Advertisement
Guest User

Untitled

a guest
Mar 8th, 2018
6,008
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.80 KB | None | 0 0
  1. Dumps cash out & What is a dump
  2.  
  3. What is dump and how to cash out dumps.
  4.  
  5.  
  6. Hi. Today carding is known everywhere in the world. If you want to understand how the carding works you’re in the right place.
  7.  
  8.  
  9. Dumps are used by carders to clone real cards and then use the clones as the genuine. So, those clones are duplication of the real cards and can be used like the real cards. How is it possible?
  10. The answer is Dump!
  11.  
  12. So what is dump? And here is the answer. Dump is a bank data connected to a bank account and encoded to the magnetic strip of the bank card. So each card is attached to a bank account. The card is a terminal which allows the account owner to access his account fund without necessity to walk into the bank. Cards can be used with ATM or POS, this are also bank terminals. So if someone gets access to the information stored in the magnetic strip of the card then he has full access to the owners card account and the money saved in it.
  13.  
  14. That is not difficult to steal a dump from the card. Dumps obtained by skimming, sniffing or hacking. So each and every time a person pay with the card he or she assume the risk that the card data could be stolen.
  15.  
  16. Bank dumps have usual 3 tracks, but if any of the 3 tracks is correct and there is a sufficient quantity of funds on account then the card is good to be used and the requested transaction can be approved.
  17.  
  18. Track 1 is the only track of the card which contains the holder name. Carder use to change the name from the track to match with the fake ID's they have or with the name embossed on the plastic. This track is written with code known as odd parity or DEC SIXBIT. Track 1 format is
  19. B5466160081187237^SHORT/JAMES D ^140910100000023001000000415000000
  20.  
  21. START SENTINEL = is 1 character, usual %
  22. FORMAT CODE = a single character, financial cards format code is B
  23. PRIMARY ACCOUNT NUMBER (PAN) = usual is the card number, but not always
  24. FIELD SEPARATOR = financial cards use a single symbol for it which is ^
  25. NAME OF CARD HOLDER = contain 2 until 26 characters
  26. FIELD SEPARATOR = symbol for it is ^
  27. EXPIRE DATE = in format YYMM (year, month)
  28. SERVICE CODE = three characters
  29. DISCRETIONARY DATA = which may contain PIN VERIFICATION KEY (it is not the ATM PIN),card verification value ,CVV
  30. END SENTINEL = is 1 character, usual ?
  31.  
  32. Track 2 it is the track developed by the banking industry and it is most important track of a dump. Almost all dumps will work if this track 2 is correct. It is written with a 5 bit-scheme, 4 data bits and 1 parity. This track data format is
  33. START SENTINEL = is usual 1 character ;
  34. PRIMARY ACCOUNT NUMBER (PAN) = usual the card number
  35. SEPARATOR = usual symbol = is used
  36. EXPIRE DATE = in YYMM format
  37. SERVICE CODE = a three digits code
  38. DISCRETIONARY DATA = which may contain PIN VERIFICATION KEY (it is not the ATM PIN), card verification value, CVV
  39. END SENTINEL = usual the symbol ?
  40.  
  41. Track 3 is virtually unused by the major world wide networks. It was developed by Thrift Saving Industry. Points Of Sales does not read this track.
  42.  
  43. SERVICE CODE
  44.  
  45. The card service code is a 3 digits code present in both track 1 and track 2. Each of 3 digits of the code has a meaning and reading this digits together as a service code let us know where and how the card can be used.
  46.  
  47. If the first digit is:
  48.  
  49.  
  50. 1-card is for international use
  51. 2-card is for international use but has chip
  52. 5-card is for national use
  53. 6-card is for national use but has chip
  54. 7-card is not good for interchange except for bilateral agreements
  55. 9-test card
  56.  
  57. If the second digit is:
  58.  
  59. 0-card is normal, without restriction
  60. 2-issuer must be contacted via online means
  61. 4-issuer must be contacted via online means except under bilateral agreements
  62.  
  63. If the last digit is:
  64.  
  65. 0-no restriction but PIN is required
  66. 1-no restrictions
  67. 2-card can be used for goods and services payment but not for cash
  68. 3-ATM use only, PIN is required
  69. 4-cash only
  70. 5-card can be used for goods and services payment but not for cash but PIN is required
  71. 6-no restrictions, PIN should be used where is feasible
  72. 7-card can be used for goods and services payment but not for cash but PIN should be used where is feasible
  73.  
  74. So, the card magnetic strip or/and chip contain all the information to access and operate a bank account connected to this card. If someone copied a card magnetic strip, that person can use a machine called MSR, Magnetic Strip Reader-Writer and write the data from the card to another card and use the clone as the genuine card.
  75.  
  76.  
  77. If you think that it is hard to copy the magnetic strip to a card you must know that a simple swipe to a mini MSR or the swipe of card in a compromised POS is all the carders need to get the data from the genuine card and get the access to the card owners account. So it’s easy to start the business.
  78.  
  79.  
  80.  
  81. Be aware of police and have a good luck and lots of $$$.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement