Firefox, go to Settings > Privacy & Security > Certificates > View Certificates
    View attachment 6054- Import the downloaded certificate and trust it for websites
    View attachment 6055
  • Adding a SOCKS Proxy(Optional): If youre using a residential proxy heres how to chain it:
    • In Burp, go to User options > SOCKS Proxy
    • Enable SOCKS proxy
    • Enter your proxy details

Now Burp will MITM your traffic and route it all through your SOCKS proxy. Slick, right?

Pro Tip: For initial recon, I usually just use a VPN set to the same country as the card Im planning to use. Its cleaner and less likely to raise flags. When its time to actually hit the site, thats when I switch to a full antidetect setup.

Mobile Recon: Yeah, you can do this shit on mobile too. Its a bit more involved and were not covering it today. Just know its possible and can be useful for sites with mobile-specific checks.


Now that youre locked and loaded, lets dive into the real shit. Time to start poking around those juicy targets.


Detecting AI Antifraud Analytics

Now that youve got Burp Suite locked and loaded, its time to put that shit to use. Before we dive in, make sure your Intercept is turned off in the Proxy tab. If its on, Burp will stop every request waiting for your input, and were not here to play 20 Questions with HTTP packets.

With Intercept off, Burp will silently record all traffic in the HTTP History tab. This is where the magic happens. As you browse your target site, youll see a flood of requests pile up here. Dont worry, well teach you how to make sense of this digital vomit.

Now, lets talk about the sneaky fuckers youre really after: AI-powered antifraud systems. These digital bloodhounds are all over modern e-commerce sites, sniffing out any hint of suspicious activity.

Modern e-commerce sites are filled with AI-powered antifraud systems. These fuckers work by injecting JavaScript into the page and monitoring everything from your mouse movements to your typing patterns.

As you go through Burps HTTP History, keep an eye out for these JavaScript files loading on the page. Theyre the calling cards of different antifraud systems:


Finding those JS files is like finding a needle in a haystack especially on sites with a million scripts. A better idea is to keep an eye out for POST requests. Thats where the magic happens.

Remember this list isnt exhaustive. Antifraud tech moves faster than fashion trends. Always be on the lookout for suspicious JS files and network requests especially those loading from 3rd party domains. If you see something that looks like antifraud but isnt on this list, dig deeper.

These scripts collect a fuckton of data about your session. Theyre tracking:

  • Device fingerprints
  • Mouse movements and clicks
  • Typing speed and patterns
  • Time spent on page
  • Browser plugins and settings

Browse through your target site, keep an eye on Burps HTTP History tab. Youll see POST requests to endpoints like "/api/risk/assess" or "/fraud/check" with all this data. Thats the antifraud system at work.

Here are a bunch of URLs for POST requests that monitor your sessions risk:


For example, if youre dealing with Sift Science, Burp will capture a request that looks something like this:

JSON:
{
  "event": {
    "$type": "$create_order",
    "$user_id": "user123",
    "$session_id": "abc123xyz",
    "$order_id": "ORDER-123456",
    "$amount": 10000,
    "$currency_code": "USD",
    "$billing_address": {
      "$name": "John Doe",
      "$address_1": "123 Main St",
      "$city": "San Francisco",
      "$region": "CA",
      "$country": "US",
      "$zipcode": "94111"
    },
    "$payment_methods": [
      {
        "$payment_type": "$credit_card",
        "$payment_gateway": "$stripe",
        "$card_bin": "424242",
        "$card_last4": "4242"
      }
    ],
    "$shipping_address": {
      "$name": "Jane Doe",
      "$address_1": "456 Oak St",
      "$city": "San Francisco",
      "$region": "CA",
      "$country": "US",
      "$zipcode": "94110"
    }
  }
}

This data is used to build a risk profile for your session. High risk scores trigger additional verification or straight-up rejections.

For some systems like Forter, the requests not show up until you initiate the payment. For cases like this you can look at requests to the main site and look for cookies like ForterToken, etc.
View attachment 6057


Booking.com Showing Riskified Token:
EwgWhLk.png


Identifying Payment Gateways

Finding the payment gateway is key to finding the right cards and methods. Heres how to expose these bastards:

Always start with a test card. Some popular test cards are:
  • Stripe: 4242 4242 4242 4242
  • Braintree: 4111 1111 1111 1111
  • Adyen: 5555 4444 3333 1111
When you submit the test card, keep an eye on the network traffic. Youll see requests to the payment gateways domain. Look for:


Heres what a Braintree request might look like:

Code:
POST [url=https://api.braintreegateway.com/merchants/merchantid/client_api/v1/payment_methods/credit_cards]https://api.braintreegateway.com/merchants/merchantid/client_api/v1/payment_methods/credit_cards[/url]
{
"credit_card": {
"number": "4111111111111111",
"expiration_month": "12",
"expiration_year": "2025",
"cvv": "123"
},
"share": true
}

And heres what a Stripe request looks like:

Code:
POST [url=https://api.stripe.com/v1/payment_intents]https://api.stripe.com/v1/payment_intents[/url]
{
"amount": 2000,
"currency": "usd",
"payment_method_types[]": "card",
"payment_method": "pm_card_visa"
}

Some sites process payments on their own domain first. If you dont see direct calls to a known payment gateway, look for requests to the sites own API endpoints like "/api/process-payment" or "/checkout/finalize".

In these cases youll need to dig deeper. Look for telltale signs in the request parameters:

  • "stripe_token" or "stripe_source" suggests Stripe
  • "braintree_nonce" points to Braintree
  • "adyen_encrypted_data" indicates Adyen
  • "cybersource_token" implies CyberSource
  • "authorize_transaction_key" hints at Authorize.Net
  • "worldpay_order_code" suggests WorldPay

Remember, some sites use multiple payment gateways or route through intermediary services. Keep an eye out for services like:
* Hidden text: cannot be quoted. *


Finding the payment gateway is just step one. Each gateway has its own quirks and potential vulnerabilities. Now you know which ones youre up against, you can fine-tune your approach and increase your chances of success.

Closing Thoughts

From setting up Burp Suite to spotting antifraud systems and unmasking payment gateways, you now have the tools to crack your targets like a pro.

Remember the more you know about a sites defenses the better you can tailor your attack. Dont just throw cards at a wall and hope something sticks. Use these techniques to craft a strategy that maximizes your chances of success.
But were not done yet. In our next guide well be diving into mobile recon. Well show you how to apply these same principles to mobile apps, a whole new playground for carding.

And well get our hands dirty with Burps Tamper tool. Youll learn how to modify requests on the fly, lower your fraud score by editing the values sent to the antifraud systems and slip past those AI dogs.

Until next time, keep your OPSEC tight and your skills sharp. Stay frosty.

Class dismissed. d0ctrine out.
Thanks
 

Mot

Newbie
Joined
16.01.22
Messages
11
Reaction score
0
Points
1
asc-logo.png
🕵️The Art of Digital Reconnaissance: A Carder's Guide (Part 2)🕵️

Welcome back ambitious bastards. If Pt 1 was the starter, then get ready for the main event of carding recon. Were about to get into the technical stuff that separates the noobs from the pros.

This part is all about Man in the Middle (MITM) tools like Caido and Burp Suite. These arent just fancy names - theyre the real deal for dissecting your targets defenses.


View attachment 6048

Well break down how these tools work, teach you to spot AI antifraud systems and payment gateways, and show you the ins and outs of HTTP packet tampering. By the end youll see websites in a whole new light.

Warning: this isnt for noobs. If youre still trying to figure out how to use a VPN you might want to build up your skills first. But if youre ready to level up, this guide is your ticket to really understanding the websites youre trying to hit.

So sit back and focus. Were about to get technical and class is in session. Advanced carding recon ahead.



What are MITM Tools?

Burp Suite and Caido arent just fancy toys - theyre the scalpels youll use to dissect your targets.

At their core, these tools work by inserting themselves between your browser and the target website. Every request you send and every response you receive passes through them first. Its like having a nosy bastard reading all your mail, except in this case, youre the nosy bastard.

Heres the basic flow:


  • You type a URL into your browser
  • Your browser sends the request to Burp/Caido
  • Burp/Caido forwards the request to the website
  • The website sends its response back to Burp/Caido
  • Burp/Caido passes the response to your browser

But heres where it gets interesting for us carders. These tools dont just passively observe - they let you intercept, modify and even replay requests. Think of it as having a pause button for the internet.

Say youre scoping out a big e-commerce site. With Burp or Caido, you can:

  • See exactly what data is being sent when you add items to your cart
  • Identify what APIs are being called during checkout
  • Spot any hidden fields or tokens used for fraud prevention
  • Detect what kind of payment gateway theyre using

This intel is fucking gold for crafting your carding strategy. You can see precisely what info the site collects, how its formatted and where potential weak points might be.

For example, you might notice the site sends a "riskScore" parameter during checkout. Bingo - youve just identified part of their fraud prevention system. Or maybe you spot calls to a Stripe API. Now you know to use cards that havent been burned on Stripe-powered sites.

The real power comes when you start modifying requests. Changing parameters, altering headers, even injecting your own code - its all possible. This lets you test the sites defenses without actually placing orders. You can probe for weaknesses, see how the site reacts to unusual data and fine-tune your approach before risking a single card.

Setting Up Your Digital Scalpel: Burp Suite

Before we dive into the juicy stuff, you need to get your tools ready. Burp Suite is like the swiss army knife of web app hacking, and for us carders, its fucking essential. Heres how to set this beauty up:

  • Download and Install: Head to PortSwiggers website and grab the Community Edition. Its free and packs enough punch for what we need. Once downloaded, install that shit.
  • Configure Your Browser: Were using Firefox for this guide cause its less of a pain in the ass with certificates. Open Firefox, go to Settings > Network Settings and set your proxy to manual. Use these settings:
    HTTP Proxy: 127.0.0.1 Port: 8080View attachment 6050
    View attachment 6051
    View attachment 6052
  • Install BurpsCertificate: This is crucial. Without it, youll get more security warnings than a government whistleblower.
    • Open Burp and go to http://burp
    • Click "CA Certificate" in the top right
    View attachment 6053- In Firefox, go to Settings > Privacy & Security > Certificates > View Certificates
    View attachment 6054- Import the downloaded certificate and trust it for websites
    View attachment 6055
  • Adding a SOCKS Proxy(Optional): If youre using a residential proxy heres how to chain it:
    • In Burp, go to User options > SOCKS Proxy
    • Enable SOCKS proxy
    • Enter your proxy details

Now Burp will MITM your traffic and route it all through your SOCKS proxy. Slick, right?

Pro Tip: For initial recon, I usually just use a VPN set to the same country as the card Im planning to use. Its cleaner and less likely to raise flags. When its time to actually hit the site, thats when I switch to a full antidetect setup.

Mobile Recon: Yeah, you can do this shit on mobile too. Its a bit more involved and were not covering it today. Just know its possible and can be useful for sites with mobile-specific checks.


Now that youre locked and loaded, lets dive into the real shit. Time to start poking around those juicy targets.


Detecting AI Antifraud Analytics

Now that youve got Burp Suite locked and loaded, its time to put that shit to use. Before we dive in, make sure your Intercept is turned off in the Proxy tab. If its on, Burp will stop every request waiting for your input, and were not here to play 20 Questions with HTTP packets.

With Intercept off, Burp will silently record all traffic in the HTTP History tab. This is where the magic happens. As you browse your target site, youll see a flood of requests pile up here. Dont worry, well teach you how to make sense of this digital vomit.

Now, lets talk about the sneaky fuckers youre really after: AI-powered antifraud systems. These digital bloodhounds are all over modern e-commerce sites, sniffing out any hint of suspicious activity.

Modern e-commerce sites are filled with AI-powered antifraud systems. These fuckers work by injecting JavaScript into the page and monitoring everything from your mouse movements to your typing patterns.

As you go through Burps HTTP History, keep an eye out for these JavaScript files loading on the page. Theyre the calling cards of different antifraud systems:


Finding those JS files is like finding a needle in a haystack especially on sites with a million scripts. A better idea is to keep an eye out for POST requests. Thats where the magic happens.

Remember this list isnt exhaustive. Antifraud tech moves faster than fashion trends. Always be on the lookout for suspicious JS files and network requests especially those loading from 3rd party domains. If you see something that looks like antifraud but isnt on this list, dig deeper.

These scripts collect a fuckton of data about your session. Theyre tracking:

  • Device fingerprints
  • Mouse movements and clicks
  • Typing speed and patterns
  • Time spent on page
  • Browser plugins and settings

Browse through your target site, keep an eye on Burps HTTP History tab. Youll see POST requests to endpoints like "/api/risk/assess" or "/fraud/check" with all this data. Thats the antifraud system at work.

Here are a bunch of URLs for POST requests that monitor your sessions risk:


For example, if youre dealing with Sift Science, Burp will capture a request that looks something like this:

JSON:
{
  "event": {
    "$type": "$create_order",
    "$user_id": "user123",
    "$session_id": "abc123xyz",
    "$order_id": "ORDER-123456",
    "$amount": 10000,
    "$currency_code": "USD",
    "$billing_address": {
      "$name": "John Doe",
      "$address_1": "123 Main St",
      "$city": "San Francisco",
      "$region": "CA",
      "$country": "US",
      "$zipcode": "94111"
    },
    "$payment_methods": [
      {
        "$payment_type": "$credit_card",
        "$payment_gateway": "$stripe",
        "$card_bin": "424242",
        "$card_last4": "4242"
      }
    ],
    "$shipping_address": {
      "$name": "Jane Doe",
      "$address_1": "456 Oak St",
      "$city": "San Francisco",
      "$region": "CA",
      "$country": "US",
      "$zipcode": "94110"
    }
  }
}

This data is used to build a risk profile for your session. High risk scores trigger additional verification or straight-up rejections.

For some systems like Forter, the requests not show up until you initiate the payment. For cases like this you can look at requests to the main site and look for cookies like ForterToken, etc.
View attachment 6057


Booking.com Showing Riskified Token:
EwgWhLk.png


Identifying Payment Gateways

Поиск платежного шлюза является ключом к поиску правильных карт и методов. Вот как разоблачить этих ублюдков:

Всегда начинайте с тестовой карты. Некоторые популярные тестовые карты:
  • Полоса : 4242 4242 4242 4242
  • Брейнтри : 4111 1111 1111 1111
  • Адьен : 5555 4444 3333 1111
Когда вы отправляете тестовую карту, следите за сетевым трафиком. Вы увидите запросы к домену платежных шлюзов. Ищите:


Вот как может выглядеть запрос Braintree :

[код]
POST https://api.braintreegateway.com/merchants/merchantid/client_api/v1/payment_methods/credit_cards
{
"кредитная карта": {
"номер": "41111111111111111",
"expiration_month": "12",
"год_истечения": "2025",
"cvv": "123"
},
"доля": правда
}
[/код]

А вот как выглядит запрос Stripe :

[код]
POST https://api.stripe.com/v1/payment_intents
{
"сумма": 2000,
"валюта": "usd",
"payment_method_types[]": "карта",
"способ_оплаты": "pm_card_visa"
}
[/код]

Некоторые сайты сначала обрабатывают платежи на своем собственном домене. Если вы не видите прямых вызовов известного платежного шлюза, ищите запросы к собственным конечным точкам API сайтов , таким как "/api/process-payment" или "/checkout/finalize".

В этих случаях вам нужно будет копать глубже. Ищите явные признаки в параметрах запроса:

  • «stripe_token» или «stripe_source» предполагает Stripe
  • "braintree_nonce" указывает на Braintree
  • «adyen_encrypted_data» указывает на Адьена.
  • «cybersource_token» подразумевает CyberSource
  • «authorize_transaction_key» намекает на Authorize.Net
  • "worldpay_order_code" предполагает WorldPay

Помните, что некоторые сайты используют несколько платежных шлюзов или маршрутизируют через посреднические сервисы. Обратите внимание на такие сервисы, как:
* Скрытый текст: не может быть процитирован. *


Поиск платежного шлюза — это всего лишь первый шаг. У каждого шлюза есть свои особенности и потенциальные уязвимости. Теперь, когда вы знаете, с чем вы сталкиваетесь, вы можете настроить свой подход и увеличить свои шансы на успех.

Заключительные мысли

От настройки Burp Suite до обнаружения систем противодействия мошенничеству и разоблачения платежных шлюзов — теперь у вас есть инструменты, позволяющие взломать ваши цели как профессионал.

Помните, чем больше вы знаете о защите сайта, тем лучше вы можете адаптировать свою атаку. Не просто бросайте карты в стену и надейтесь, что что-то прилипнет. Используйте эти приемы, чтобы разработать стратегию, которая максимизирует ваши шансы на успех.
Но мы еще не закончили. В нашем следующем руководстве мы погрузимся в мобильную разведку. Мы покажем вам, как применить эти же принципы к мобильным приложениям, совершенно новой игровой площадке для кардинга.

И мы запачкаем руки с инструментом Burps Tamper. Вы узнаете, как изменять запросы на лету, как снизить свой рейтинг мошенничества, редактируя значения, отправляемые в антифрод-системы, и как обойти этих собак ИИ .

До следующего раза, держите OPSEC наготове, а навыки отточенными. Оставайтесь холодными.

Класс распущен. Д0ктрина окончена.
тks bro, i love you d0ctrine
 

dnaog

Newbie
Joined
24.01.25
Messages
14
Reaction score
0
Points
1
asc-logo.png
🕵️The Art of Digital Reconnaissance: A Carder's Guide (Part 2)🕵️

Welcome back ambitious bastards. If Pt 1 was the starter, then get ready for the main event of carding recon. Were about to get into the technical stuff that separates the noobs from the pros.

This part is all about Man in the Middle (MITM) tools like Caido and Burp Suite. These arent just fancy names - theyre the real deal for dissecting your targets defenses.


View attachment 6048

Well break down how these tools work, teach you to spot AI antifraud systems and payment gateways, and show you the ins and outs of HTTP packet tampering. By the end youll see websites in a whole new light.

Warning: this isnt for noobs. If youre still trying to figure out how to use a VPN you might want to build up your skills first. But if youre ready to level up, this guide is your ticket to really understanding the websites youre trying to hit.

So sit back and focus. Were about to get technical and class is in session. Advanced carding recon ahead.



What are MITM Tools?

Burp Suite and Caido arent just fancy toys - theyre the scalpels youll use to dissect your targets.

At their core, these tools work by inserting themselves between your browser and the target website. Every request you send and every response you receive passes through them first. Its like having a nosy bastard reading all your mail, except in this case, youre the nosy bastard.

Heres the basic flow:


  • You type a URL into your browser
  • Your browser sends the request to Burp/Caido
  • Burp/Caido forwards the request to the website
  • The website sends its response back to Burp/Caido
  • Burp/Caido passes the response to your browser

But heres where it gets interesting for us carders. These tools dont just passively observe - they let you intercept, modify and even replay requests. Think of it as having a pause button for the internet.

Say youre scoping out a big e-commerce site. With Burp or Caido, you can:

  • See exactly what data is being sent when you add items to your cart
  • Identify what APIs are being called during checkout
  • Spot any hidden fields or tokens used for fraud prevention
  • Detect what kind of payment gateway theyre using

This intel is fucking gold for crafting your carding strategy. You can see precisely what info the site collects, how its formatted and where potential weak points might be.

For example, you might notice the site sends a "riskScore" parameter during checkout. Bingo - youve just identified part of their fraud prevention system. Or maybe you spot calls to a Stripe API. Now you know to use cards that havent been burned on Stripe-powered sites.

The real power comes when you start modifying requests. Changing parameters, altering headers, even injecting your own code - its all possible. This lets you test the sites defenses without actually placing orders. You can probe for weaknesses, see how the site reacts to unusual data and fine-tune your approach before risking a single card.

Setting Up Your Digital Scalpel: Burp Suite

Before we dive into the juicy stuff, you need to get your tools ready. Burp Suite is like the swiss army knife of web app hacking, and for us carders, its fucking essential. Heres how to set this beauty up:

  • Download and Install: Head to PortSwiggers website and grab the Community Edition. Its free and packs enough punch for what we need. Once downloaded, install that shit.
  • Configure Your Browser: Were using Firefox for this guide cause its less of a pain in the ass with certificates. Open Firefox, go to Settings > Network Settings and set your proxy to manual. Use these settings:
    HTTP Proxy: 127.0.0.1 Port: 8080View attachment 6050
    View attachment 6051
    View attachment 6052
  • Install BurpsCertificate: This is crucial. Without it, youll get more security warnings than a government whistleblower.
    • Open Burp and go to http://burp
    • Click "CA Certificate" in the top right
    View attachment 6053- In Firefox, go to Settings > Privacy & Security > Certificates > View Certificates
    View attachment 6054- Import the downloaded certificate and trust it for websites
    View attachment 6055
  • Adding a SOCKS Proxy(Optional): If youre using a residential proxy heres how to chain it:
    • In Burp, go to User options > SOCKS Proxy
    • Enable SOCKS proxy
    • Enter your proxy details

Now Burp will MITM your traffic and route it all through your SOCKS proxy. Slick, right?

Pro Tip: For initial recon, I usually just use a VPN set to the same country as the card Im planning to use. Its cleaner and less likely to raise flags. When its time to actually hit the site, thats when I switch to a full antidetect setup.

Mobile Recon: Yeah, you can do this shit on mobile too. Its a bit more involved and were not covering it today. Just know its possible and can be useful for sites with mobile-specific checks.


Now that youre locked and loaded, lets dive into the real shit. Time to start poking around those juicy targets.


Detecting AI Antifraud Analytics

Now that youve got Burp Suite locked and loaded, its time to put that shit to use. Before we dive in, make sure your Intercept is turned off in the Proxy tab. If its on, Burp will stop every request waiting for your input, and were not here to play 20 Questions with HTTP packets.

With Intercept off, Burp will silently record all traffic in the HTTP History tab. This is where the magic happens. As you browse your target site, youll see a flood of requests pile up here. Dont worry, well teach you how to make sense of this digital vomit.

Now, lets talk about the sneaky fuckers youre really after: AI-powered antifraud systems. These digital bloodhounds are all over modern e-commerce sites, sniffing out any hint of suspicious activity.

Modern e-commerce sites are filled with AI-powered antifraud systems. These fuckers work by injecting JavaScript into the page and monitoring everything from your mouse movements to your typing patterns.

As you go through Burps HTTP History, keep an eye out for these JavaScript files loading on the page. Theyre the calling cards of different antifraud systems:


Finding those JS files is like finding a needle in a haystack especially on sites with a million scripts. A better idea is to keep an eye out for POST requests. Thats where the magic happens.

Remember this list isnt exhaustive. Antifraud tech moves faster than fashion trends. Always be on the lookout for suspicious JS files and network requests especially those loading from 3rd party domains. If you see something that looks like antifraud but isnt on this list, dig deeper.

These scripts collect a fuckton of data about your session. Theyre tracking:

  • Device fingerprints
  • Mouse movements and clicks
  • Typing speed and patterns
  • Time spent on page
  • Browser plugins and settings

Browse through your target site, keep an eye on Burps HTTP History tab. Youll see POST requests to endpoints like "/api/risk/assess" or "/fraud/check" with all this data. Thats the antifraud system at work.

Here are a bunch of URLs for POST requests that monitor your sessions risk:


For example, if youre dealing with Sift Science, Burp will capture a request that looks something like this:

JSON:
{
  "event": {
    "$type": "$create_order",
    "$user_id": "user123",
    "$session_id": "abc123xyz",
    "$order_id": "ORDER-123456",
    "$amount": 10000,
    "$currency_code": "USD",
    "$billing_address": {
      "$name": "John Doe",
      "$address_1": "123 Main St",
      "$city": "San Francisco",
      "$region": "CA",
      "$country": "US",
      "$zipcode": "94111"
    },
    "$payment_methods": [
      {
        "$payment_type": "$credit_card",
        "$payment_gateway": "$stripe",
        "$card_bin": "424242",
        "$card_last4": "4242"
      }
    ],
    "$shipping_address": {
      "$name": "Jane Doe",
      "$address_1": "456 Oak St",
      "$city": "San Francisco",
      "$region": "CA",
      "$country": "US",
      "$zipcode": "94110"
    }
  }
}

This data is used to build a risk profile for your session. High risk scores trigger additional verification or straight-up rejections.

For some systems like Forter, the requests not show up until you initiate the payment. For cases like this you can look at requests to the main site and look for cookies like ForterToken, etc.
View attachment 6057


Booking.com Showing Riskified Token:
EwgWhLk.png


Identifying Payment Gateways

Finding the payment gateway is key to finding the right cards and methods. Heres how to expose these bastards:

Always start with a test card. Some popular test cards are:
  • Stripe: 4242 4242 4242 4242
  • Braintree: 4111 1111 1111 1111
  • Adyen: 5555 4444 3333 1111
When you submit the test card, keep an eye on the network traffic. Youll see requests to the payment gateways domain. Look for:


Heres what a Braintree request might look like:

Code:
POST [url=https://api.braintreegateway.com/merchants/merchantid/client_api/v1/payment_methods/credit_cards]https://api.braintreegateway.com/merchants/merchantid/client_api/v1/payment_methods/credit_cards[/url]
{
"credit_card": {
"number": "4111111111111111",
"expiration_month": "12",
"expiration_year": "2025",
"cvv": "123"
},
"share": true
}

And heres what a Stripe request looks like:

Code:
POST [url=https://api.stripe.com/v1/payment_intents]https://api.stripe.com/v1/payment_intents[/url]
{
"amount": 2000,
"currency": "usd",
"payment_method_types[]": "card",
"payment_method": "pm_card_visa"
}

Some sites process payments on their own domain first. If you dont see direct calls to a known payment gateway, look for requests to the sites own API endpoints like "/api/process-payment" or "/checkout/finalize".

In these cases youll need to dig deeper. Look for telltale signs in the request parameters:

  • "stripe_token" or "stripe_source" suggests Stripe
  • "braintree_nonce" points to Braintree
  • "adyen_encrypted_data" indicates Adyen
  • "cybersource_token" implies CyberSource
  • "authorize_transaction_key" hints at Authorize.Net
  • "worldpay_order_code" suggests WorldPay

Remember, some sites use multiple payment gateways or route through intermediary services. Keep an eye out for services like:
* Hidden text: cannot be quoted. *


Finding the payment gateway is just step one. Each gateway has its own quirks and potential vulnerabilities. Now you know which ones youre up against, you can fine-tune your approach and increase your chances of success.

Closing Thoughts

From setting up Burp Suite to spotting antifraud systems and unmasking payment gateways, you now have the tools to crack your targets like a pro.

Remember the more you know about a sites defenses the better you can tailor your attack. Dont just throw cards at a wall and hope something sticks. Use these techniques to craft a strategy that maximizes your chances of success.
But were not done yet. In our next guide well be diving into mobile recon. Well show you how to apply these same principles to mobile apps, a whole new playground for carding.

And well get our hands dirty with Burps Tamper tool. Youll learn how to modify requests on the fly, lower your fraud score by editing the values sent to the antifraud systems and slip past those AI dogs.

Until next time, keep your OPSEC tight and your skills sharp. Stay frosty.

Class dismissed. d0ctrine out.
thanks
 

carder2025

Newbie
Joined
05.01.25
Messages
19
Reaction score
3
Points
3
asc-logo.png
🕵️The Art of Digital Reconnaissance: A Carder's Guide (Part 2)🕵️

Welcome back ambitious bastards. If Pt 1 was the starter, then get ready for the main event of carding recon. Were about to get into the technical stuff that separates the noobs from the pros.

This part is all about Man in the Middle (MITM) tools like Caido and Burp Suite. These arent just fancy names - theyre the real deal for dissecting your targets defenses.


View attachment 6048

Well break down how these tools work, teach you to spot AI antifraud systems and payment gateways, and show you the ins and outs of HTTP packet tampering. By the end youll see websites in a whole new light.

Warning: this isnt for noobs. If youre still trying to figure out how to use a VPN you might want to build up your skills first. But if youre ready to level up, this guide is your ticket to really understanding the websites youre trying to hit.

So sit back and focus. Were about to get technical and class is in session. Advanced carding recon ahead.



What are MITM Tools?

Burp Suite and Caido arent just fancy toys - theyre the scalpels youll use to dissect your targets.

At their core, these tools work by inserting themselves between your browser and the target website. Every request you send and every response you receive passes through them first. Its like having a nosy bastard reading all your mail, except in this case, youre the nosy bastard.

Heres the basic flow:


  • You type a URL into your browser
  • Your browser sends the request to Burp/Caido
  • Burp/Caido forwards the request to the website
  • The website sends its response back to Burp/Caido
  • Burp/Caido passes the response to your browser

But heres where it gets interesting for us carders. These tools dont just passively observe - they let you intercept, modify and even replay requests. Think of it as having a pause button for the internet.

Say youre scoping out a big e-commerce site. With Burp or Caido, you can:

  • See exactly what data is being sent when you add items to your cart
  • Identify what APIs are being called during checkout
  • Spot any hidden fields or tokens used for fraud prevention
  • Detect what kind of payment gateway theyre using

This intel is fucking gold for crafting your carding strategy. You can see precisely what info the site collects, how its formatted and where potential weak points might be.

For example, you might notice the site sends a "riskScore" parameter during checkout. Bingo - youve just identified part of their fraud prevention system. Or maybe you spot calls to a Stripe API. Now you know to use cards that havent been burned on Stripe-powered sites.

The real power comes when you start modifying requests. Changing parameters, altering headers, even injecting your own code - its all possible. This lets you test the sites defenses without actually placing orders. You can probe for weaknesses, see how the site reacts to unusual data and fine-tune your approach before risking a single card.

Setting Up Your Digital Scalpel: Burp Suite

Before we dive into the juicy stuff, you need to get your tools ready. Burp Suite is like the swiss army knife of web app hacking, and for us carders, its fucking essential. Heres how to set this beauty up:

  • Download and Install: Head to PortSwiggers website and grab the Community Edition. Its free and packs enough punch for what we need. Once downloaded, install that shit.
  • Configure Your Browser: Were using Firefox for this guide cause its less of a pain in the ass with certificates. Open Firefox, go to Settings > Network Settings and set your proxy to manual. Use these settings:
    HTTP Proxy: 127.0.0.1 Port: 8080View attachment 6050
    View attachment 6051
    View attachment 6052
  • Install BurpsCertificate: This is crucial. Without it, youll get more security warnings than a government whistleblower.
    • Open Burp and go to http://burp
    • Click "CA Certificate" in the top right
    View attachment 6053- In Firefox, go to Settings > Privacy & Security > Certificates > View Certificates
    View attachment 6054- Import the downloaded certificate and trust it for websites
    View attachment 6055
  • Adding a SOCKS Proxy(Optional): If youre using a residential proxy heres how to chain it:
    • In Burp, go to User options > SOCKS Proxy
    • Enable SOCKS proxy
    • Enter your proxy details

Now Burp will MITM your traffic and route it all through your SOCKS proxy. Slick, right?

Pro Tip: For initial recon, I usually just use a VPN set to the same country as the card Im planning to use. Its cleaner and less likely to raise flags. When its time to actually hit the site, thats when I switch to a full antidetect setup.

Mobile Recon: Yeah, you can do this shit on mobile too. Its a bit more involved and were not covering it today. Just know its possible and can be useful for sites with mobile-specific checks.


Now that youre locked and loaded, lets dive into the real shit. Time to start poking around those juicy targets.


Detecting AI Antifraud Analytics

Now that youve got Burp Suite locked and loaded, its time to put that shit to use. Before we dive in, make sure your Intercept is turned off in the Proxy tab. If its on, Burp will stop every request waiting for your input, and were not here to play 20 Questions with HTTP packets.

With Intercept off, Burp will silently record all traffic in the HTTP History tab. This is where the magic happens. As you browse your target site, youll see a flood of requests pile up here. Dont worry, well teach you how to make sense of this digital vomit.

Now, lets talk about the sneaky fuckers youre really after: AI-powered antifraud systems. These digital bloodhounds are all over modern e-commerce sites, sniffing out any hint of suspicious activity.

Modern e-commerce sites are filled with AI-powered antifraud systems. These fuckers work by injecting JavaScript into the page and monitoring everything from your mouse movements to your typing patterns.

As you go through Burps HTTP History, keep an eye out for these JavaScript files loading on the page. Theyre the calling cards of different antifraud systems:


Finding those JS files is like finding a needle in a haystack especially on sites with a million scripts. A better idea is to keep an eye out for POST requests. Thats where the magic happens.

Remember this list isnt exhaustive. Antifraud tech moves faster than fashion trends. Always be on the lookout for suspicious JS files and network requests especially those loading from 3rd party domains. If you see something that looks like antifraud but isnt on this list, dig deeper.

These scripts collect a fuckton of data about your session. Theyre tracking:

  • Device fingerprints
  • Mouse movements and clicks
  • Typing speed and patterns
  • Time spent on page
  • Browser plugins and settings

Browse through your target site, keep an eye on Burps HTTP History tab. Youll see POST requests to endpoints like "/api/risk/assess" or "/fraud/check" with all this data. Thats the antifraud system at work.

Here are a bunch of URLs for POST requests that monitor your sessions risk:


For example, if youre dealing with Sift Science, Burp will capture a request that looks something like this:

JSON:
{
  "event": {
    "$type": "$create_order",
    "$user_id": "user123",
    "$session_id": "abc123xyz",
    "$order_id": "ORDER-123456",
    "$amount": 10000,
    "$currency_code": "USD",
    "$billing_address": {
      "$name": "John Doe",
      "$address_1": "123 Main St",
      "$city": "San Francisco",
      "$region": "CA",
      "$country": "US",
      "$zipcode": "94111"
    },
    "$payment_methods": [
      {
        "$payment_type": "$credit_card",
        "$payment_gateway": "$stripe",
        "$card_bin": "424242",
        "$card_last4": "4242"
      }
    ],
    "$shipping_address": {
      "$name": "Jane Doe",
      "$address_1": "456 Oak St",
      "$city": "San Francisco",
      "$region": "CA",
      "$country": "US",
      "$zipcode": "94110"
    }
  }
}

This data is used to build a risk profile for your session. High risk scores trigger additional verification or straight-up rejections.

For some systems like Forter, the requests not show up until you initiate the payment. For cases like this you can look at requests to the main site and look for cookies like ForterToken, etc.
View attachment 6057


Booking.com Showing Riskified Token:
EwgWhLk.png


Identifying Payment Gateways

Finding the payment gateway is key to finding the right cards and methods. Heres how to expose these bastards:

Always start with a test card. Some popular test cards are:
  • Stripe: 4242 4242 4242 4242
  • Braintree: 4111 1111 1111 1111
  • Adyen: 5555 4444 3333 1111
When you submit the test card, keep an eye on the network traffic. Youll see requests to the payment gateways domain. Look for:


Heres what a Braintree request might look like:

Code:
POST [url=https://api.braintreegateway.com/merchants/merchantid/client_api/v1/payment_methods/credit_cards]https://api.braintreegateway.com/merchants/merchantid/client_api/v1/payment_methods/credit_cards[/url]
{
"credit_card": {
"number": "4111111111111111",
"expiration_month": "12",
"expiration_year": "2025",
"cvv": "123"
},
"share": true
}

And heres what a Stripe request looks like:

Code:
POST [url=https://api.stripe.com/v1/payment_intents]https://api.stripe.com/v1/payment_intents[/url]
{
"amount": 2000,
"currency": "usd",
"payment_method_types[]": "card",
"payment_method": "pm_card_visa"
}

Some sites process payments on their own domain first. If you dont see direct calls to a known payment gateway, look for requests to the sites own API endpoints like "/api/process-payment" or "/checkout/finalize".

In these cases youll need to dig deeper. Look for telltale signs in the request parameters:

  • "stripe_token" or "stripe_source" suggests Stripe
  • "braintree_nonce" points to Braintree
  • "adyen_encrypted_data" indicates Adyen
  • "cybersource_token" implies CyberSource
  • "authorize_transaction_key" hints at Authorize.Net
  • "worldpay_order_code" suggests WorldPay

Remember, some sites use multiple payment gateways or route through intermediary services. Keep an eye out for services like:
* Hidden text: cannot be quoted. *


Finding the payment gateway is just step one. Each gateway has its own quirks and potential vulnerabilities. Now you know which ones youre up against, you can fine-tune your approach and increase your chances of success.

Closing Thoughts

From setting up Burp Suite to spotting antifraud systems and unmasking payment gateways, you now have the tools to crack your targets like a pro.

Remember the more you know about a sites defenses the better you can tailor your attack. Dont just throw cards at a wall and hope something sticks. Use these techniques to craft a strategy that maximizes your chances of success.
But were not done yet. In our next guide well be diving into mobile recon. Well show you how to apply these same principles to mobile apps, a whole new playground for carding.

And well get our hands dirty with Burps Tamper tool. Youll learn how to modify requests on the fly, lower your fraud score by editing the values sent to the antifraud systems and slip past those AI dogs.

Until next time, keep your OPSEC tight and your skills sharp. Stay frosty.

Class dismissed. d0ctrine out.
wow all this source for free! thanks man!
 

Onyx451

Newbie
Joined
26.01.25
Messages
9
Reaction score
0
Points
1
asc-logo.png
🕵️The Art of Digital Reconnaissance: A Carder's Guide (Part 2)🕵️

Welcome back ambitious bastards. If Pt 1 was the starter, then get ready for the main event of carding recon. Were about to get into the technical stuff that separates the noobs from the pros.

This part is all about Man in the Middle (MITM) tools like Caido and Burp Suite. These arent just fancy names - theyre the real deal for dissecting your targets defenses.


View attachment 6048

Well break down how these tools work, teach you to spot AI antifraud systems and payment gateways, and show you the ins and outs of HTTP packet tampering. By the end youll see websites in a whole new light.

Warning: this isnt for noobs. If youre still trying to figure out how to use a VPN you might want to build up your skills first. But if youre ready to level up, this guide is your ticket to really understanding the websites youre trying to hit.

So sit back and focus. Were about to get technical and class is in session. Advanced carding recon ahead.



What are MITM Tools?

Burp Suite and Caido arent just fancy toys - theyre the scalpels youll use to dissect your targets.

At their core, these tools work by inserting themselves between your browser and the target website. Every request you send and every response you receive passes through them first. Its like having a nosy bastard reading all your mail, except in this case, youre the nosy bastard.

Heres the basic flow:


  • You type a URL into your browser
  • Your browser sends the request to Burp/Caido
  • Burp/Caido forwards the request to the website
  • The website sends its response back to Burp/Caido
  • Burp/Caido passes the response to your browser

But heres where it gets interesting for us carders. These tools dont just passively observe - they let you intercept, modify and even replay requests. Think of it as having a pause button for the internet.

Say youre scoping out a big e-commerce site. With Burp or Caido, you can:

  • See exactly what data is being sent when you add items to your cart
  • Identify what APIs are being called during checkout
  • Spot any hidden fields or tokens used for fraud prevention
  • Detect what kind of payment gateway theyre using

This intel is fucking gold for crafting your carding strategy. You can see precisely what info the site collects, how its formatted and where potential weak points might be.

For example, you might notice the site sends a "riskScore" parameter during checkout. Bingo - youve just identified part of their fraud prevention system. Or maybe you spot calls to a Stripe API. Now you know to use cards that havent been burned on Stripe-powered sites.

The real power comes when you start modifying requests. Changing parameters, altering headers, even injecting your own code - its all possible. This lets you test the sites defenses without actually placing orders. You can probe for weaknesses, see how the site reacts to unusual data and fine-tune your approach before risking a single card.

Setting Up Your Digital Scalpel: Burp Suite

Before we dive into the juicy stuff, you need to get your tools ready. Burp Suite is like the swiss army knife of web app hacking, and for us carders, its fucking essential. Heres how to set this beauty up:

  • Download and Install: Head to PortSwiggers website and grab the Community Edition. Its free and packs enough punch for what we need. Once downloaded, install that shit.
  • Configure Your Browser: Were using Firefox for this guide cause its less of a pain in the ass with certificates. Open Firefox, go to Settings > Network Settings and set your proxy to manual. Use these settings:
    HTTP Proxy: 127.0.0.1 Port: 8080View attachment 6050
    View attachment 6051
    View attachment 6052
  • Install BurpsCertificate: This is crucial. Without it, youll get more security warnings than a government whistleblower.
    • Open Burp and go to http://burp
    • Click "CA Certificate" in the top right
    View attachment 6053- In Firefox, go to Settings > Privacy & Security > Certificates > View Certificates
    View attachment 6054- Import the downloaded certificate and trust it for websites
    View attachment 6055
  • Adding a SOCKS Proxy(Optional): If youre using a residential proxy heres how to chain it:
    • In Burp, go to User options > SOCKS Proxy
    • Enable SOCKS proxy
    • Enter your proxy details

Now Burp will MITM your traffic and route it all through your SOCKS proxy. Slick, right?

Pro Tip: For initial recon, I usually just use a VPN set to the same country as the card Im planning to use. Its cleaner and less likely to raise flags. When its time to actually hit the site, thats when I switch to a full antidetect setup.

Mobile Recon: Yeah, you can do this shit on mobile too. Its a bit more involved and were not covering it today. Just know its possible and can be useful for sites with mobile-specific checks.


Now that youre locked and loaded, lets dive into the real shit. Time to start poking around those juicy targets.


Detecting AI Antifraud Analytics

Now that youve got Burp Suite locked and loaded, its time to put that shit to use. Before we dive in, make sure your Intercept is turned off in the Proxy tab. If its on, Burp will stop every request waiting for your input, and were not here to play 20 Questions with HTTP packets.

With Intercept off, Burp will silently record all traffic in the HTTP History tab. This is where the magic happens. As you browse your target site, youll see a flood of requests pile up here. Dont worry, well teach you how to make sense of this digital vomit.

Now, lets talk about the sneaky fuckers youre really after: AI-powered antifraud systems. These digital bloodhounds are all over modern e-commerce sites, sniffing out any hint of suspicious activity.

Modern e-commerce sites are filled with AI-powered antifraud systems. These fuckers work by injecting JavaScript into the page and monitoring everything from your mouse movements to your typing patterns.

As you go through Burps HTTP History, keep an eye out for these JavaScript files loading on the page. Theyre the calling cards of different antifraud systems:


Finding those JS files is like finding a needle in a haystack especially on sites with a million scripts. A better idea is to keep an eye out for POST requests. Thats where the magic happens.

Remember this list isnt exhaustive. Antifraud tech moves faster than fashion trends. Always be on the lookout for suspicious JS files and network requests especially those loading from 3rd party domains. If you see something that looks like antifraud but isnt on this list, dig deeper.

These scripts collect a fuckton of data about your session. Theyre tracking:

  • Device fingerprints
  • Mouse movements and clicks
  • Typing speed and patterns
  • Time spent on page
  • Browser plugins and settings

Browse through your target site, keep an eye on Burps HTTP History tab. Youll see POST requests to endpoints like "/api/risk/assess" or "/fraud/check" with all this data. Thats the antifraud system at work.

Here are a bunch of URLs for POST requests that monitor your sessions risk:


For example, if youre dealing with Sift Science, Burp will capture a request that looks something like this:

JSON:
{
  "event": {
    "$type": "$create_order",
    "$user_id": "user123",
    "$session_id": "abc123xyz",
    "$order_id": "ORDER-123456",
    "$amount": 10000,
    "$currency_code": "USD",
    "$billing_address": {
      "$name": "John Doe",
      "$address_1": "123 Main St",
      "$city": "San Francisco",
      "$region": "CA",
      "$country": "US",
      "$zipcode": "94111"
    },
    "$payment_methods": [
      {
        "$payment_type": "$credit_card",
        "$payment_gateway": "$stripe",
        "$card_bin": "424242",
        "$card_last4": "4242"
      }
    ],
    "$shipping_address": {
      "$name": "Jane Doe",
      "$address_1": "456 Oak St",
      "$city": "San Francisco",
      "$region": "CA",
      "$country": "US",
      "$zipcode": "94110"
    }
  }
}

This data is used to build a risk profile for your session. High risk scores trigger additional verification or straight-up rejections.

For some systems like Forter, the requests not show up until you initiate the payment. For cases like this you can look at requests to the main site and look for cookies like ForterToken, etc.
View attachment 6057


Booking.com Showing Riskified Token:
EwgWhLk.png


Identifying Payment Gateways

Finding the payment gateway is key to finding the right cards and methods. Heres how to expose these bastards:

Always start with a test card. Some popular test cards are:
  • Stripe: 4242 4242 4242 4242
  • Braintree: 4111 1111 1111 1111
  • Adyen: 5555 4444 3333 1111
When you submit the test card, keep an eye on the network traffic. Youll see requests to the payment gateways domain. Look for:


Heres what a Braintree request might look like:

Code:
POST [url=https://api.braintreegateway.com/merchants/merchantid/client_api/v1/payment_methods/credit_cards]https://api.braintreegateway.com/merchants/merchantid/client_api/v1/payment_methods/credit_cards[/url]
{
"credit_card": {
"number": "4111111111111111",
"expiration_month": "12",
"expiration_year": "2025",
"cvv": "123"
},
"share": true
}

And heres what a Stripe request looks like:

Code:
POST [url=https://api.stripe.com/v1/payment_intents]https://api.stripe.com/v1/payment_intents[/url]
{
"amount": 2000,
"currency": "usd",
"payment_method_types[]": "card",
"payment_method": "pm_card_visa"
}

Some sites process payments on their own domain first. If you dont see direct calls to a known payment gateway, look for requests to the sites own API endpoints like "/api/process-payment" or "/checkout/finalize".

In these cases youll need to dig deeper. Look for telltale signs in the request parameters:

  • "stripe_token" or "stripe_source" suggests Stripe
  • "braintree_nonce" points to Braintree
  • "adyen_encrypted_data" indicates Adyen
  • "cybersource_token" implies CyberSource
  • "authorize_transaction_key" hints at Authorize.Net
  • "worldpay_order_code" suggests WorldPay

Remember, some sites use multiple payment gateways or route through intermediary services. Keep an eye out for services like:
* Hidden text: cannot be quoted. *


Finding the payment gateway is just step one. Each gateway has its own quirks and potential vulnerabilities. Now you know which ones youre up against, you can fine-tune your approach and increase your chances of success.

Closing Thoughts

From setting up Burp Suite to spotting antifraud systems and unmasking payment gateways, you now have the tools to crack your targets like a pro.

Remember the more you know about a sites defenses the better you can tailor your attack. Dont just throw cards at a wall and hope something sticks. Use these techniques to craft a strategy that maximizes your chances of success.
But were not done yet. In our next guide well be diving into mobile recon. Well show you how to apply these same principles to mobile apps, a whole new playground for carding.

And well get our hands dirty with Burps Tamper tool. Youll learn how to modify requests on the fly, lower your fraud score by editing the values sent to the antifraud systems and slip past those AI dogs.

Until next time, keep your OPSEC tight and your skills sharp. Stay frosty.

Class dismissed. d0ctrine out.
Fire
 

bleedinbleed

Newbie
Joined
08.12.24
Messages
13
Reaction score
2
Points
3
asc-logo.png
🕵️The Art of Digital Reconnaissance: A Carder's Guide (Part 2)🕵️

Welcome back ambitious bastards. If Pt 1 was the starter, then get ready for the main event of carding recon. Were about to get into the technical stuff that separates the noobs from the pros.

This part is all about Man in the Middle (MITM) tools like Caido and Burp Suite. These arent just fancy names - theyre the real deal for dissecting your targets defenses.


View attachment 6048

Well break down how these tools work, teach you to spot AI antifraud systems and payment gateways, and show you the ins and outs of HTTP packet tampering. By the end youll see websites in a whole new light.

Warning: this isnt for noobs. If youre still trying to figure out how to use a VPN you might want to build up your skills first. But if youre ready to level up, this guide is your ticket to really understanding the websites youre trying to hit.

So sit back and focus. Were about to get technical and class is in session. Advanced carding recon ahead.



What are MITM Tools?

Burp Suite and Caido arent just fancy toys - theyre the scalpels youll use to dissect your targets.

At their core, these tools work by inserting themselves between your browser and the target website. Every request you send and every response you receive passes through them first. Its like having a nosy bastard reading all your mail, except in this case, youre the nosy bastard.

Heres the basic flow:


  • You type a URL into your browser
  • Your browser sends the request to Burp/Caido
  • Burp/Caido forwards the request to the website
  • The website sends its response back to Burp/Caido
  • Burp/Caido passes the response to your browser

But heres where it gets interesting for us carders. These tools dont just passively observe - they let you intercept, modify and even replay requests. Think of it as having a pause button for the internet.

Say youre scoping out a big e-commerce site. With Burp or Caido, you can:

  • See exactly what data is being sent when you add items to your cart
  • Identify what APIs are being called during checkout
  • Spot any hidden fields or tokens used for fraud prevention
  • Detect what kind of payment gateway theyre using

This intel is fucking gold for crafting your carding strategy. You can see precisely what info the site collects, how its formatted and where potential weak points might be.

For example, you might notice the site sends a "riskScore" parameter during checkout. Bingo - youve just identified part of their fraud prevention system. Or maybe you spot calls to a Stripe API. Now you know to use cards that havent been burned on Stripe-powered sites.

The real power comes when you start modifying requests. Changing parameters, altering headers, even injecting your own code - its all possible. This lets you test the sites defenses without actually placing orders. You can probe for weaknesses, see how the site reacts to unusual data and fine-tune your approach before risking a single card.

Setting Up Your Digital Scalpel: Burp Suite

Before we dive into the juicy stuff, you need to get your tools ready. Burp Suite is like the swiss army knife of web app hacking, and for us carders, its fucking essential. Heres how to set this beauty up:

  • Download and Install: Head to PortSwiggers website and grab the Community Edition. Its free and packs enough punch for what we need. Once downloaded, install that shit.
  • Configure Your Browser: Were using Firefox for this guide cause its less of a pain in the ass with certificates. Open Firefox, go to Settings > Network Settings and set your proxy to manual. Use these settings:
    HTTP Proxy: 127.0.0.1 Port: 8080View attachment 6050
    View attachment 6051
    View attachment 6052
  • Install BurpsCertificate: This is crucial. Without it, youll get more security warnings than a government whistleblower.
    • Open Burp and go to http://burp
    • Click "CA Certificate" in the top right
    View attachment 6053- In Firefox, go to Settings > Privacy & Security > Certificates > View Certificates
    View attachment 6054- Import the downloaded certificate and trust it for websites
    View attachment 6055
  • Adding a SOCKS Proxy(Optional): If youre using a residential proxy heres how to chain it:
    • In Burp, go to User options > SOCKS Proxy
    • Enable SOCKS proxy
    • Enter your proxy details

Now Burp will MITM your traffic and route it all through your SOCKS proxy. Slick, right?

Pro Tip: For initial recon, I usually just use a VPN set to the same country as the card Im planning to use. Its cleaner and less likely to raise flags. When its time to actually hit the site, thats when I switch to a full antidetect setup.

Mobile Recon: Yeah, you can do this shit on mobile too. Its a bit more involved and were not covering it today. Just know its possible and can be useful for sites with mobile-specific checks.


Now that youre locked and loaded, lets dive into the real shit. Time to start poking around those juicy targets.


Detecting AI Antifraud Analytics

Now that youve got Burp Suite locked and loaded, its time to put that shit to use. Before we dive in, make sure your Intercept is turned off in the Proxy tab. If its on, Burp will stop every request waiting for your input, and were not here to play 20 Questions with HTTP packets.

With Intercept off, Burp will silently record all traffic in the HTTP History tab. This is where the magic happens. As you browse your target site, youll see a flood of requests pile up here. Dont worry, well teach you how to make sense of this digital vomit.

Now, lets talk about the sneaky fuckers youre really after: AI-powered antifraud systems. These digital bloodhounds are all over modern e-commerce sites, sniffing out any hint of suspicious activity.

Modern e-commerce sites are filled with AI-powered antifraud systems. These fuckers work by injecting JavaScript into the page and monitoring everything from your mouse movements to your typing patterns.

As you go through Burps HTTP History, keep an eye out for these JavaScript files loading on the page. Theyre the calling cards of different antifraud systems:


Finding those JS files is like finding a needle in a haystack especially on sites with a million scripts. A better idea is to keep an eye out for POST requests. Thats where the magic happens.

Remember this list isnt exhaustive. Antifraud tech moves faster than fashion trends. Always be on the lookout for suspicious JS files and network requests especially those loading from 3rd party domains. If you see something that looks like antifraud but isnt on this list, dig deeper.

These scripts collect a fuckton of data about your session. Theyre tracking:

  • Device fingerprints
  • Mouse movements and clicks
  • Typing speed and patterns
  • Time spent on page
  • Browser plugins and settings

Browse through your target site, keep an eye on Burps HTTP History tab. Youll see POST requests to endpoints like "/api/risk/assess" or "/fraud/check" with all this data. Thats the antifraud system at work.

Here are a bunch of URLs for POST requests that monitor your sessions risk:


For example, if youre dealing with Sift Science, Burp will capture a request that looks something like this:

JSON:
{
  "event": {
    "$type": "$create_order",
    "$user_id": "user123",
    "$session_id": "abc123xyz",
    "$order_id": "ORDER-123456",
    "$amount": 10000,
    "$currency_code": "USD",
    "$billing_address": {
      "$name": "John Doe",
      "$address_1": "123 Main St",
      "$city": "San Francisco",
      "$region": "CA",
      "$country": "US",
      "$zipcode": "94111"
    },
    "$payment_methods": [
      {
        "$payment_type": "$credit_card",
        "$payment_gateway": "$stripe",
        "$card_bin": "424242",
        "$card_last4": "4242"
      }
    ],
    "$shipping_address": {
      "$name": "Jane Doe",
      "$address_1": "456 Oak St",
      "$city": "San Francisco",
      "$region": "CA",
      "$country": "US",
      "$zipcode": "94110"
    }
  }
}

This data is used to build a risk profile for your session. High risk scores trigger additional verification or straight-up rejections.

For some systems like Forter, the requests not show up until you initiate the payment. For cases like this you can look at requests to the main site and look for cookies like ForterToken, etc.
View attachment 6057


Booking.com Showing Riskified Token:
EwgWhLk.png


Identifying Payment Gateways

Finding the payment gateway is key to finding the right cards and methods. Heres how to expose these bastards:

Always start with a test card. Some popular test cards are:
  • Stripe: 4242 4242 4242 4242
  • Braintree: 4111 1111 1111 1111
  • Adyen: 5555 4444 3333 1111
When you submit the test card, keep an eye on the network traffic. Youll see requests to the payment gateways domain. Look for:


Heres what a Braintree request might look like:

Code:
POST [url=https://api.braintreegateway.com/merchants/merchantid/client_api/v1/payment_methods/credit_cards]https://api.braintreegateway.com/merchants/merchantid/client_api/v1/payment_methods/credit_cards[/url]
{
"credit_card": {
"number": "4111111111111111",
"expiration_month": "12",
"expiration_year": "2025",
"cvv": "123"
},
"share": true
}

And heres what a Stripe request looks like:

Code:
POST [url=https://api.stripe.com/v1/payment_intents]https://api.stripe.com/v1/payment_intents[/url]
{
"amount": 2000,
"currency": "usd",
"payment_method_types[]": "card",
"payment_method": "pm_card_visa"
}

Some sites process payments on their own domain first. If you dont see direct calls to a known payment gateway, look for requests to the sites own API endpoints like "/api/process-payment" or "/checkout/finalize".

In these cases youll need to dig deeper. Look for telltale signs in the request parameters:

  • "stripe_token" or "stripe_source" suggests Stripe
  • "braintree_nonce" points to Braintree
  • "adyen_encrypted_data" indicates Adyen
  • "cybersource_token" implies CyberSource
  • "authorize_transaction_key" hints at Authorize.Net
  • "worldpay_order_code" suggests WorldPay

Remember, some sites use multiple payment gateways or route through intermediary services. Keep an eye out for services like:
* Hidden text: cannot be quoted. *


Finding the payment gateway is just step one. Each gateway has its own quirks and potential vulnerabilities. Now you know which ones youre up against, you can fine-tune your approach and increase your chances of success.

Closing Thoughts

From setting up Burp Suite to spotting antifraud systems and unmasking payment gateways, you now have the tools to crack your targets like a pro.

Remember the more you know about a sites defenses the better you can tailor your attack. Dont just throw cards at a wall and hope something sticks. Use these techniques to craft a strategy that maximizes your chances of success.
But were not done yet. In our next guide well be diving into mobile recon. Well show you how to apply these same principles to mobile apps, a whole new playground for carding.

And well get our hands dirty with Burps Tamper tool. Youll learn how to modify requests on the fly, lower your fraud score by editing the values sent to the antifraud systems and slip past those AI dogs.

Until next time, keep your OPSEC tight and your skills sharp. Stay frosty.

Class dismissed. d0ctrine out.
thkyu
 

crazybill

Newbie
Joined
20.01.25
Messages
3
Reaction score
0
Points
1
asc-logo.png
🕵️The Art of Digital Reconnaissance: A Carder's Guide (Part 2)🕵️

Welcome back ambitious bastards. If Pt 1 was the starter, then get ready for the main event of carding recon. Were about to get into the technical stuff that separates the noobs from the pros.

This part is all about Man in the Middle (MITM) tools like Caido and Burp Suite. These arent just fancy names - theyre the real deal for dissecting your targets defenses.


View attachment 6048

Well break down how these tools work, teach you to spot AI antifraud systems and payment gateways, and show you the ins and outs of HTTP packet tampering. By the end youll see websites in a whole new light.

Warning: this isnt for noobs. If youre still trying to figure out how to use a VPN you might want to build up your skills first. But if youre ready to level up, this guide is your ticket to really understanding the websites youre trying to hit.

So sit back and focus. Were about to get technical and class is in session. Advanced carding recon ahead.



What are MITM Tools?

Burp Suite and Caido arent just fancy toys - theyre the scalpels youll use to dissect your targets.

At their core, these tools work by inserting themselves between your browser and the target website. Every request you send and every response you receive passes through them first. Its like having a nosy bastard reading all your mail, except in this case, youre the nosy bastard.

Heres the basic flow:


  • You type a URL into your browser
  • Your browser sends the request to Burp/Caido
  • Burp/Caido forwards the request to the website
  • The website sends its response back to Burp/Caido
  • Burp/Caido passes the response to your browser

But heres where it gets interesting for us carders. These tools dont just passively observe - they let you intercept, modify and even replay requests. Think of it as having a pause button for the internet.

Say youre scoping out a big e-commerce site. With Burp or Caido, you can:

  • See exactly what data is being sent when you add items to your cart
  • Identify what APIs are being called during checkout
  • Spot any hidden fields or tokens used for fraud prevention
  • Detect what kind of payment gateway theyre using

This intel is fucking gold for crafting your carding strategy. You can see precisely what info the site collects, how its formatted and where potential weak points might be.

For example, you might notice the site sends a "riskScore" parameter during checkout. Bingo - youve just identified part of their fraud prevention system. Or maybe you spot calls to a Stripe API. Now you know to use cards that havent been burned on Stripe-powered sites.

The real power comes when you start modifying requests. Changing parameters, altering headers, even injecting your own code - its all possible. This lets you test the sites defenses without actually placing orders. You can probe for weaknesses, see how the site reacts to unusual data and fine-tune your approach before risking a single card.

Setting Up Your Digital Scalpel: Burp Suite

Before we dive into the juicy stuff, you need to get your tools ready. Burp Suite is like the swiss army knife of web app hacking, and for us carders, its fucking essential. Heres how to set this beauty up:

  • Download and Install: Head to PortSwiggers website and grab the Community Edition. Its free and packs enough punch for what we need. Once downloaded, install that shit.
  • Configure Your Browser: Were using Firefox for this guide cause its less of a pain in the ass with certificates. Open Firefox, go to Settings > Network Settings and set your proxy to manual. Use these settings:
    HTTP Proxy: 127.0.0.1 Port: 8080View attachment 6050
    View attachment 6051
    View attachment 6052
  • Install BurpsCertificate: This is crucial. Without it, youll get more security warnings than a government whistleblower.
    • Open Burp and go to http://burp
    • Click "CA Certificate" in the top right
    View attachment 6053- In Firefox, go to Settings > Privacy & Security > Certificates > View Certificates
    View attachment 6054- Import the downloaded certificate and trust it for websites
    View attachment 6055
  • Adding a SOCKS Proxy(Optional): If youre using a residential proxy heres how to chain it:
    • In Burp, go to User options > SOCKS Proxy
    • Enable SOCKS proxy
    • Enter your proxy details

Now Burp will MITM your traffic and route it all through your SOCKS proxy. Slick, right?

Pro Tip: For initial recon, I usually just use a VPN set to the same country as the card Im planning to use. Its cleaner and less likely to raise flags. When its time to actually hit the site, thats when I switch to a full antidetect setup.

Mobile Recon: Yeah, you can do this shit on mobile too. Its a bit more involved and were not covering it today. Just know its possible and can be useful for sites with mobile-specific checks.


Now that youre locked and loaded, lets dive into the real shit. Time to start poking around those juicy targets.


Detecting AI Antifraud Analytics

Now that youve got Burp Suite locked and loaded, its time to put that shit to use. Before we dive in, make sure your Intercept is turned off in the Proxy tab. If its on, Burp will stop every request waiting for your input, and were not here to play 20 Questions with HTTP packets.

With Intercept off, Burp will silently record all traffic in the HTTP History tab. This is where the magic happens. As you browse your target site, youll see a flood of requests pile up here. Dont worry, well teach you how to make sense of this digital vomit.

Now, lets talk about the sneaky fuckers youre really after: AI-powered antifraud systems. These digital bloodhounds are all over modern e-commerce sites, sniffing out any hint of suspicious activity.

Modern e-commerce sites are filled with AI-powered antifraud systems. These fuckers work by injecting JavaScript into the page and monitoring everything from your mouse movements to your typing patterns.

As you go through Burps HTTP History, keep an eye out for these JavaScript files loading on the page. Theyre the calling cards of different antifraud systems:


Finding those JS files is like finding a needle in a haystack especially on sites with a million scripts. A better idea is to keep an eye out for POST requests. Thats where the magic happens.

Remember this list isnt exhaustive. Antifraud tech moves faster than fashion trends. Always be on the lookout for suspicious JS files and network requests especially those loading from 3rd party domains. If you see something that looks like antifraud but isnt on this list, dig deeper.

These scripts collect a fuckton of data about your session. Theyre tracking:

  • Device fingerprints
  • Mouse movements and clicks
  • Typing speed and patterns
  • Time spent on page
  • Browser plugins and settings

Browse through your target site, keep an eye on Burps HTTP History tab. Youll see POST requests to endpoints like "/api/risk/assess" or "/fraud/check" with all this data. Thats the antifraud system at work.

Here are a bunch of URLs for POST requests that monitor your sessions risk:


For example, if youre dealing with Sift Science, Burp will capture a request that looks something like this:

JSON:
{
  "event": {
    "$type": "$create_order",
    "$user_id": "user123",
    "$session_id": "abc123xyz",
    "$order_id": "ORDER-123456",
    "$amount": 10000,
    "$currency_code": "USD",
    "$billing_address": {
      "$name": "John Doe",
      "$address_1": "123 Main St",
      "$city": "San Francisco",
      "$region": "CA",
      "$country": "US",
      "$zipcode": "94111"
    },
    "$payment_methods": [
      {
        "$payment_type": "$credit_card",
        "$payment_gateway": "$stripe",
        "$card_bin": "424242",
        "$card_last4": "4242"
      }
    ],
    "$shipping_address": {
      "$name": "Jane Doe",
      "$address_1": "456 Oak St",
      "$city": "San Francisco",
      "$region": "CA",
      "$country": "US",
      "$zipcode": "94110"
    }
  }
}

This data is used to build a risk profile for your session. High risk scores trigger additional verification or straight-up rejections.

For some systems like Forter, the requests not show up until you initiate the payment. For cases like this you can look at requests to the main site and look for cookies like ForterToken, etc.
View attachment 6057


Booking.com Showing Riskified Token:
EwgWhLk.png


Identifying Payment Gateways

Finding the payment gateway is key to finding the right cards and methods. Heres how to expose these bastards:

Always start with a test card. Some popular test cards are:
  • Stripe: 4242 4242 4242 4242
  • Braintree: 4111 1111 1111 1111
  • Adyen: 5555 4444 3333 1111
When you submit the test card, keep an eye on the network traffic. Youll see requests to the payment gateways domain. Look for:


Heres what a Braintree request might look like:

Code:
POST [url=https://api.braintreegateway.com/merchants/merchantid/client_api/v1/payment_methods/credit_cards]https://api.braintreegateway.com/merchants/merchantid/client_api/v1/payment_methods/credit_cards[/url]
{
"credit_card": {
"number": "4111111111111111",
"expiration_month": "12",
"expiration_year": "2025",
"cvv": "123"
},
"share": true
}

And heres what a Stripe request looks like:

Code:
POST [url=https://api.stripe.com/v1/payment_intents]https://api.stripe.com/v1/payment_intents[/url]
{
"amount": 2000,
"currency": "usd",
"payment_method_types[]": "card",
"payment_method": "pm_card_visa"
}

Some sites process payments on their own domain first. If you dont see direct calls to a known payment gateway, look for requests to the sites own API endpoints like "/api/process-payment" or "/checkout/finalize".

In these cases youll need to dig deeper. Look for telltale signs in the request parameters:

  • "stripe_token" or "stripe_source" suggests Stripe
  • "braintree_nonce" points to Braintree
  • "adyen_encrypted_data" indicates Adyen
  • "cybersource_token" implies CyberSource
  • "authorize_transaction_key" hints at Authorize.Net
  • "worldpay_order_code" suggests WorldPay

Remember, some sites use multiple payment gateways or route through intermediary services. Keep an eye out for services like:
* Hidden text: cannot be quoted. *


Finding the payment gateway is just step one. Each gateway has its own quirks and potential vulnerabilities. Now you know which ones youre up against, you can fine-tune your approach and increase your chances of success.

Closing Thoughts

From setting up Burp Suite to spotting antifraud systems and unmasking payment gateways, you now have the tools to crack your targets like a pro.

Remember the more you know about a sites defenses the better you can tailor your attack. Dont just throw cards at a wall and hope something sticks. Use these techniques to craft a strategy that maximizes your chances of success.
But were not done yet. In our next guide well be diving into mobile recon. Well show you how to apply these same principles to mobile apps, a whole new playground for carding.

And well get our hands dirty with Burps Tamper tool. Youll learn how to modify requests on the fly, lower your fraud score by editing the values sent to the antifraud systems and slip past those AI dogs.

Until next time, keep your OPSEC tight and your skills sharp. Stay frosty.

Class dismissed. d0ctrine out.
👍
 

speedysonic

Essential
Joined
30.01.25
Messages
6
Reaction score
1
Points
3
asc-logo.png
🕵️The Art of Digital Reconnaissance: A Carder's Guide (Part 2)🕵️

Welcome back ambitious bastards. If Pt 1 was the starter, then get ready for the main event of carding recon. Were about to get into the technical stuff that separates the noobs from the pros.

This part is all about Man in the Middle (MITM) tools like Caido and Burp Suite. These arent just fancy names - theyre the real deal for dissecting your targets defenses.


View attachment 6048

Well break down how these tools work, teach you to spot AI antifraud systems and payment gateways, and show you the ins and outs of HTTP packet tampering. By the end youll see websites in a whole new light.

Warning: this isnt for noobs. If youre still trying to figure out how to use a VPN you might want to build up your skills first. But if youre ready to level up, this guide is your ticket to really understanding the websites youre trying to hit.

So sit back and focus. Were about to get technical and class is in session. Advanced carding recon ahead.



What are MITM Tools?

Burp Suite and Caido arent just fancy toys - theyre the scalpels youll use to dissect your targets.

At their core, these tools work by inserting themselves between your browser and the target website. Every request you send and every response you receive passes through them first. Its like having a nosy bastard reading all your mail, except in this case, youre the nosy bastard.

Heres the basic flow:


  • You type a URL into your browser
  • Your browser sends the request to Burp/Caido
  • Burp/Caido forwards the request to the website
  • The website sends its response back to Burp/Caido
  • Burp/Caido passes the response to your browser

But heres where it gets interesting for us carders. These tools dont just passively observe - they let you intercept, modify and even replay requests. Think of it as having a pause button for the internet.

Say youre scoping out a big e-commerce site. With Burp or Caido, you can:

  • See exactly what data is being sent when you add items to your cart
  • Identify what APIs are being called during checkout
  • Spot any hidden fields or tokens used for fraud prevention
  • Detect what kind of payment gateway theyre using

This intel is fucking gold for crafting your carding strategy. You can see precisely what info the site collects, how its formatted and where potential weak points might be.

For example, you might notice the site sends a "riskScore" parameter during checkout. Bingo - youve just identified part of their fraud prevention system. Or maybe you spot calls to a Stripe API. Now you know to use cards that havent been burned on Stripe-powered sites.

The real power comes when you start modifying requests. Changing parameters, altering headers, even injecting your own code - its all possible. This lets you test the sites defenses without actually placing orders. You can probe for weaknesses, see how the site reacts to unusual data and fine-tune your approach before risking a single card.

Setting Up Your Digital Scalpel: Burp Suite

Before we dive into the juicy stuff, you need to get your tools ready. Burp Suite is like the swiss army knife of web app hacking, and for us carders, its fucking essential. Heres how to set this beauty up:

  • Download and Install: Head to PortSwiggers website and grab the Community Edition. Its free and packs enough punch for what we need. Once downloaded, install that shit.
  • Configure Your Browser: Were using Firefox for this guide cause its less of a pain in the ass with certificates. Open Firefox, go to Settings > Network Settings and set your proxy to manual. Use these settings:
    HTTP Proxy: 127.0.0.1 Port: 8080View attachment 6050
    View attachment 6051
    View attachment 6052
  • Install BurpsCertificate: This is crucial. Without it, youll get more security warnings than a government whistleblower.
    • Open Burp and go to http://burp
    • Click "CA Certificate" in the top right
    View attachment 6053- In Firefox, go to Settings > Privacy & Security > Certificates > View Certificates
    View attachment 6054- Import the downloaded certificate and trust it for websites
    View attachment 6055
  • Adding a SOCKS Proxy(Optional): If youre using a residential proxy heres how to chain it:
    • In Burp, go to User options > SOCKS Proxy
    • Enable SOCKS proxy
    • Enter your proxy details

Now Burp will MITM your traffic and route it all through your SOCKS proxy. Slick, right?

Pro Tip: For initial recon, I usually just use a VPN set to the same country as the card Im planning to use. Its cleaner and less likely to raise flags. When its time to actually hit the site, thats when I switch to a full antidetect setup.

Mobile Recon: Yeah, you can do this shit on mobile too. Its a bit more involved and were not covering it today. Just know its possible and can be useful for sites with mobile-specific checks.


Now that youre locked and loaded, lets dive into the real shit. Time to start poking around those juicy targets.


Detecting AI Antifraud Analytics

Now that youve got Burp Suite locked and loaded, its time to put that shit to use. Before we dive in, make sure your Intercept is turned off in the Proxy tab. If its on, Burp will stop every request waiting for your input, and were not here to play 20 Questions with HTTP packets.

With Intercept off, Burp will silently record all traffic in the HTTP History tab. This is where the magic happens. As you browse your target site, youll see a flood of requests pile up here. Dont worry, well teach you how to make sense of this digital vomit.

Now, lets talk about the sneaky fuckers youre really after: AI-powered antifraud systems. These digital bloodhounds are all over modern e-commerce sites, sniffing out any hint of suspicious activity.

Modern e-commerce sites are filled with AI-powered antifraud systems. These fuckers work by injecting JavaScript into the page and monitoring everything from your mouse movements to your typing patterns.

As you go through Burps HTTP History, keep an eye out for these JavaScript files loading on the page. Theyre the calling cards of different antifraud systems:


Finding those JS files is like finding a needle in a haystack especially on sites with a million scripts. A better idea is to keep an eye out for POST requests. Thats where the magic happens.

Remember this list isnt exhaustive. Antifraud tech moves faster than fashion trends. Always be on the lookout for suspicious JS files and network requests especially those loading from 3rd party domains. If you see something that looks like antifraud but isnt on this list, dig deeper.

These scripts collect a fuckton of data about your session. Theyre tracking:

  • Device fingerprints
  • Mouse movements and clicks
  • Typing speed and patterns
  • Time spent on page
  • Browser plugins and settings

Browse through your target site, keep an eye on Burps HTTP History tab. Youll see POST requests to endpoints like "/api/risk/assess" or "/fraud/check" with all this data. Thats the antifraud system at work.

Here are a bunch of URLs for POST requests that monitor your sessions risk:


For example, if youre dealing with Sift Science, Burp will capture a request that looks something like this:

JSON:
{
  "event": {
    "$type": "$create_order",
    "$user_id": "user123",
    "$session_id": "abc123xyz",
    "$order_id": "ORDER-123456",
    "$amount": 10000,
    "$currency_code": "USD",
    "$billing_address": {
      "$name": "John Doe",
      "$address_1": "123 Main St",
      "$city": "San Francisco",
      "$region": "CA",
      "$country": "US",
      "$zipcode": "94111"
    },
    "$payment_methods": [
      {
        "$payment_type": "$credit_card",
        "$payment_gateway": "$stripe",
        "$card_bin": "424242",
        "$card_last4": "4242"
      }
    ],
    "$shipping_address": {
      "$name": "Jane Doe",
      "$address_1": "456 Oak St",
      "$city": "San Francisco",
      "$region": "CA",
      "$country": "US",
      "$zipcode": "94110"
    }
  }
}

This data is used to build a risk profile for your session. High risk scores trigger additional verification or straight-up rejections.

For some systems like Forter, the requests not show up until you initiate the payment. For cases like this you can look at requests to the main site and look for cookies like ForterToken, etc.
View attachment 6057


Booking.com Showing Riskified Token:
EwgWhLk.png


Identifying Payment Gateways

Finding the payment gateway is key to finding the right cards and methods. Heres how to expose these bastards:

Always start with a test card. Some popular test cards are:
  • Stripe: 4242 4242 4242 4242
  • Braintree: 4111 1111 1111 1111
  • Adyen: 5555 4444 3333 1111
When you submit the test card, keep an eye on the network traffic. Youll see requests to the payment gateways domain. Look for:


Heres what a Braintree request might look like:

Code:
POST [url=https://api.braintreegateway.com/merchants/merchantid/client_api/v1/payment_methods/credit_cards]https://api.braintreegateway.com/merchants/merchantid/client_api/v1/payment_methods/credit_cards[/url]
{
"credit_card": {
"number": "4111111111111111",
"expiration_month": "12",
"expiration_year": "2025",
"cvv": "123"
},
"share": true
}

And heres what a Stripe request looks like:

Code:
POST [url=https://api.stripe.com/v1/payment_intents]https://api.stripe.com/v1/payment_intents[/url]
{
"amount": 2000,
"currency": "usd",
"payment_method_types[]": "card",
"payment_method": "pm_card_visa"
}

Some sites process payments on their own domain first. If you dont see direct calls to a known payment gateway, look for requests to the sites own API endpoints like "/api/process-payment" or "/checkout/finalize".

In these cases youll need to dig deeper. Look for telltale signs in the request parameters:

  • "stripe_token" or "stripe_source" suggests Stripe
  • "braintree_nonce" points to Braintree
  • "adyen_encrypted_data" indicates Adyen
  • "cybersource_token" implies CyberSource
  • "authorize_transaction_key" hints at Authorize.Net
  • "worldpay_order_code" suggests WorldPay

Remember, some sites use multiple payment gateways or route through intermediary services. Keep an eye out for services like:
* Hidden text: cannot be quoted. *


Finding the payment gateway is just step one. Each gateway has its own quirks and potential vulnerabilities. Now you know which ones youre up against, you can fine-tune your approach and increase your chances of success.

Closing Thoughts

From setting up Burp Suite to spotting antifraud systems and unmasking payment gateways, you now have the tools to crack your targets like a pro.

Remember the more you know about a sites defenses the better you can tailor your attack. Dont just throw cards at a wall and hope something sticks. Use these techniques to craft a strategy that maximizes your chances of success.
But were not done yet. In our next guide well be diving into mobile recon. Well show you how to apply these same principles to mobile apps, a whole new playground for carding.

And well get our hands dirty with Burps Tamper tool. Youll learn how to modify requests on the fly, lower your fraud score by editing the values sent to the antifraud systems and slip past those AI dogs.

Until next time, keep your OPSEC tight and your skills sharp. Stay frosty.

Class dismissed. d0ctrine out.
apprecaited
 

r4ck

Newbie
Joined
15.12.24
Messages
2
Reaction score
0
Points
1
asc-logo.png
🕵️The Art of Digital Reconnaissance: A Carder's Guide (Part 2)🕵️

Welcome back ambitious bastards. If Pt 1 was the starter, then get ready for the main event of carding recon. Were about to get into the technical stuff that separates the noobs from the pros.

This part is all about Man in the Middle (MITM) tools like Caido and Burp Suite. These arent just fancy names - theyre the real deal for dissecting your targets defenses.


View attachment 6048

Well break down how these tools work, teach you to spot AI antifraud systems and payment gateways, and show you the ins and outs of HTTP packet tampering. By the end youll see websites in a whole new light.

Warning: this isnt for noobs. If youre still trying to figure out how to use a VPN you might want to build up your skills first. But if youre ready to level up, this guide is your ticket to really understanding the websites youre trying to hit.

So sit back and focus. Were about to get technical and class is in session. Advanced carding recon ahead.



What are MITM Tools?

Burp Suite and Caido arent just fancy toys - theyre the scalpels youll use to dissect your targets.

At their core, these tools work by inserting themselves between your browser and the target website. Every request you send and every response you receive passes through them first. Its like having a nosy bastard reading all your mail, except in this case, youre the nosy bastard.

Heres the basic flow:


  • You type a URL into your browser
  • Your browser sends the request to Burp/Caido
  • Burp/Caido forwards the request to the website
  • The website sends its response back to Burp/Caido
  • Burp/Caido passes the response to your browser

But heres where it gets interesting for us carders. These tools dont just passively observe - they let you intercept, modify and even replay requests. Think of it as having a pause button for the internet.

Say youre scoping out a big e-commerce site. With Burp or Caido, you can:

  • See exactly what data is being sent when you add items to your cart
  • Identify what APIs are being called during checkout
  • Spot any hidden fields or tokens used for fraud prevention
  • Detect what kind of payment gateway theyre using

This intel is fucking gold for crafting your carding strategy. You can see precisely what info the site collects, how its formatted and where potential weak points might be.

For example, you might notice the site sends a "riskScore" parameter during checkout. Bingo - youve just identified part of their fraud prevention system. Or maybe you spot calls to a Stripe API. Now you know to use cards that havent been burned on Stripe-powered sites.

The real power comes when you start modifying requests. Changing parameters, altering headers, even injecting your own code - its all possible. This lets you test the sites defenses without actually placing orders. You can probe for weaknesses, see how the site reacts to unusual data and fine-tune your approach before risking a single card.

Setting Up Your Digital Scalpel: Burp Suite

Before we dive into the juicy stuff, you need to get your tools ready. Burp Suite is like the swiss army knife of web app hacking, and for us carders, its fucking essential. Heres how to set this beauty up:

  • Download and Install: Head to PortSwiggers website and grab the Community Edition. Its free and packs enough punch for what we need. Once downloaded, install that shit.
  • Configure Your Browser: Were using Firefox for this guide cause its less of a pain in the ass with certificates. Open Firefox, go to Settings > Network Settings and set your proxy to manual. Use these settings:
    HTTP Proxy: 127.0.0.1 Port: 8080View attachment 6050
    View attachment 6051
    View attachment 6052
  • Install BurpsCertificate: This is crucial. Without it, youll get more security warnings than a government whistleblower.
    • Open Burp and go to http://burp
    • Click "CA Certificate" in the top right
    View attachment 6053- In Firefox, go to Settings > Privacy & Security > Certificates > View Certificates
    View attachment 6054- Import the downloaded certificate and trust it for websites
    View attachment 6055
  • Adding a SOCKS Proxy(Optional): If youre using a residential proxy heres how to chain it:
    • In Burp, go to User options > SOCKS Proxy
    • Enable SOCKS proxy
    • Enter your proxy details

Now Burp will MITM your traffic and route it all through your SOCKS proxy. Slick, right?

Pro Tip: For initial recon, I usually just use a VPN set to the same country as the card Im planning to use. Its cleaner and less likely to raise flags. When its time to actually hit the site, thats when I switch to a full antidetect setup.

Mobile Recon: Yeah, you can do this shit on mobile too. Its a bit more involved and were not covering it today. Just know its possible and can be useful for sites with mobile-specific checks.


Now that youre locked and loaded, lets dive into the real shit. Time to start poking around those juicy targets.


Detecting AI Antifraud Analytics

Now that youve got Burp Suite locked and loaded, its time to put that shit to use. Before we dive in, make sure your Intercept is turned off in the Proxy tab. If its on, Burp will stop every request waiting for your input, and were not here to play 20 Questions with HTTP packets.

With Intercept off, Burp will silently record all traffic in the HTTP History tab. This is where the magic happens. As you browse your target site, youll see a flood of requests pile up here. Dont worry, well teach you how to make sense of this digital vomit.

Now, lets talk about the sneaky fuckers youre really after: AI-powered antifraud systems. These digital bloodhounds are all over modern e-commerce sites, sniffing out any hint of suspicious activity.

Modern e-commerce sites are filled with AI-powered antifraud systems. These fuckers work by injecting JavaScript into the page and monitoring everything from your mouse movements to your typing patterns.

As you go through Burps HTTP History, keep an eye out for these JavaScript files loading on the page. Theyre the calling cards of different antifraud systems:


Finding those JS files is like finding a needle in a haystack especially on sites with a million scripts. A better idea is to keep an eye out for POST requests. Thats where the magic happens.

Remember this list isnt exhaustive. Antifraud tech moves faster than fashion trends. Always be on the lookout for suspicious JS files and network requests especially those loading from 3rd party domains. If you see something that looks like antifraud but isnt on this list, dig deeper.

These scripts collect a fuckton of data about your session. Theyre tracking:

  • Device fingerprints
  • Mouse movements and clicks
  • Typing speed and patterns
  • Time spent on page
  • Browser plugins and settings

Browse through your target site, keep an eye on Burps HTTP History tab. Youll see POST requests to endpoints like "/api/risk/assess" or "/fraud/check" with all this data. Thats the antifraud system at work.

Here are a bunch of URLs for POST requests that monitor your sessions risk:


For example, if youre dealing with Sift Science, Burp will capture a request that looks something like this:

JSON:
{
  "event": {
    "$type": "$create_order",
    "$user_id": "user123",
    "$session_id": "abc123xyz",
    "$order_id": "ORDER-123456",
    "$amount": 10000,
    "$currency_code": "USD",
    "$billing_address": {
      "$name": "John Doe",
      "$address_1": "123 Main St",
      "$city": "San Francisco",
      "$region": "CA",
      "$country": "US",
      "$zipcode": "94111"
    },
    "$payment_methods": [
      {
        "$payment_type": "$credit_card",
        "$payment_gateway": "$stripe",
        "$card_bin": "424242",
        "$card_last4": "4242"
      }
    ],
    "$shipping_address": {
      "$name": "Jane Doe",
      "$address_1": "456 Oak St",
      "$city": "San Francisco",
      "$region": "CA",
      "$country": "US",
      "$zipcode": "94110"
    }
  }
}

This data is used to build a risk profile for your session. High risk scores trigger additional verification or straight-up rejections.

For some systems like Forter, the requests not show up until you initiate the payment. For cases like this you can look at requests to the main site and look for cookies like ForterToken, etc.
View attachment 6057


Booking.com Showing Riskified Token:
EwgWhLk.png


Identifying Payment Gateways

Finding the payment gateway is key to finding the right cards and methods. Heres how to expose these bastards:

Always start with a test card. Some popular test cards are:
  • Stripe: 4242 4242 4242 4242
  • Braintree: 4111 1111 1111 1111
  • Adyen: 5555 4444 3333 1111
When you submit the test card, keep an eye on the network traffic. Youll see requests to the payment gateways domain. Look for:


Heres what a Braintree request might look like:

Code:
POST [url=https://api.braintreegateway.com/merchants/merchantid/client_api/v1/payment_methods/credit_cards]https://api.braintreegateway.com/merchants/merchantid/client_api/v1/payment_methods/credit_cards[/url]
{
"credit_card": {
"number": "4111111111111111",
"expiration_month": "12",
"expiration_year": "2025",
"cvv": "123"
},
"share": true
}

And heres what a Stripe request looks like:

Code:
POST [url=https://api.stripe.com/v1/payment_intents]https://api.stripe.com/v1/payment_intents[/url]
{
"amount": 2000,
"currency": "usd",
"payment_method_types[]": "card",
"payment_method": "pm_card_visa"
}

Some sites process payments on their own domain first. If you dont see direct calls to a known payment gateway, look for requests to the sites own API endpoints like "/api/process-payment" or "/checkout/finalize".

In these cases youll need to dig deeper. Look for telltale signs in the request parameters:

  • "stripe_token" or "stripe_source" suggests Stripe
  • "braintree_nonce" points to Braintree
  • "adyen_encrypted_data" indicates Adyen
  • "cybersource_token" implies CyberSource
  • "authorize_transaction_key" hints at Authorize.Net
  • "worldpay_order_code" suggests WorldPay

Remember, some sites use multiple payment gateways or route through intermediary services. Keep an eye out for services like:
* Hidden text: cannot be quoted. *


Finding the payment gateway is just step one. Each gateway has its own quirks and potential vulnerabilities. Now you know which ones youre up against, you can fine-tune your approach and increase your chances of success.

Closing Thoughts

From setting up Burp Suite to spotting antifraud systems and unmasking payment gateways, you now have the tools to crack your targets like a pro.

Remember the more you know about a sites defenses the better you can tailor your attack. Dont just throw cards at a wall and hope something sticks. Use these techniques to craft a strategy that maximizes your chances of success.
But were not done yet. In our next guide well be diving into mobile recon. Well show you how to apply these same principles to mobile apps, a whole new playground for carding.

And well get our hands dirty with Burps Tamper tool. Youll learn how to modify requests on the fly, lower your fraud score by editing the values sent to the antifraud systems and slip past those AI dogs.

Until next time, keep your OPSEC tight and your skills sharp. Stay frosty.

Class dismissed. d0ctrine out.
 

yakiris1

Newbie
Joined
22.07.24
Messages
7
Reaction score
0
Points
1
asc-logo.png
🕵️The Art of Digital Reconnaissance: A Carder's Guide (Part 2)🕵️

Welcome back ambitious bastards. If Pt 1 was the starter, then get ready for the main event of carding recon. Were about to get into the technical stuff that separates the noobs from the pros.

This part is all about Man in the Middle (MITM) tools like Caido and Burp Suite. These arent just fancy names - theyre the real deal for dissecting your targets defenses.


View attachment 6048

Well break down how these tools work, teach you to spot AI antifraud systems and payment gateways, and show you the ins and outs of HTTP packet tampering. By the end youll see websites in a whole new light.

Warning: this isnt for noobs. If youre still trying to figure out how to use a VPN you might want to build up your skills first. But if youre ready to level up, this guide is your ticket to really understanding the websites youre trying to hit.

So sit back and focus. Were about to get technical and class is in session. Advanced carding recon ahead.



What are MITM Tools?

Burp Suite and Caido arent just fancy toys - theyre the scalpels youll use to dissect your targets.

At their core, these tools work by inserting themselves between your browser and the target website. Every request you send and every response you receive passes through them first. Its like having a nosy bastard reading all your mail, except in this case, youre the nosy bastard.

Heres the basic flow:


  • You type a URL into your browser
  • Your browser sends the request to Burp/Caido
  • Burp/Caido forwards the request to the website
  • The website sends its response back to Burp/Caido
  • Burp/Caido passes the response to your browser

But heres where it gets interesting for us carders. These tools dont just passively observe - they let you intercept, modify and even replay requests. Think of it as having a pause button for the internet.

Say youre scoping out a big e-commerce site. With Burp or Caido, you can:

  • See exactly what data is being sent when you add items to your cart
  • Identify what APIs are being called during checkout
  • Spot any hidden fields or tokens used for fraud prevention
  • Detect what kind of payment gateway theyre using

This intel is fucking gold for crafting your carding strategy. You can see precisely what info the site collects, how its formatted and where potential weak points might be.

For example, you might notice the site sends a "riskScore" parameter during checkout. Bingo - youve just identified part of their fraud prevention system. Or maybe you spot calls to a Stripe API. Now you know to use cards that havent been burned on Stripe-powered sites.

The real power comes when you start modifying requests. Changing parameters, altering headers, even injecting your own code - its all possible. This lets you test the sites defenses without actually placing orders. You can probe for weaknesses, see how the site reacts to unusual data and fine-tune your approach before risking a single card.

Setting Up Your Digital Scalpel: Burp Suite

Before we dive into the juicy stuff, you need to get your tools ready. Burp Suite is like the swiss army knife of web app hacking, and for us carders, its fucking essential. Heres how to set this beauty up:

  • Download and Install: Head to PortSwiggers website and grab the Community Edition. Its free and packs enough punch for what we need. Once downloaded, install that shit.
  • Configure Your Browser: Were using Firefox for this guide cause its less of a pain in the ass with certificates. Open Firefox, go to Settings > Network Settings and set your proxy to manual. Use these settings:
    HTTP Proxy: 127.0.0.1 Port: 8080View attachment 6050
    View attachment 6051
    View attachment 6052
  • Install BurpsCertificate: This is crucial. Without it, youll get more security warnings than a government whistleblower.
    • Open Burp and go to http://burp
    • Click "CA Certificate" in the top right
    View attachment 6053- In Firefox, go to Settings > Privacy & Security > Certificates > View Certificates
    View attachment 6054- Import the downloaded certificate and trust it for websites
    View attachment 6055
  • Adding a SOCKS Proxy(Optional): If youre using a residential proxy heres how to chain it:
    • In Burp, go to User options > SOCKS Proxy
    • Enable SOCKS proxy
    • Enter your proxy details

Now Burp will MITM your traffic and route it all through your SOCKS proxy. Slick, right?

Pro Tip: For initial recon, I usually just use a VPN set to the same country as the card Im planning to use. Its cleaner and less likely to raise flags. When its time to actually hit the site, thats when I switch to a full antidetect setup.

Mobile Recon: Yeah, you can do this shit on mobile too. Its a bit more involved and were not covering it today. Just know its possible and can be useful for sites with mobile-specific checks.


Now that youre locked and loaded, lets dive into the real shit. Time to start poking around those juicy targets.


Detecting AI Antifraud Analytics

Now that youve got Burp Suite locked and loaded, its time to put that shit to use. Before we dive in, make sure your Intercept is turned off in the Proxy tab. If its on, Burp will stop every request waiting for your input, and were not here to play 20 Questions with HTTP packets.

With Intercept off, Burp will silently record all traffic in the HTTP History tab. This is where the magic happens. As you browse your target site, youll see a flood of requests pile up here. Dont worry, well teach you how to make sense of this digital vomit.

Now, lets talk about the sneaky fuckers youre really after: AI-powered antifraud systems. These digital bloodhounds are all over modern e-commerce sites, sniffing out any hint of suspicious activity.

Modern e-commerce sites are filled with AI-powered antifraud systems. These fuckers work by injecting JavaScript into the page and monitoring everything from your mouse movements to your typing patterns.

As you go through Burps HTTP History, keep an eye out for these JavaScript files loading on the page. Theyre the calling cards of different antifraud systems:


Finding those JS files is like finding a needle in a haystack especially on sites with a million scripts. A better idea is to keep an eye out for POST requests. Thats where the magic happens.

Remember this list isnt exhaustive. Antifraud tech moves faster than fashion trends. Always be on the lookout for suspicious JS files and network requests especially those loading from 3rd party domains. If you see something that looks like antifraud but isnt on this list, dig deeper.

These scripts collect a fuckton of data about your session. Theyre tracking:

  • Device fingerprints
  • Mouse movements and clicks
  • Typing speed and patterns
  • Time spent on page
  • Browser plugins and settings

Browse through your target site, keep an eye on Burps HTTP History tab. Youll see POST requests to endpoints like "/api/risk/assess" or "/fraud/check" with all this data. Thats the antifraud system at work.

Here are a bunch of URLs for POST requests that monitor your sessions risk:


For example, if youre dealing with Sift Science, Burp will capture a request that looks something like this:

JSON:
{
  "event": {
    "$type": "$create_order",
    "$user_id": "user123",
    "$session_id": "abc123xyz",
    "$order_id": "ORDER-123456",
    "$amount": 10000,
    "$currency_code": "USD",
    "$billing_address": {
      "$name": "John Doe",
      "$address_1": "123 Main St",
      "$city": "San Francisco",
      "$region": "CA",
      "$country": "US",
      "$zipcode": "94111"
    },
    "$payment_methods": [
      {
        "$payment_type": "$credit_card",
        "$payment_gateway": "$stripe",
        "$card_bin": "424242",
        "$card_last4": "4242"
      }
    ],
    "$shipping_address": {
      "$name": "Jane Doe",
      "$address_1": "456 Oak St",
      "$city": "San Francisco",
      "$region": "CA",
      "$country": "US",
      "$zipcode": "94110"
    }
  }
}

This data is used to build a risk profile for your session. High risk scores trigger additional verification or straight-up rejections.

For some systems like Forter, the requests not show up until you initiate the payment. For cases like this you can look at requests to the main site and look for cookies like ForterToken, etc.
View attachment 6057


Booking.com Showing Riskified Token:
EwgWhLk.png


Identifying Payment Gateways

Encontrar la pasarela de pago es fundamental para encontrar las tarjetas y los métodos correctos. Aquí te contamos cómo desenmascarar a estos bastardos:

Comience siempre con una tarjeta de prueba. Algunas tarjetas de prueba populares son:
  • Raya : 4242 4242 4242 4242
  • Braintree : 4111 1111 1111 1111
  • Anunciante : 5555 4444 3333 1111
Cuando envíe la tarjeta de prueba, esté atento al tráfico de la red. Verá solicitudes al dominio de la pasarela de pago. Busque:


Así es como podría verse una solicitud de Braintree :

[código]
PUBLICACIÓN https://api.braintreegateway.com/co...client/v1/métodos_de_pago/tarjetas_de_crédito
{
"tarjeta_de_crédito": {
"número": "4111111111111111",
"mes_de_vencimiento": "12",
"año_de_vencimiento": "2025",
"cvv": "123"
},
"compartir": verdadero
}
[/código]

Y así es como se ve una solicitud de Stripe :

[código]
PUBLICAR https://api.stripe.com/v1/payment_intents
{
"cantidad": 2000,
"moneda": "usd",
"payment_method_types[]": "tarjeta",
"método de pago": "pm_card_visa"
}
[/código]

Algunos sitios procesan primero los pagos en su propio dominio. Si no ve llamadas directas a una pasarela de pago conocida, busque solicitudes a los puntos finales de API de los sitios , como "/api/process-payment" o "/checkout/finalize".

En estos casos, deberá investigar más a fondo. Busque señales reveladoras en los parámetros de la solicitud:

  • "stripe_token" o "stripe_source" sugieren Stripe
  • "braintree_nonce" apunta a Braintree
  • "adyen_encrypted_data" indica Adyen
  • "cybersource_token" implica CyberSource
  • "authorize_transaction_key" sugiere Authorize.Net
  • "worldpay_order_code" sugiere WorldPay

Recuerde que algunos sitios utilizan múltiples pasarelas de pago o realizan el pago a través de servicios intermediarios. Esté atento a servicios como:
Texto oculto: no se puede citar.


Encontrar la pasarela de pago adecuada es solo el primer paso. Cada pasarela tiene sus propias peculiaridades y vulnerabilidades potenciales. Ahora que sabe a cuáles se enfrenta, puede ajustar su enfoque y aumentar sus posibilidades de éxito.

Reflexiones finales

Desde la configuración de Burp Suite hasta la detección de sistemas antifraude y el desenmascaramiento de pasarelas de pago, ahora tienes las herramientas para atacar a tus objetivos como un profesional.

Recuerde que cuanto más sepa sobre las defensas de un sitio, mejor podrá adaptar su ataque. No se limite a lanzar cartas contra una pared con la esperanza de que algo se pegue. Utilice estas técnicas para diseñar una estrategia que maximice sus posibilidades de éxito.
Pero aún no hemos terminado. En nuestra próxima guía, nos adentraremos en el reconocimiento móvil. Te mostraremos cómo aplicar estos mismos principios a las aplicaciones móviles, un nuevo campo de juego para el reconocimiento de tarjetas.

Y nos pondremos manos a la obra con la herramienta Tamper de Burps . Aprenderá a modificar solicitudes sobre la marcha, a reducir su puntuación de fraude editando los valores enviados a los sistemas antifraude y a eludir a los perros de la inteligencia artificial .

Hasta la próxima, mantén tu seguridad operacional a raya y tus habilidades a punto. Mantente alerta.

Clase terminada. Doctrina fuera.
gramocias
 

wuyu1123

Newbie
Joined
17.02.25
Messages
4
Reaction score
0
Points
1
asc-logo.png
🕵️The Art of Digital Reconnaissance: A Carder's Guide (Part 2)🕵️

Welcome back ambitious bastards. If Pt 1 was the starter, then get ready for the main event of carding recon. Were about to get into the technical stuff that separates the noobs from the pros.

This part is all about Man in the Middle (MITM) tools like Caido and Burp Suite. These arent just fancy names - theyre the real deal for dissecting your targets defenses.


View attachment 6048

Well break down how these tools work, teach you to spot AI antifraud systems and payment gateways, and show you the ins and outs of HTTP packet tampering. By the end youll see websites in a whole new light.

Warning: this isnt for noobs. If youre still trying to figure out how to use a VPN you might want to build up your skills first. But if youre ready to level up, this guide is your ticket to really understanding the websites youre trying to hit.

So sit back and focus. Were about to get technical and class is in session. Advanced carding recon ahead.



What are MITM Tools?

Burp Suite and Caido arent just fancy toys - theyre the scalpels youll use to dissect your targets.

At their core, these tools work by inserting themselves between your browser and the target website. Every request you send and every response you receive passes through them first. Its like having a nosy bastard reading all your mail, except in this case, youre the nosy bastard.

Heres the basic flow:


  • You type a URL into your browser
  • Your browser sends the request to Burp/Caido
  • Burp/Caido forwards the request to the website
  • The website sends its response back to Burp/Caido
  • Burp/Caido passes the response to your browser

But heres where it gets interesting for us carders. These tools dont just passively observe - they let you intercept, modify and even replay requests. Think of it as having a pause button for the internet.

Say youre scoping out a big e-commerce site. With Burp or Caido, you can:

  • See exactly what data is being sent when you add items to your cart
  • Identify what APIs are being called during checkout
  • Spot any hidden fields or tokens used for fraud prevention
  • Detect what kind of payment gateway theyre using

This intel is fucking gold for crafting your carding strategy. You can see precisely what info the site collects, how its formatted and where potential weak points might be.

For example, you might notice the site sends a "riskScore" parameter during checkout. Bingo - youve just identified part of their fraud prevention system. Or maybe you spot calls to a Stripe API. Now you know to use cards that havent been burned on Stripe-powered sites.

The real power comes when you start modifying requests. Changing parameters, altering headers, even injecting your own code - its all possible. This lets you test the sites defenses without actually placing orders. You can probe for weaknesses, see how the site reacts to unusual data and fine-tune your approach before risking a single card.

Setting Up Your Digital Scalpel: Burp Suite

Before we dive into the juicy stuff, you need to get your tools ready. Burp Suite is like the swiss army knife of web app hacking, and for us carders, its fucking essential. Heres how to set this beauty up:

  • Download and Install: Head to PortSwiggers website and grab the Community Edition. Its free and packs enough punch for what we need. Once downloaded, install that shit.
  • Configure Your Browser: Were using Firefox for this guide cause its less of a pain in the ass with certificates. Open Firefox, go to Settings > Network Settings and set your proxy to manual. Use these settings:
    HTTP Proxy: 127.0.0.1 Port: 8080View attachment 6050
    View attachment 6051
    View attachment 6052
  • Install BurpsCertificate: This is crucial. Without it, youll get more security warnings than a government whistleblower.
    • Open Burp and go to http://burp
    • Click "CA Certificate" in the top right
    View attachment 6053- In Firefox, go to Settings > Privacy & Security > Certificates > View Certificates
    View attachment 6054- Import the downloaded certificate and trust it for websites
    View attachment 6055
  • Adding a SOCKS Proxy(Optional): If youre using a residential proxy heres how to chain it:
    • In Burp, go to User options > SOCKS Proxy
    • Enable SOCKS proxy
    • Enter your proxy details

Now Burp will MITM your traffic and route it all through your SOCKS proxy. Slick, right?

Pro Tip: For initial recon, I usually just use a VPN set to the same country as the card Im planning to use. Its cleaner and less likely to raise flags. When its time to actually hit the site, thats when I switch to a full antidetect setup.

Mobile Recon: Yeah, you can do this shit on mobile too. Its a bit more involved and were not covering it today. Just know its possible and can be useful for sites with mobile-specific checks.


Now that youre locked and loaded, lets dive into the real shit. Time to start poking around those juicy targets.


Detecting AI Antifraud Analytics

Now that youve got Burp Suite locked and loaded, its time to put that shit to use. Before we dive in, make sure your Intercept is turned off in the Proxy tab. If its on, Burp will stop every request waiting for your input, and were not here to play 20 Questions with HTTP packets.

With Intercept off, Burp will silently record all traffic in the HTTP History tab. This is where the magic happens. As you browse your target site, youll see a flood of requests pile up here. Dont worry, well teach you how to make sense of this digital vomit.

Now, lets talk about the sneaky fuckers youre really after: AI-powered antifraud systems. These digital bloodhounds are all over modern e-commerce sites, sniffing out any hint of suspicious activity.

Modern e-commerce sites are filled with AI-powered antifraud systems. These fuckers work by injecting JavaScript into the page and monitoring everything from your mouse movements to your typing patterns.

As you go through Burps HTTP History, keep an eye out for these JavaScript files loading on the page. Theyre the calling cards of different antifraud systems:


Finding those JS files is like finding a needle in a haystack especially on sites with a million scripts. A better idea is to keep an eye out for POST requests. Thats where the magic happens.

Remember this list isnt exhaustive. Antifraud tech moves faster than fashion trends. Always be on the lookout for suspicious JS files and network requests especially those loading from 3rd party domains. If you see something that looks like antifraud but isnt on this list, dig deeper.

These scripts collect a fuckton of data about your session. Theyre tracking:

  • Device fingerprints
  • Mouse movements and clicks
  • Typing speed and patterns
  • Time spent on page
  • Browser plugins and settings

Browse through your target site, keep an eye on Burps HTTP History tab. Youll see POST requests to endpoints like "/api/risk/assess" or "/fraud/check" with all this data. Thats the antifraud system at work.

Here are a bunch of URLs for POST requests that monitor your sessions risk:


For example, if youre dealing with Sift Science, Burp will capture a request that looks something like this:

JSON:
{
  "event": {
    "$type": "$create_order",
    "$user_id": "user123",
    "$session_id": "abc123xyz",
    "$order_id": "ORDER-123456",
    "$amount": 10000,
    "$currency_code": "USD",
    "$billing_address": {
      "$name": "John Doe",
      "$address_1": "123 Main St",
      "$city": "San Francisco",
      "$region": "CA",
      "$country": "US",
      "$zipcode": "94111"
    },
    "$payment_methods": [
      {
        "$payment_type": "$credit_card",
        "$payment_gateway": "$stripe",
        "$card_bin": "424242",
        "$card_last4": "4242"
      }
    ],
    "$shipping_address": {
      "$name": "Jane Doe",
      "$address_1": "456 Oak St",
      "$city": "San Francisco",
      "$region": "CA",
      "$country": "US",
      "$zipcode": "94110"
    }
  }
}

This data is used to build a risk profile for your session. High risk scores trigger additional verification or straight-up rejections.

For some systems like Forter, the requests not show up until you initiate the payment. For cases like this you can look at requests to the main site and look for cookies like ForterToken, etc.
View attachment 6057


Booking.com Showing Riskified Token:
EwgWhLk.png


Identifying Payment Gateways

找到支付网关是找到正确卡和方法的关键。以下是揭露这些混蛋的方法:

始终从测试卡开始。一些常用的测试卡包括:
  • 条纹:4242 4242 4242 4242
  • 布伦特里:4111 1111 1111 1111
  • 电话:5555 4444 3333 1111
提交测试卡时,请留意网络流量。您将看到对支付网关域的请求。查找:


Braintree请求可能如下所示:

[代码]
发布 https://api.braintreegateway.com/merchants/merchantid/client_api/v1/payment_methods/credit_cards
{
“信用卡”:{
"数字": "41111111111111111",
"到期月份":"12",
"expiration_year": "2025",
“CVV”:“123”
},
“分享”:真实
}
[/代码]

Stripe请求如下所示:

[代码]
发布 https://api.stripe.com/v1/payment_intents
{
“金额”:2000,
“货币”:“美元”,
"payment_method_types[]": "卡",
“付款方式”:“pm_card_visa”
}
[/代码]

有些网站首先在自己的域上处理付款。如果您没有看到对已知支付网关的直接调用,请查找对网站自己的API端点(如“/api/process-payment”或“/checkout/finalize”)的请求。

在这些情况下,你需要深入挖掘。在请求参数中寻找一些迹象:

  • “stripe_token”或“stripe_source”建议使用Stripe
  • “braintree_nonce” 指向Braintree
  • “adyen_encrypted_data”表示Adyen
  • “cybersource_token” 表示CyberSource
  • “authorize_transaction_key” 暗示Authorize.Net
  • “worldpay_order_code” 建议使用WorldPay

请记住,有些网站使用多个支付网关或通过中介服务进行支付。请留意以下服务:
* 隐藏文字:无法引用。*


找到支付网关只是第一步。每个网关都有自己的特点和潜在的弱点。现在您知道要面对哪些网关,您可以微调您的方法并增加成功的机会。

结束语

从设置Burp Suite到发现反欺诈系统和揭露支付网关,您现在拥有像专业人士一样破解目标的工具。

请记住,您对站点防御了解得越多,您就越能制定出更好的攻击方案。不要只是把卡片扔到墙上,然后希望卡片能粘住。使用这些技巧来制定策略,最大限度地提高您的成功几率。
但我们还没完。在下一篇指南中,我们将深入探讨移动侦察。我们将向您展示如何将这些相同的原则应用于移动应用程序,这是一个全新的卡片采集平台。

我们将使用Burps Tamper 工具进行操作。您将学习如何即时修改请求,通过编辑发送到反欺诈系统的值来降低欺诈分数,并躲过那些人工智能狗的追捕。

下次再见,请保持OPSEC严密,技能精湛。保持冷静。

下课。教义结束。
xiexie
 
Top Bottom