![]() |
<div id="post_message_794862">
My inbox is overflowing with messages like <font color="#00BFFF">albanec</font> teach me <font color="#FF8C00">hacking</font>! or <font color="#00BFFF">albanec</font> how do I get <font color="#FF4500">credit card numbers</font> from sites?. First off if you've been paying any damn attention to my other writeups you'd know that before I was your favorite <font color="#FF8C00">fraud</font> guru I was a <font color="#00FF00">pentester</font>. Yeah a legit certified get-paid-to-break-into-shit kind of <font color="#00FF00">pentester</font>.<br/> <br/> So yeah I know a thing or two about <font color="#FF8C00">hacking</font> shit. But lets get one thing straight: <font color="#FF8C00">hacking</font> in 2025 ain't a walk in the park especially if you're looking to get into the <font color="#FF4500">carding</font> scene. But since you're here and you're obviously too lazy to do your own research lets talk about <font color="#FF8C00">hacking</font> in 2025. This will be a rough overview of <font color="#FF8C00">hacking</font> in a new series where we focus on all things <font color="#FF8C00">hacking</font>.<br/> <br/> Forget those <font color="#00BFFF">Hollywood</font> fantasies of <font color="#FF8C00">hacking</font> being some rapid-fire keyboard mashing with green code cascading down the screen. These days its a grind a constant chess match against ever-improving <font color="#00FF00">security</font>. But for those with the guts the smarts and the sheer balls to take what they want there's still loot to be had.<br/> <br/> <font color="white"><div align="center"><font size="5"><b>Hacking: The Good Ol Days (They're Gone)</b></font></div></font><br/> First off lets get real. Were not in the early 2000s anymore. Back then <font color="#FF8C00">hacking</font> was childs play. Websites were held together with duct tape and prayers running on ancient <a href="https://www.php.net/" target="_blank"><font color="#00BFFF">PHP</font></a> and <a href="https://www.mysql.com/" target="_blank"><font color="#00BFFF">MySQL</font></a> full of holes. <font color="#FF8C00">Hacking</font> was like taking candy from a baby.<br/> <br/> <div align="center"><img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/v2WzpWx/image.png"/></div><br/> You could fire up <font color="#00BFFF">Havij</font> point it at a site and boom! Databases overflowing with <font color="#FF4500">credit card numbers</font>. Or you could pwn a <a href="https://www.whmcs.com/" target="_blank"><font color="#00BFFF">WHMCS</font></a> install and suddenly have the keys to thousands of sites. Those were the glory days. Easy pickings.<br/> <br/> <div align="center"><img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/9kLr73Sr/image.png"/> <br/> <br/> <img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/S7v6ZChz/image.png"/> <br/> <br/> <img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/Z6nTZVf6/image.png"/></div><br/> But guess what? Those days are dead and buried. Websites wised up started using frameworks that didn't completely suck and patched up those embarrassing security flaws. And the real prize like <font color="#FF4500">credit card numbers</font> and <font color="#FF8C00">passwords</font> started getting <font color="#00FF00">encrypted</font>. So even if you did manage to break in you'd be staring at a bunch of gibberish that'd take forever to crack without the decryption keys.<br/> <br/> <font color="white"><div align="center"><font size="5"><b>Vulnerabilities</b></font></div></font><br/> So whats a wannabe <font color="#FF8C00">hacker</font> to do? You gotta grasp the basics. <font color="#FF8C00">Hacking</font> at its heart is about finding and exploiting <font color="#FF8C00">vulnerabilities</font>. Every system no matter how well-built has cracks. These cracks are <font color="#FF8C00">vulnerabilities</font> and they exist because nothing is perfect.<br/> <br/> <img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/KzDzXqqD/image.png"/> <br/> <br/> As developers pile on features and complexity the chances of introducing <font color="#FF8C00">bugs</font> skyrocket. These <font color="#FF8C00">bugs</font> can be anything from a minor hiccup to a gaping security hole.<br/> <br/> Take <font color="#FF8C00">SQL injection</font>. Its a classic vulnerability where an attacker can inject malicious SQL code into an applications database queries. If the application isn't properly sanitizing user inputs (and many aren't) an attacker can manipulate these queries to do all sorts of nasty shit like dumping the entire database or even taking control of the server.<br/> <br/> The best part is that these <font color="#FF8C00">vulnerabilities</font> can be chained together to create a symphony of destruction. Let me give you an example:<br/> <br/> You find a janky search feature on some companys website. Its vulnerable to <font color="#FF8C00">SQL injection</font>. With some digging you extract admin user session cookies from the database. These aren't just any cookies - they're your VIP pass to their internal admin panel.<br/> <br/> Using these stolen cookies you waltz right into their admin dashboard. And what do you find? A file upload feature for product images. But these morons didn't properly validate file types. So instead of uploading cat pics you upload a sneaky <font color="#FF8C00">PHP web shell</font> disguised as an image.<br/> <br/> <img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/SXVCMrhn/image.png"/> <br/> <br/> Game over. That innocent-looking image is a <font color="#FF4500">backdoor</font> giving you full command execution on their server. From there you can worm your way deeper into their network escalate privileges or just trash their whole system. This is actually from my personal experience lol.<br/> <br/> This isn't some <font color="#00BFFF">Hollywood</font> fantasy - its a real-world example of how one tiny crack (<font color="#FF8C00">SQL injection</font>) can lead to total system compromise. Each vulnerability is a stepping stone leading you deeper into the targets guts.<br/> <br/> <font color="white"><div align="center"><font size="5"><b>Bug Hunting</b></font></div></font><div align="center"><br/> <img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/SDBJdxn5/image.png"/></div><br/> In 2025 <font color="#FF8C00">hacking</font> is less about targeting specific sites and more about finding <font color="#FF8C00">vulnerabilities</font> on a massive scale. Its like searching for a needle in a haystack except the haystack is the entire internet. This is where <font color="#00FF00">bug hunting</font> comes into play and one tool has become indispensable for this: <a href="https://nuclei.projectdiscovery.io/" target="_blank"><font color="#00BFFF">Nuclei</font></a>.<br/> <br/> <font color="white"><div align="center"><font size="5"><b>Nuclei: Your Vulnerability Scanning Swiss Army Knife</b></font></div></font><div align="center"><br/> <img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/3ZXmv2y/image.png"/></div><br/> Think of <a href="https://nuclei.projectdiscovery.io/" target="_blank"><font color="#00BFFF">Nuclei</font></a> as your automated vulnerability scout. Its an open-source tool that lets you define specific vulnerabilities you're looking for and then scan a shitload of targets to see if they're vulnerable. Its like having a robot army that checks every door in every house in the world to see which ones are unlocked.<br/> <br/> <div align="center"><img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/jZGS3Vsr/image.png"/> </div><br/> The beauty of <a href="https://nuclei.projectdiscovery.io/" target="_blank"><font color="#00BFFF">Nuclei</font></a> lies in its simplicity and its reliance on templates. These templates describe how to detect a specific vulnerability. Its like writing a recipe for finding a particular flaw.<br/> <br/> <font color="white"><font size="5"><b>Nuclei Templates: Recipes for Exploits</b></font></font><br/> Each <a href="https://nuclei.projectdiscovery.io/" target="_blank"><font color="#00BFFF">Nuclei</font></a> template is a YAML file that contains:<br/> <br/> <img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/zVJD0tYz/image.png"/> <ul><li><b>Metadata:</b> Information about the vulnerability like its name severity and description.</li> <li><b>Request:</b> The HTTP request(s) needed to test for the vulnerability. This is where you define what to send to the target.</li> <li><b>Matchers:</b> Rules to determine if the target is vulnerable based on the response. This is where you define what to look for in the response to confirm the vulnerability.</li> </ul><br/> Here's a simplified example of a nuclei template that checks for SQL injection vulnerabilities by testing common SQL injection payloads against parameters:<br/> <div style="margin:20px; margin-top:5px"> <div class="smallfont" style="margin-bottom:2px">Code:</div> <pre class="alt2" dir="ltr" style=" margin: 0px; padding: 6px; border: 1px solid rgb(0, 0, 0); width: 640px; height: 498px; text-align: left; overflow: auto; background: rgb(37, 37, 37) none repeat scroll 0% 0%; border-radius: 5px; font-size: 11px; text-shadow: none;">id: sql-injection-test info: name: Basic SQL Injection Test author: albanec severity: high description: Tests for SQL injection vulnerabilities using common payloads tags: sql,injection,vulnerability requests: - method: GET path: - "{{BaseURL}}/page.php?id={{payload}}" payloads: payload: - "1' OR '1'='1" - "1 UNION SELECT null,null--" - "1' AND 1=1--" - "' OR '1'='1" matchers-condition: or matchers: - type: word words: - "SQL syntax" - "mysql_fetch_array" - "ORA-01756" - "SQLite3::query" condition: or - type: status status: - 500 - 503</pre> </div>This template sends SQL injection payloads to a parameter named 'id', then looks for common SQL error messages or specific HTTP status codes that might indicate a successful injection. It tests multiple payloads and considers it vulnerable if any matcher conditions are met.<br/> <br/> <font color="white"><b><font size="5">How Nuclei Supercharges Bug Hunting</font></b></font><br/> What makes <a href="https://nuclei.projectdiscovery.io/" target="_blank"><font color="#00BFFF">Nuclei</font></a> a godsend for <font color="#FF8C00">hacking</font> is its ability to quickly adapt to the latest vulnerabilities. As soon as a new exploit hits the scene the community jumps in to create a <a href="https://nuclei.projectdiscovery.io/" target="_blank"><font color="#00BFFF">Nuclei</font></a> template for it. This means you can start scanning for vulnerable systems almost immediately after a new vulnerability is disclosed.<br/> <br/> For example lets say a new vulnerability is discovered in a popular <a href="https://wordpress.org/" target="_blank"><font color="#00BFFF">WordPress</font></a> plugin. Within hours someone will likely create a <a href="https://nuclei.projectdiscovery.io/" target="_blank"><font color="#00BFFF">Nuclei</font></a> template to detect it. You can then grab that template add it to your arsenal and start scanning the web for vulnerable sites.<br/> <br/> <img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/pvjfwDgK/image.png"/><br/> <br/> This mass-scanning approach is the shit. Instead of painstakingly probing individual sites we can cast a wide net identify a large number of potentially vulnerable targets and then focus our efforts on the most promising ones. Its about efficiency and in this game time is money.<br/> <br/> You'll also need to understand <font color="#FF8C00">dorks</font>. These are specific search queries you can run on <a href="https://www.google.com/" target="_blank"><font color="#00BFFF">Google</font></a> <a href="https://www.shodan.io/" target="_blank"><font color="#00BFFF">Shodan</font></a> or <a href="https://fofa.info/" target="_blank"><font color="#00BFFF">FOFA</font></a> that can find vulnerable systems or sensitive info. For example a dork might reveal websites running a specific version of software with a known vulnerability. I covered some already here: <a href="https://2crd.cc/showthread.php?t=160190" target="_blank">FAQ: Carding bites - digital dumpster diving with Google dorks (2025)</a>.<br/> <br/> <font color="white"><div align="center"><font size="5"><b>Hacking for Cards</b></font></div></font><br/> Now lets get to the good stuff: snagging those <font color="#FF4500">credit card numbers</font>. There are a few ways to do this and none of them are a walk in the park.<br/> <br/> <font color="white"><b><font size="3"><font color="white">Juicy Databases</font></font></b></font><br/> First you could try to find shops that actually store <font color="#FF4500">credit card numbers</font> in their databases. But here's the thing: most modern sites don't do that anymore. They use managed software like <a href="https://woocommerce.com/" target="_blank"><font color="#00BFFF">WooCommerce</font></a> <a href="https://www.shopify.com/" target="_blank"><font color="#00BFFF">Shopify</font></a> or <a href="https://www.magento.com/" target="_blank"><font color="#00BFFF">Magento</font></a> which tokenizes and securely relay card details to a payment processor via a secure iframe during checkout (think <a href="https://stripe.com/payments/elements" target="_blank"><font color="#00BFFF">Stripe Elements</font></a> <a href="https://developer.authorize.net/" target="_blank"><font color="#00BFFF">Authorize.Net</font></a> <a href="https://www.adyen.com/" target="_blank"><font color="#00BFFF">Adyen</font></a> etc.).<br/> <br/> <div align="center"><img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/zWSBshd2/image.png"/></div><br/> Why? Because storing <font color="#FF4500">credit card numbers</font> is a massive pain in the ass. Its a huge security risk and it makes you subject to all sorts of regulations like <font color="#00BFFF">PCI DSS</font>. Trust me no sane shop owner wants that headache. So you're left with dinosaur-age e-commerce sites that still store card numbers in their databases.<br/> <br/> So how do you know if a site stores card numbers? Look for signs that they're running their own custom e-commerce platform. Check the source code for clues look for unique checkout flows and try to identify the payment gateway they're using. Its not foolproof but its a start.<br/> <br/> Even if they do store cards they're usually <font color="#00FF00">encrypted</font>. But don't lose hope just yet. Since these cards are stored for future use (subscriptions recurring payments etc.) the application must have access to the decryption keys. A skilled <font color="#FF8C00">hacker</font> might be able to find and exploit these keys to decrypt the card data.<br/> <br/> <font color="white"><font size="3"><b>Sniffers</b></font></font><br/> Even if the site doesn't store cards in their database they are still useful for <font color="#FF4500">carders</font> as you can always inject <font color="#FF8C00">sniffer</font> scripts. This involves injecting malicious scripts into a websites checkout page to capture credit card details as they're entered by unsuspecting customers. Its like a digital pickpocket silently stealing card numbers without the victim even knowing.<br/> <br/> <div align="center"><img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/1tvkqFj8/image.png"/></div><br/> This technique is often associated with <font color="#FF4500">Magecart</font> attacks which have become increasingly common. These attacks typically target e-commerce platforms particularly <a href="https://www.magento.com/" target="_blank"><font color="#00BFFF">Magento</font></a> and involve injecting malicious <font color="#00BFFF">JavaScript</font> code into the checkout process.<br/> <br/> There are two main approaches to implementing sniffers on e-commerce sites:<br/> <br/> <b>1. <font color="#FF8C00">JavaScript Sniffers</font>:</b> These are stealthy scripts injected directly into the checkout page that capture card data as its typed. They're harder to detect since they don't interfere with the normal payment flow. The downside? Modern security features like <font color="#00FF00">CSP</font> (Content Security Policy) can make them tricky to implement.<br/> <br/> <b>2. <font color="#FF8C00">Plugin/Phish Sniffers</font>:</b> If you've got admin access to a platform like <a href="https://woocommerce.com/" target="_blank"><font color="#00BFFF">WooCommerce</font></a> you can install a malicious payment plugin. This swaps out the legit payment form for your own grabs the card details then smoothly redirects back to the real checkout. Less elegant than JS sniffers but sometimes its your only option when dealing with locked-down sites.<br/> <br/> Ive written a detailed guide on implementing both types of sniffers complete with code examples and stealth techniques. You can find it here: <b><a href="https://2crd.cc/showthread.php?t=160265" target="_blank"> FAQ: How to make your first CC sniffer (2025)</a></b><br/> <br/> The key to a successful sniffer operation isn't just getting it installed - its staying undetected. You'll want to:<ul><li><font color="#00FF00">Encrypt</font> all stolen data before exfiltration</li> <li><font color="#00FF00">Obfuscate</font> your malicious code</li> <li>Use legitimate-looking domain names for data collection</li> <li>Blend your scripts in with normal site functionality</li> </ul><br/> There are all sorts of tricks to make these sniffers hard to detect. You can obfuscate the code use encoding or even inject the script into a legitimate third-party library. But well get into that later.<br/> <br/> <font color="white"><div align="center"><font size="5"><b>The Human Element</b></font></div></font><br/> These days systems are locked down tighter than a crabs ass so hackers are going after the weakest link: humans duh. <font color="#FF8C00">Social engineering</font> and buying access to enterprise platforms through logs have become major fucking attack vectors.<br/> <br/> You don't need to be some elite coder to make it in this game. Shit if you can sweet-talk your grandma into giving you her secret cookie recipe you've got a shot. Sometimes a silver tongue can be more effective than a thousand lines of code. A well-placed bit of trickery can be worth more than a zero-day exploit these days. So where does a wannabe <font color="#FF8C00">hacker</font> start?<br/> <br/> <div align="center"><img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/jP6NktZB/image.png"/></div><br/> Well <font color="#FF8C00">hacking</font> groups are all over <a href="https://discord.com/" target="_blank"><font color="#00BFFF">Discord</font></a> and <a href="https://telegram.org/" target="_blank"><font color="#00BFFF">Telegram</font></a> trying to weasel their way into company systems. They're not just looking for code exploits; they're hunting for logs or other things that will give them access. They research a company – its sites panels subdomains – then scour logs for logins. Once they've got a foot in the door they pivot. Sometimes they sweet-talk other employees playing on human weaknesses or sim-swap them to gain email access. Other times they find vulnerabilities in the internal network. Its a fucking mess but guess what? It works.<br/> <br/> <div align="center"><img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/G33LSzMz/image.png"/></div><br/> Remember most security efforts focus on customer-facing products. Developers often assume their internal tools are safe because they're not publicly accessible. That's a big fucking mistake. Groups like <font color="#FF4500">Lapsus$</font> have shown how devastating these attacks can be gaining access to major companies like <a href="https://www.microsoft.com/" target="_blank"><font color="#00BFFF">Microsoft</font></a> and <a href="https://www.okta.com/" target="_blank"><font color="#00BFFF">Okta</font></a> through compromised employee accounts. Its like walking through the front door because some moron left it unlocked.<br/> <br/> <font color="white"><div align="center"><font size="5"><b>Ransomware</b></font></div></font><br/> <font color="#FF4500">Ransomware</font> is another lucrative path and its often connected to the previous point about gaining access through <font color="#FF8C00">social engineering</font> or logs. Instead of going after small-time scores <font color="#FF4500">ransomware</font> groups target entire companies. They encrypt the companys data and demand a hefty ransom for its release and a promise to not leak it to public.<br/> <br/> These groups often operate on an affiliate model where individuals or smaller groups gain access to a companys network and then deploy the <font color="#FF4500">ransomware</font>. The profits are then split between the affiliate and the <font color="#FF4500">ransomware</font> operators.<br/> <br/> <div align="center"><img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/60Vdr3Q4/image.png"/></div><br/> Now if you're gonna go down this path at least have some damn morals. Don't target hospitals schools or other essential services.<br/> <br/> <font color="white"><div align="center"><font size="5"><b>More Resources</b></font></div></font><br/> Here are a few resources to get you started:<ul><li><b><font color="#00FF00">THE FUCKING GOAT</font>:</b><ul><li><a href="https://book.hacktricks.xyz/" target="_blank">https://book.hacktricks.xyz/</a> (HackTricks - The Ultimate Pentesting Bible)</li> </ul></li> <li><b><font color="#00FF00">Vulnerability Databases</font>:</b><ul><li><a href="https://nvd.nist.gov/" target="_blank">https://nvd.nist.gov/</a> (National Vulnerability Database)</li> <li><a href="https://www.exploit-db.com/" target="_blank">https://www.exploit-db.com/</a></li> <li><a href="https://cve.mitre.org/" target="_blank">https://cve.mitre.org/</a></li> <li><a href="https://vuldb.com/" target="_blank">https://vuldb.com/</a></li> <li><a href="https://www.rapid7.com/db/" target="_blank">https://www.rapid7.com/db/</a> (Rapid7 Vulnerability Database)</li> </ul></li> <li><b><font color="#00FF00">Essential Tools</font>:</b><ul><li><a href="https://portswigger.net/burp" target="_blank">https://portswigger.net/burp</a> (Burp Suite - Web Security Testing)</li> <li><a href="https://github.com/sqlmapproject/sqlmap" target="_blank">https://github.com/sqlmapproject/sqlmap</a> (SQLMap - SQL Injection)</li> <li><a href="https://www.metasploit.com/" target="_blank">https://www.metasploit.com/</a> (Metasploit Framework)</li> <li><a href="https://www.kali.org/" target="_blank">https://www.kali.org/</a> (Kali Linux - Pentesting OS)</li> <li><a href="https://www.wireshark.org/" target="_blank">https://www.wireshark.org/</a> (Network Protocol Analyzer)</li> <li><a href="https://nmap.org/" target="_blank">https://nmap.org/</a> (Network Scanner)</li> <li><a href="https://github.com/OWASP/ZAP" target="_blank">https://github.com/OWASP/ZAP</a> (OWASP ZAP - Web App Scanner)</li> </ul></li> <li><b><font color="#00FF00">Scanning & Reconnaissance</font>:</b><ul><li><a href="https://www.shodan.io/" target="_blank">https://www.shodan.io/</a> (IoT Search Engine)</li> <li><a href="https://fofa.info/" target="_blank">https://fofa.info/</a></li> <li><a href="https://github.com/projectdiscovery/nuclei" target="_blank">https://github.com/projectdiscovery/nuclei</a></li> <li><a href="https://censys.io/" target="_blank">https://censys.io/</a></li> <li><a href="https://github.com/ffuf/ffuf" target="_blank">https://github.com/ffuf/ffuf</a> (Fast Web Fuzzer)</li> <li><a href="https://github.com/projectdiscovery/subfinder" target="_blank">https://github.com/projectdiscovery/subfinder</a> (Subdomain Discovery)</li> </ul></li> <li><b><font color="#00FF00">Learning Platforms</font>:</b><ul><li><a href="https://www.hackthebox.com/" target="_blank">https://www.hackthebox.com/</a></li> <li><a href="https://tryhackme.com/" target="_blank">https://tryhackme.com/</a></li> <li><a href="https://www.offensive-security.com/" target="_blank">https://www.offensive-security.com/</a></li> <li><a href="https://portswigger.net/web-security" target="_blank">https://portswigger.net/web-security</a> (Web Security Academy)</li> <li><a href="https://www.pentesteracademy.com/" target="_blank">https://www.pentesteracademy.com/</a></li> <li><a href="https://www.cybrary.it/" target="_blank">https://www.cybrary.it/</a></li> </ul></li> </ul>This is just a taste a little appetizer. Well dive deeper into specific topics in future installments of this series. And when I say deep I really mean it.<br/> <br/> <font color="white"><div align="center"><font size="5"><b>It Ain't Easy But Its Possible</b></font></div></font><br/> Look <font color="#FF8C00">hacking</font> in 2025 ain't a walk in the park. It takes skill patience and a shitload of persistence. But if you're willing to put in the work learn the ropes and stay one step ahead there's still money to be made. Just remember its a constant cat-and-mouse game. The defenders are always adapting and so must you. As we continue with this series I will help you turn from a script-kiddie to someone with enough skills to hack your first site.<br/> <br/> <div align="center"><img alt="" border="0" class="bbCodeImage" src="https://i.ibb.co/G4LyfXdn/hacker-pc.gif"/></div><br/> So are you ready to up your game? Or are you gonna stay a <font color="#FF4500">script-kiddie</font> forever? The choice is yours. <img alt="" border="0" class="inlineimg" src="images/smilies/yoba.png" title="Yoba"/> </div> |
All times are GMT. The time now is 08:41 PM. |
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2025, vBulletin Solutions, Inc.