Advertisement
Guest User

Untitled

a guest
Dec 8th, 2019
864
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.59 KB | None | 0 0
  1. Guide
  2.  
  3. Hardware needed:
  4. -1 computer, 2 recommended
  5.  
  6. Software needed:
  7. -macOS or Windows
  8. -Firefox
  9. -VPN
  10. -Virtual Machine
  11. -Proxy software
  12. -CCleaner
  13.  
  14. Additional items needed:
  15. -Full
  16. -Socks5 Proxy
  17. - $60-$100 in BTC
  18.  
  19. Let me perfectly clear before we begin. Never use any bit of real information. EVER. Not phone numbers, email addresses, names, pictures, usernames that you’ve already used, nada. Zilch. Security is your best friend and your worst enemy. You want to have fail safes set in place and have a plan for what would happen in certain scenarios.
  20.  
  21. First off you will need a notebook of some sort. Composition notebooks work very well for this. You don’t wanna write anything down in your phone or anywhere electronic as it poses a big risk if you ever need to destroy evidence or if you where to ever be hacked. In this notebook you should write down all email addresses and passwords associated with any account you have made. Always use very strong randomly generated hashed passwords that are >=15 characters and never use the same password/ username/email for anything ever.
  22.  
  23. Your gonna wanna have a burner computer, something not tied to your name at all that you can easily dispose of/replace. Need I say this? Don’t use the burner computer for anything not business related period. You got two options for getting this burner. Option 1: Raspberry pi. Raspberry pi’s work great for this because you can install kali Linux and keep a persistent drive on electrum which is a bitcoin wallet. This essentially makes your raspberry pi double as a physical bitcoin wallet, and it’s saved on the micro sd so if you ever needed to dispose of your burner computer just take out the micro sd, smash the pi, and then keep the sd safe so you don’t loose your BTC. Option 2: buy a used laptop on Craigslist/let go/OfferUp. No receipt, no paper trails, no stress. Always cover your camera if you have one, RATS are crawling around the internet and you don’t know what red hat hacker might choose you as his target.
  24.  
  25. The OS of your burner computer doesn’t matter, but I like to use kali Linux since it’s made for offensive security/penetration testing and has a lot of tools to keep yourself hidden. You won’t need to use a vm when you source your product.
  26.  
  27. The computer your actually buying things with, we will call this your “source”. You want the source be a simple OS that is used by “normal people” ie your grandma, my parents, people who know nothing about technology. Think Windows/macOS because it’s not very tech oriented and is made to be extra user friendly. You could really use any computer for this, so long as it can run a vpn with socks5 proxies and a virtual machine
  28.  
  29. Download Firefox, a VPN of your choice, a Virtual machine if your on Linux, and CCleaner
  30.  
  31. Your gonna wanna download BRD wallet to your phone. This will be your main wallet. Never use real information ever. Fake everything. They don’t verify anything, just make sure you write it down in your journal.
  32.  
  33. Never buy bitcoin from a website like coinbase. Ever. At least not if your planning to do anything illegal with it. All blockchain transactions are recorded and this allows for the trace of your bitcoin.
  34.  
  35. Use a bitcoin atm instead. It’s cash to bitcoin which is always the safest and most secure. Use Bitcoin ATM Map – Find Bitcoin ATM, Online Rates to find kiosks near you. This website also allows you to check the fee of each atm. Always put in 20-30% more than you wanna spend, since bitcoins price tends to fluctuate very volatility in the recent months. Send that money to your BRD wallet that way you can wash the money before sending it directly to your fraud related wallet.
  36.  
  37. Using your source computer, the non burner, go to 911.gg and buy the voucher for 150 proxies which costs $22 USD. They only accept bitcoin. Once you buy the proxies and make your account, again using fake information for everything. You won’t be able to download the software until you pay for the proxies, and when u do pay for them they give you the vouchers. So let’s say your target is in India, you cash in a voucher and choose the location down to the zip code of your proxy. This is why you wanna buy fullz with addresses, so you can link the proxy with the right location. Their cardholder won’t think much of them buying something from their city but if your all the way across the globe then it creates some confusion.
  38.  
  39. Now open up your burner, launch your vpn, head over to bingodumps.com go to cc and buy a card. Not a prepaid, a normal card. Write this down in your journal never take a picture or save it electronically.
  40.  
  41. Now that you have everything you need, using your source computer with the non sketchy os, connect your proxy to the as close as possible to the target.
  42.  
  43. Websites like amazon and eBay can see your OS/IP and if they see anything odd for example not windows or Mac OS, time zones not matching up , etc, it gets flagged as suspicious.
  44.  
  45. Match your computer have the same time zone as your target. For example if you are in PST and your victim is on the east coast, set your computers internal clock ahead 3 hours to match the timezone. If your in Sacramento and your victim is in New Jersey, match your computers time to New Jersey time. This is because websites can check to see what your computers internal time is, and match it to your IP to see if your trying to spoof your location. If they don’t line up the card will be declined and burned forever because the bank will call the cardholder and report a fraudulent transaction.
  46.  
  47. Use a website like http://www.ip-score.com/ and https://whoer.net/ to see if your posing any flags to websites and to check to make sure you are indeed anonymous/spoofing your location correctly.
  48.  
  49. Head over to amazon.com and create a new account using the cardholders name and create a fake email. Tempmail usually doesn’t work so just create a new gmail account. Save this account information.
  50.  
  51. Link the card to the account, and add a shipping address with the cardholders information. This is because amazons security is very good and creating a new account with only one address not even near the account holders billing address leaves big suspicion.
  52.  
  53. Next browse around on amazon like your searching for presents or something. Just shop like a normal person would for something, reading reviews, clicking on things, reading descriptions etc. Try “gifts for teens” or “electronic gifts” etc. Do this for maybe half an hour to an hour, then if you know what you want to get look it up and spend time looking at the different pages and make it seem like your actually analyzing the different offers. Add the one you want to your cart, then do some more shopping for maybe 10 mins and close the app and don’t login for another 8-12 hours.
  54.  
  55. After this grace period, order any item with to the billing address for your first order. Do an order you know will take a long time to arrive like Chinese electronics or anything from China really because shipping takes at minimum a week. After you order something to the billing address, wait another day before ordering your desired item. Don’t go crazy and buy 10 things just get 1 or 2 iPhones or a computer and some TVs. you can now go ahead and buy what it is you wanted to buy. Add a new address, this one being the one you will have your items shipped to. Make it have the same last name with any first name. Then when checking out, select “this is a gift” and write something in the note like “Happy birthday [insert name used on address]! We miss you and can’t wait to see you!” but make sure you ship to a secure address like a drop house.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement