Advertisement
Guest User

Untitled

a guest
Jan 16th, 2018
202
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.70 KB | None | 0 0
  1. Dumps are used by carders to cloning the real cards and used the clone as the genuine. So,those clones are duplication of the real cards and can be used like the real card. How is this possible?The answer is dump!
  2.  
  3. For new carders, you may always wonder and ask this question: What is DUMPS?.And here is the answer: Dumps are bank data connected to a bank account and encoded in the magnetic strip of the bank cards. So each card is attached to a bank account. The card is a terminal which allows the account owner to access the his account fund without necessity to walk in bank. Cards can be used for ATM or POS system, these are also bank terminals. So if someone get access to the information stored in the magnetic strip of your card then he will has full access to your account and the money saved in it.
  4.  
  5. At this moment you probably think how can someone steal your card information (dump) but I can tell you that this as not difficult to do. Dumps are obtain by skimming, sniffing or hacking. So each and every time you pay with the card you may assume the risk that your card data was stolen.
  6.  
  7. Bank dumps have usual 3 tracks ,but if any of the 3 tracks is correct and in the account are sufficient funds then the card is good to be used and the requested transaction should be approved.
  8.  
  9. Track 1 is the only track of the card which contain the holder name. Carder use to change the name from the track to match with the fake ID’s they have or with the name embossed on the plastic. This track is written with code known as odd parity or DEC SIXBIT. Track 1 format is usually as follows:
  10.  
  11. B5466160081187237^SHORT/JAMES D ^140910100000023001000000415000000
  12.  
  13. START SENTINEL=is 1 character,usual %
  14. FORMAT CODE= a single character,financial cards format code is B
  15. PRIMARY ACCOUNT NUMBER (PAN) =usual is the card number,but not always
  16. FIELD SEPARATOR =financial cards use a single symbol for it which is ^
  17. NAME OF CARD HOLDER=contain 2 until 26 characters
  18. FIELD SEPARATOR= symbol for it is ^
  19. EXPIRE DATE =in format YYMM (year,month)
  20. SERVICE CODE=three characters
  21. DISCRETIONARY DATA=which may contain PIN VERIFICATION KEY (it is not the ATM PIN),card verification value ,CVV
  22. END SENTINEL=is 1 character,usual ?
  23.  
  24.  
  25. Track 2 it is the track developed by the banking industry and it is most important track of a dump. Almost all dumps will work if this track 2 is correct. It is written with a 5 bit-scheme,4 data bits and 1 parity. This track data format is
  26.  
  27. START SENTINEL=is usual 1 character ;
  28. PRIMARY ACCOUNT NUMBER (PAN)=usual the card number
  29. SEPARATOR=usual symbol = is used
  30. EXPIRE DATE=in YYMM format
  31. SERVICE CODE=a three digits code
  32. DISCRETIONARY DATA=which may contain PIN VERIFICATION KEY (it is not the ATM PIN),card verification value ,CVV
  33. END SENTINEL= usual the symbol ?
  34.  
  35.  
  36. Track 3 is virtually unused by the major world wide networks. It was developed by Thrift Saving Industry. Point Of Sales (POS) will not read this track.
  37.  
  38.  
  39.  
  40. SERVICE CODE
  41. The card service code is a 3 digits code present in both track 1 and track 2.Each of the 3 digits o f the code has a meaning and read it together the service code let us know where and how the card can be used
  42.  
  43. If the first digit is
  44.  
  45. 1-card is for international use
  46. 2-card is for international use but has chip
  47. 5-card is for national use
  48. 6-card is for national use but has chip
  49. 7-card is not good for interchange except for bilateral agreements
  50. 9-test card
  51.  
  52.  
  53. If the second digit is
  54.  
  55. 0-card is normal,without restriction
  56. 2-issuer must be contacted via online means
  57. 4-issuer must be contacted via online means except under bilateral agreements
  58. If the last digit is
  59.  
  60. 0-no restriction but PIN is required
  61. 1-no restrictions
  62. 2-card can be used for goods and services payment but not for cash
  63. 3-ATM use only,PIN is required
  64. 4-cash only
  65. 5-card can be used for goods and services payment but not for cash but PIN is required
  66. 6-no restrictions,PIN should be used where is feasible
  67. 7-card can be used for goods and services payment but not for cash but PIN should be used where is feasible
  68. So,your card magnetic strip or/and chip contain all the information to access and operate your bank account. If someone copied your card magnetic strip, that person can use an machine called msr ,magnetic strip reader-writer and write the data from your card in an other card and use the clone as the genuine card.
  69.  
  70. If you think that is hard to copy the magnetic strip to a card, you must know that a simple swipe to a mini msr or the swipe of card in a compromised POS is all the cards need to get the data from your card and so the access to you account. So you should always pay attention when you make a payment with the card.
  71.  
  72. These are the general information about dumps guys. Stay safe and good luck
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement