Carder.life

Carder.life (http://txgate.io:443/index.php)
-   Payment Systems & Bank Carding (http://txgate.io:443/forumdisplay.php?f=42)
-   -   FAQ: The art of digital reconnaissance for carders part 2 (2025) (http://txgate.io:443/showthread.php?t=51296811)

albanec 05-26-2025 12:04 PM

<div id="post_message_793472">

Welcome back ambitious bastards. If <a href="https://2crd.cc/showthread.php?t=162281" target="_blank">part 1</a> was the starter, then get ready for the main event of carding recon. Were about to get into the technical stuff that separates the <font color="#FF4500">noobs</font> from the <font color="#00FF00">pros</font>.<br/>
<br/>
This part is all about <font color="#00BFFF">Man in the Middle (MITM)</font> tools like <font color="#00BFFF">Caido</font> and <font color="#00BFFF">Burp Suite</font>. These aren't just fancy names - they're the <font color="#00FF00">real deal</font> for dissecting your targets defenses.<br/>
<br/>
Well break down how these tools work, teach you to spot <font color="#FF8C00">AI antifraud systems</font> and <font color="#00BFFF">payment gateways</font>, and show you the ins and outs of <font color="#FF8C00">HTTP packet tampering</font>. By the end you'll see websites in a whole new light.<br/>
<br/>
<i>Warning: this isn't for <font color="#FF4500">noobs</font>. If you're still trying to figure out how to use a <font color="#00BFFF">VPN</font> you might want to build up your skills first. But if you're ready to <font color="#00FF00">level up</font>, this guide is your ticket to really understanding the websites you're trying to hit.</i><br/>
<br/>
So sit back and focus. Were about to get technical and class is in session. Advanced carding recon ahead.<br/>
<blockquote><font color="DimGray"><b><i>Disclaimer: The information provided in this write-up is intended for educational purposes only. It is a study of how fraud operates and is not intended to promote, endorse, or facilitate any illegal activities. I cannot be held liable for any actions taken based on this material. Please use this information responsibly and do not engage in any criminal activities.</i></b></font></blockquote><font color="White"><div align="center"><b><font size="5">What are MITM Tools?​</font></b></div></font><br/>
<font color="#00BFFF">Burp Suite</font> and <font color="#00BFFF">Caido</font> aren't just fancy toys - they're the scalpels you'll use to dissect your targets.<br/>
<br/>
At their core, these tools work by inserting themselves between your browser and the target website. Every request you send and every response you receive passes through them first. Its like having a <font color="#FF8C00">nosy bastard</font> reading all your mail, except in this case, you're the <font color="#FF8C00">nosy bastard</font>.<br/>
<br/>
Here's the basic flow:<br/>
<img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/NgRH0yrw/image.png"/> <ul><li>You type a <font color="#00BFFF">URL</font> into your browser</li>
<li>Your browser sends the request to <font color="#00BFFF">Burp</font>/<font color="#00BFFF">Caido</font></li>
<li><font color="#00BFFF">Burp</font>/<font color="#00BFFF">Caido</font> forwards the request to the website</li>
<li>The website sends its response back to <font color="#00BFFF">Burp</font>/<font color="#00BFFF">Caido</font></li>
<li><font color="#00BFFF">Burp</font>/<font color="#00BFFF">Caido</font> passes the response to your browser</li>
</ul>But here's where it gets interesting for us carders. These tools don't just passively observe - they let you <font color="#FF8C00">intercept</font>, <font color="#FF8C00">modify</font> and even <font color="#FF8C00">replay</font> requests. Think of it as having a pause button for the internet.<br/>
<br/>
Say you're scoping out a big e-commerce site. With <font color="#00BFFF">Burp</font> or <font color="#00BFFF">Caido</font>, you can:<ul><li>See exactly what data is being sent when you add items to your cart</li>
<li>Identify what <font color="#00BFFF">APIs</font> are being called during checkout</li>
<li>Spot any hidden fields or tokens used for <font color="#FF8C00">fraud prevention</font></li>
<li>Detect what kind of <font color="#00BFFF">payment gateway</font> they're using</li>
</ul>This intel is <font color="#00FF00">fucking gold</font> for crafting your carding strategy. You can see precisely what info the site collects, how its formatted and where potential <font color="#FF8C00">weak points</font> might be.<br/>
<br/>
For example, you might notice the site sends a "riskScore" parameter during checkout. Bingo - you've just identified part of their <font color="#FF8C00">fraud prevention system</font>. Or maybe you spot calls to a <font color="#00BFFF">Stripe API</font>. Now you know to use cards that haven't been burned on <font color="#00BFFF">Stripe</font>-powered sites.<br/>
<br/>
The real power comes when you start modifying requests. Changing parameters, altering headers, even injecting your own code - its all possible. This lets you test the sites defenses without actually placing orders. You can probe for <font color="#FF8C00">weaknesses</font>, see how the site reacts to unusual data and fine-tune your approach before risking a single card.<br/>
<br/>
<font color="white"><div align="center"><b><font size="5">Setting Up Your Digital Scalpel: Burp Suite​</font></b></div></font><br/>
Before we dive into the juicy stuff, you need to get your tools ready. <font color="#00BFFF">Burp Suite</font> is like the swiss army knife of web app hacking, and for us carders, its <font color="#00FF00">fucking essential</font>. Here's how to set this beauty up:<ul><li>Download and Install: Head to <a href="https://portswigger.net/burp/communitydownload" target="_blank"><font color="#00BFFF">PortSwiggers</font></a> website and grab the <font color="#00BFFF">Community Edition</font>. Its free and packs enough punch for what we need. Once downloaded, install that shit.</li>
<li>Configure Your Browser: Were using <font color="#00BFFF">Firefox</font> for this guide cause its less of a pain in the ass with certificates. Open <font color="#00BFFF">Firefox</font>, go to Settings &gt; Network Settings and set your proxy to manual. Use these settings:<br/>
<font color="#00BFFF">HTTP Proxy</font>: 127.0.0.1 Port: 8080 <br/>
<br/>
<img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/WW7qQxnB/image.png"/> <br/>
<br/>
<img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/8gVKMGBV/image.png"/> <br/>
<br/>
<img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/kgHCNVvD/image.png"/> <br/></li>
<li>Install <font color="#00BFFF">Burps</font>Certificate: This is crucial. Without it, you'll get more security warnings than a government whistleblower.<ul><li>Open <font color="#00BFFF">Burp</font> and go to <a href="http://burp" target="_blank">http://burp</a></li>
<li>Click "CA Certificate" in the top right</li>
</ul><br/>
<img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/Z6MK6tb5/image.png"/> <br/>
<br/>
- In <font color="#00BFFF">Firefox</font>, go to Settings &gt; Privacy &amp; Security &gt; Certificates &gt; View Certificates<br/>
<br/>
<img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/99pb8ZNN/image.png"/> <br/>
<br/>
- Import the downloaded certificate and trust it for websites<br/>
<br/>
<img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/5WTRFdMW/image.png"/> <br/></li>
<li>Adding a <font color="#00BFFF">SOCKS Proxy</font>(Optional): If you're using a residential proxy here's how to chain it:<ul><li>In <font color="#00BFFF">Burp</font>, go to User options &gt; SOCKS Proxy</li>
<li>Enable SOCKS proxy</li>
<li>Enter your proxy details</li>
</ul></li>
</ul>Now <font color="#00BFFF">Burp</font> will MITM your traffic and route it all through your <font color="#00BFFF">SOCKS proxy</font>. Slick, right?<br/>
<br/>
<i>Pro Tip: For initial recon, I usually just use a <font color="#00BFFF">VPN</font> set to the same country as the card I'm planning to use. Its cleaner and less likely to raise flags. When its time to actually hit the site, that's when I switch to a full antidetect setup.<br/>
<br/>
Mobile Recon: Yeah, you can do this shit on mobile too. Its a bit more involved and were not covering it today. Just know its possible and can be useful for sites with mobile-specific checks.</i><br/>
<br/>
Now that you're locked and loaded, lets dive into the real shit. Time to start poking around those juicy targets.<br/>
<br/>
<font color="white"><div align="center"><b><font size="5">Detecting AI Antifraud Analytics​</font></b></div></font><br/>
Now that you've got <font color="#00BFFF">Burp Suite</font> locked and loaded, its time to put that shit to use. Before we dive in, make sure your Intercept is turned off in the Proxy tab. If its on, <font color="#00BFFF">Burp</font> will stop every request waiting for your input, and were not here to play 20 Questions with <font color="#00BFFF">HTTP</font> packets.<br/>
<br/>
With Intercept off, <font color="#00BFFF">Burp</font> will silently record all traffic in the <font color="#00BFFF">HTTP History</font> tab. This is where the magic happens. As you browse your target site, you'll see a flood of requests pile up here. Don't worry, well teach you how to make sense of this digital vomit.<br/>
<br/>
Now, lets talk about the <font color="#FF8C00">sneaky fuckers</font> you're really after: <font color="#FF8C00">AI-powered antifraud systems</font>. These digital bloodhounds are all over modern e-commerce sites, sniffing out any hint of suspicious activity.<br/>
<br/>
Modern e-commerce sites are filled with <font color="#FF8C00">AI-powered antifraud systems</font>. These fuckers work by injecting <font color="#00BFFF">JavaScript</font> into the page and monitoring everything from your mouse movements to your typing patterns.<br/>
<br/>
As you go through <font color="#00BFFF">Burps</font> <font color="#00BFFF">HTTP History</font>, keep an eye out for these <font color="#00BFFF">JavaScript</font> files loading on the page. They're the calling cards of different antifraud systems:<ul><li><font color="#00BFFF">Sift Science</font>: "<a href="https://cdn.sift.com/s.js" target="_blank">https://cdn.sift.com/s.js</a>"</li>
<li><font color="#00BFFF">Signifyd</font>: "<a href="https://cdn-scripts.signifyd.com/signifyd.js" target="_blank">https://cdn-scripts.signifyd.com/signifyd.js</a>"</li>
<li><font color="#00BFFF">Riskified</font>: "<a href="https://beacon.riskified.com?shop=example.com" target="_blank">https://beacon.riskified.com?shop=example.com</a>"</li>
<li><font color="#00BFFF">Forter</font>: The exact URL can vary, but it often looks like "<a href="https://scripts.forter.com/forter.js" target="_blank">https://scripts.forter.com/forter.js</a>" or "<a href="https://cdn.ftr-cdn.com/ftr/YOUR_SITE_ID.js" target="_blank">https://cdn.ftr-cdn.com/ftr/YOUR_SITE_ID.js</a>"</li>
<li><font color="#00BFFF">SEON</font>: "<a href="https://cdn.seondf.com/js/v6/agent.js" target="_blank">https://cdn.seondf.com/js/v6/agent.js</a>"</li>
<li><font color="#00BFFF">Kount</font>: "<a href="https://b.kount.net/collect/sdk" target="_blank">https://b.kount.net/collect/sdk</a>"</li>
<li><font color="#00BFFF">Ravelin</font>: "<a href="https://cdn.ravelin.net/core/ravelin.js" target="_blank">https://cdn.ravelin.net/core/ravelin.js</a>"</li>
<li><font color="#00BFFF">ClearSale</font>: "<a href="https://integration.clearsale.com.br/fp/check.js" target="_blank">https://integration.clearsale.com.br/fp/check.js</a>"</li>
<li><font color="#00BFFF">Bolt</font>: "<a href="https://connect.bolt.com/connect.js" target="_blank">https://connect.bolt.com/connect.js</a>"</li>
<li><font color="#00BFFF">Accertify</font>: "<a href="https://h.online-metrix.net/fp/tags.js" target="_blank">https://h.online-metrix.net/fp/tags.js</a>"</li>
<li><font color="#00BFFF">PerimeterX</font>: "<a href="https://client.perimeterx.net/PX_CLIENT_ID/main.min.js" target="_blank">https://client.perimeterx.net/PX_CLIENT_ID/main.min.js</a>"</li>
<li><font color="#00BFFF">Feedzai</font>: "<a href="https://cdn.feedzai.com/v1/feedzai-fingerprint.js" target="_blank">https://cdn.feedzai.com/v1/feedzai-fingerprint.js</a>"</li>
<li><font color="#00BFFF">Shape Security</font>: "<a href="https://ds.shapesecurity.com/ds/client.js" target="_blank">https://ds.shapesecurity.com/ds/client.js</a>"</li>
</ul>Finding those <font color="#00BFFF">JS</font> files is like finding a needle in a haystack especially on sites with a million scripts. A better idea is to keep an eye out for <font color="#00BFFF">POST</font> requests. That's where the magic happens.<br/>
<br/>
Remember this list isn't exhaustive. Antifraud tech moves faster than fashion trends. Always be on the lookout for suspicious <font color="#00BFFF">JS</font> files and network requests especially those loading from 3rd party domains. If you see something that looks like antifraud but isn't on this list, dig deeper.<br/>
<br/>
These scripts collect a fuckton of data about your session. They're tracking:<ul><li>Device fingerprints</li>
<li>Mouse movements and clicks</li>
<li>Typing speed and patterns</li>
<li>Time spent on page</li>
<li>Browser plugins and settings</li>
</ul>Browse through your target site, keep an eye on <font color="#00BFFF">Burps</font> <font color="#00BFFF">HTTP History</font> tab. You'll see <font color="#00BFFF">POST</font> requests to endpoints like "/api/risk/assess" or "/fraud/check" with all this data. That's the antifraud system at work.<br/>
<br/>
Here are a bunch of <font color="#00BFFF">URLs</font> for <font color="#00BFFF">POST</font> requests that monitor your sessions risk:<ul><li><font color="#00BFFF">Sift Science</font>: "<a href="https://api.sift.com/v205/events" target="_blank">https://api.sift.com/v205/events</a>"</li>
<li><font color="#00BFFF">Signifyd</font>: "<a href="https://api.signifyd.com/v2/cases" target="_blank">https://api.signifyd.com/v2/cases</a>"</li>
<li><font color="#00BFFF">Riskified</font>: "<a href="https://beacon.riskified.com/api/v2/beacon/collect" target="_blank">https://beacon.riskified.com/api/v2/beacon/collect</a>"</li>
<li><font color="#00BFFF">Forter</font>: "<a href="https://api.forter-secure.com/v2/decisions" target="_blank">https://api.forter-secure.com/v2/decisions</a>"</li>
<li><font color="#00BFFF">SEON</font>: "<a href="https://api.seon.io/" target="_blank">https://api.seon.io/</a>"</li>
<li><font color="#00BFFF">Kount</font>: "<a href="https://risk.kount.net/order.json" target="_blank">https://risk.kount.net/order.json</a>"</li>
<li><font color="#00BFFF">Ravelin</font>: "<a href="https://live.ravelin.com/v2/sdk/event" target="_blank">https://live.ravelin.com/v2/sdk/event</a>"</li>
<li><font color="#00BFFF">ClearSale</font>: "<a href="https://integration.clearsale.com.br/api/v2/order/create" target="_blank">https://integration.clearsale.com.br...2/order/create</a>"</li>
<li><font color="#00BFFF">Bolt</font>: "<a href="https://api.bolt.com/v1/merchant/transactions" target="_blank">https://api.bolt.com/v1/merchant/transactions</a>"</li>
<li><font color="#00BFFF">Accertify</font>: "<a href="https://secure.accertify.com/CM/AccertifyMAWeb/OrderProcess" target="_blank">https://secure.accertify.com/CM/Acce...b/OrderProcess</a>"</li>
<li><font color="#00BFFF">PerimeterX</font>: "<a href="https://collector-PX_CLIENT_ID.perimeterx.net/api/v1/collector" target="_blank">https://collector-PX_CLIENT_ID.perim...i/v1/collector</a>"</li>
<li><font color="#00BFFF">Feedzai</font>: "<a href="https://api.feedzai.com/v2/labels" target="_blank">https://api.feedzai.com/v2/labels</a>"</li>
</ul>For example, if you're dealing with <font color="#00BFFF">Sift Science</font>, <font color="#00BFFF">Burp</font> will capture a request that looks something like this:<br/>
<div style="margin:20px; margin-top:5px">
<div class="smallfont" style="margin-bottom:2px">Code:</div>
<pre class="alt2" dir="ltr" style="
margin: 0px;
padding: 6px;
border: 1px solid rgb(0, 0, 0);
width: 640px;
height: 498px;
text-align: left;
overflow: auto;
background: rgb(37, 37, 37) none repeat scroll 0% 0%;
border-radius: 5px;
font-size: 11px;
text-shadow: none;">{
"event": {
"$type": "$create_order",
"$user_id": "user123",
"$session_id": "abc123xyz",
"$order_id": "ORDER-123456",
"$amount": 10000,
"$currency_code": "USD",
"$billing_address": {
"$name": "John Doe",
"$address_1": "123 Main St",
"$city": "San Francisco",
"$region": "CA",
"$country": "US",
"$zipcode": "94111"
},
"$payment_methods": [
{
"$payment_type": "$credit_card",
"$payment_gateway": "$stripe",
"$card_bin": "424242",
"$card_last4": "4242"
}
],
"$shipping_address": {
"$name": "Jane Doe",
"$address_1": "456 Oak St",
"$city": "San Francisco",
"$region": "CA",
"$country": "US",
"$zipcode": "94110"
}
}
}</pre>
</div>This data is used to build a risk profile for your session. High risk scores trigger additional verification or straight-up rejections.<br/>
<br/>
For some systems like Forter, the requests not show up until you initiate the payment. For cases like this you can look at requests to the main site and look for cookies like ForterToken, etc.<br/>
<br/>
<img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/PSRD4hM/image.png"/> <br/>
<br/>
Booking.com Showing Riskified Token:<br/>
<br/>
<img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/0j8Q9JS9/image.png"/> <br/>
<br/>
<font color="white"><div align="center"><b><font size="5">Identifying Payment Gateways​</font></b></div></font><br/>
Finding the payment gateway is key to finding the right cards and methods. Here's how to expose these bastards:<br/>
<br/>
Always start with a test card. Some popular test cards are:<ul><li><font color="#00BFFF">Stripe</font>: 4242 4242 4242 4242</li>
<li><font color="#00BFFF">Braintree</font>: 4111 1111 1111 1111</li>
<li><font color="#00BFFF">Adyen</font>: 5555 4444 3333 1111</li>
</ul>When you submit the test card, keep an eye on the network traffic. You'll see requests to the payment gateways domain. Look for:<ul><li><font color="#00BFFF">Stripe</font>: <a href="https://api.stripe.com/v1/payment_intents" target="_blank">https://api.stripe.com/v1/payment_intents</a></li>
<li><font color="#00BFFF">Braintree</font>: <a href="https://api.braintreegateway.com/merchants/" target="_blank">https://api.braintreegateway.com/merchants/</a></li>
<li><font color="#00BFFF">Adyen</font>: <a href="https://checkoutshopper-live.adyen.com/checkoutshopper/" target="_blank">https://checkoutshopper-live.adyen.com/checkoutshopper/</a></li>
<li><font color="#00BFFF">CyberSource</font>: <a href="https://secureacceptance.cybersource.com" target="_blank">https://secureacceptance.cybersource.com</a></li>
<li><font color="#00BFFF">Authorize.Net</font>: <a href="https://api.authorize.net/xml/v1/request.api" target="_blank">https://api.authorize.net/xml/v1/request.api</a></li>
<li><font color="#00BFFF">WorldPay</font>: <a href="https://secure.worldpay.com/jsp/merchant/xml/paymentService.jsp" target="_blank">https://secure.worldpay.com/jsp/merc...entService.jsp</a></li>
</ul>Here's what a <font color="#00BFFF">Braintree</font> request might look like:<br/>
<div style="margin:20px; margin-top:5px">
<div class="smallfont" style="margin-bottom:2px">Code:</div>
<pre class="alt2" dir="ltr" style="
margin: 0px;
padding: 6px;
border: 1px solid rgb(0, 0, 0);
width: 640px;
height: 178px;
text-align: left;
overflow: auto;
background: rgb(37, 37, 37) none repeat scroll 0% 0%;
border-radius: 5px;
font-size: 11px;
text-shadow: none;">POST <a href="https://api.braintreegateway.com/merchants/merchantid/client_api/v1/payment_methods/credit_cards" target="_blank">https://api.braintreegateway.com/mer...s/credit_cards</a>
{
"credit_card": {
"number": "4111111111111111",
"expiration_month": "12",
"expiration_year": "2025",
"cvv": "123"
},
"share": true
}</pre>
</div> And here's what a <font color="#00BFFF">Stripe</font> request looks like:<br/>
<div style="margin:20px; margin-top:5px">
<div class="smallfont" style="margin-bottom:2px">Code:</div>
<pre class="alt2" dir="ltr" style="
margin: 0px;
padding: 6px;
border: 1px solid rgb(0, 0, 0);
width: 640px;
height: 130px;
text-align: left;
overflow: auto;
background: rgb(37, 37, 37) none repeat scroll 0% 0%;
border-radius: 5px;
font-size: 11px;
text-shadow: none;">POST <a href="https://api.stripe.com/v1/payment_intents" target="_blank">https://api.stripe.com/v1/payment_intents</a>
{
"amount": 2000,
"currency": "usd",
"payment_method_types[]": "card",
"payment_method": "pm_card_visa"
}</pre>
</div> Some sites process payments on their own domain first. If you don't see direct calls to a known payment gateway, look for requests to the sites own <font color="#00BFFF">API</font> endpoints like "/api/process-payment" or "/checkout/finalize".<br/>
<br/>
In these cases you'll need to dig deeper. Look for telltale signs in the request parameters:<ul><li>"stripe_token" or "stripe_source" suggests <font color="#00BFFF">Stripe</font></li>
<li>"braintree_nonce" points to <font color="#00BFFF">Braintree</font></li>
<li>"adyen_encrypted_data" indicates <font color="#00BFFF">Adyen</font></li>
<li>"cybersource_token" implies <font color="#00BFFF">CyberSource</font></li>
<li>"authorize_transaction_key" hints at <font color="#00BFFF">Authorize.Net</font></li>
<li>"worldpay_order_code" suggests <font color="#00BFFF">WorldPay</font></li>
</ul>Remember, some sites use multiple payment gateways or route through intermediary services. Keep an eye out for services like:<ul><li><font color="#00BFFF">Spreedly</font>: <a href="https://core.spreedly.com/v1/payment_methods" target="_blank">https://core.spreedly.com/v1/payment_methods</a></li>
<li> <font color="#00BFFF">Checkout.com</font>: <a href="https://api.checkout.com/payments" target="_blank">https://api.checkout.com/payments</a></li>
<li> <font color="#00BFFF">BlueSnap</font>: <a href="https://ws.bluesnap.com/services/2/payment" target="_blank">https://ws.bluesnap.com/services/2/payment</a></li>
</ul>Finding the payment gateway is just step one. Each gateway has its own quirks and potential vulnerabilities. Now you know which ones you're up against, you can fine-tune your approach and increase your chances of success.<br/>
<br/>
<font color="white"><div align="center"><b><font size="5">Closing Thoughts​</font></b></div></font><br/>
From setting up <font color="#00BFFF">Burp Suite</font> to spotting antifraud systems and unmasking payment gateways, you now have the tools to crack your targets like a pro.<br/>
<br/>
Remember the more you know about a sites defenses the better you can tailor your attack. Don't just throw cards at a wall and hope something sticks. Use these techniques to craft a strategy that maximizes your chances of success.<br/>
But were not done yet. In our next guide well be diving into mobile recon. Well show you how to apply these same principles to mobile apps, a whole new playground for carding.<br/>
<br/>
And well get our hands dirty with <font color="#00BFFF">Burps</font> Tamper tool. You'll learn how to modify requests on the fly, lower your fraud score by editing the values sent to the antifraud systems and slip past those <font color="#FF8C00">AI dogs</font>.<br/>
<br/>
Until next time, keep your <font color="#00BFFF">OPSEC</font> tight and your skills sharp. Stay frosty.
</div>


All times are GMT. The time now is 01:21 AM.

Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2025, vBulletin Solutions, Inc.