Ways Hackers steal credit card data This article is not intended to teach you how to steal credit card data, but we want to inform you so that later you can unavoidable from credit card data theft crimes. The terms of credit card crimes commonly termed "carding" since the Internet increased by hundreds of percent. Ironically, Indonesia is in the ranks of top 10 (at the time of the first rank) so that the credit card issue of the Bank-Bank Indonesia rejected when shopping online at sites abroad. It has also been experienced by the author in the game want to subscribe to foreign magazines with an online payment via credit card.
Hackers are very fond of this one crime, why? Because if just nge-hack or deface a website (change the display / website links) is something that it is pointless. And this could be the detection and perpetrators can be easily arrested if he entered the sites, which have a tracker (tracking programs ip / links) or LOG FILE (a file that records user activity / ip go to the website). If carding they can be free without a trace, and also sometimes after getting the data, they spread among hackers so difficult to track the first person to steal credit card data. Recent occurrence of terrorist websites in Indonesia are also registers of the carding.
There are several methods used by hackers in stealing credit cards, among others: 1. Packet sniffer, it is the fastest way to get any data. The concept of work they put enough program that can view or create a logging file from data sent by e-commerce website (online sales) that they seek. Generally, they target the websites that are not equipped with security encryption or sites that do not have good security.
2. Creating a program spyware, trojans, worms and the like which functions as a keylogger (keyboard loggers, program record keyboard activity) and this program is distributed by E-mail Spamming (put the file in the attachment), mirc (chat), messenger (Yahoo, MSN ), or specific sites with the icon or the lure of an attractive netter to download and open the file. This program will record all activity on your computer into a file, and will send it to an email hacker. Sometimes these programs can be run directly when you get into that in a hacker site or porn site.
3. Create a phishing site, which looks the same or similar sites such as the original site. example in Indonesia when the site click bca (www.klikbca.com), have experienced the same thing. the site looks the same as KlikBCA but made some different address as www.clikbca.com, www.kikbca.com, etc., so that the wrong type netter, will stray into those sites. Fortunately people who make these sites he did not mean evil. Now if a hacker who created tuh carding sites, get ready for your credit card deh would burst its banks.
4. Hacking into the e-commerce site is directly and stole all the data of its customers. This method is rather difficult and needs to be an expert hacker or hackers who have the experience to do so. In general they use injection method (insert scripts which can be run by the website / server) for sites that have a firewall. There are several ways injection among other commonly used html-injection and SQL injection. For sites that have no security or firewall, ready-ready-abisan dikerjain abis.
There is more to be done several ways hackers, but the ways above are the most common way a hacker to carding. Unusual ways will be explained later in another time. Crime does not just happen because there is intention of the perpetrator, but because of the opportunity, beware ... beware ...
0 comments:
Post a Comment