Thursday, July 24, 2014

Perfect Money CashBack Hack Leaked

People take a look at this hack

Perfect Money CashBack Hack

http://perfectmoneycashback.blogspot.com

I got this at my mail from a contact. Decided to post this at the blog and you will thank me for a long time.

Friday, July 18, 2014

Use Refund as hacking method

There is a way to "hack" shopping sites using the refund option , but keep in mind this can lead to banned accounts, so be sure you dont attempt this too many times, you know what i mean.

The refund option for items everywhere at internet portals like ebay, amazon, newegg is a good way to get the same item twice if you are smart enough.

For example you say you paid for the item and it was delivered to someone else, someone else signed it so you didnt receive it... that method works 100% the times when you do it the smart way.

Let the package be signed by someone else you dont even know ( fake name ) , claim... say you didnt get the package and ask refund for it... they will of course investigate... but as shipping receiver is a fake name it wont be investigated further. Try to do this for low amount items, max $ 100, only a few times.

This worked out for a lot of people, but again a lot of people got banned so you have to be smart enough when doing it , knowing exactly what to say and how to act when claiming.

People sometimes does this when they are actually scammed from the portal by receiving damaged items too many times in a row, leading to lost time and money at the end.

So this method should be used when you are actually losing money and time from portals that always charges you a lot of money and shipping charges but sometimes they dont deliver in time at all or with the item in correct conditions.

You can attempt this at your own risk. Hope it helps.

Thursday, July 17, 2014

How to not allow hackers get in your social media

This shows how to not allow hackers to get into your social media accounts in easy steps.

1. IMPORTANT: Make your password bombproof. Simple—even medium-strength—passwords mean vulnerability. With your company’s reputation on the line, isn’t it worth taking a few extra measures to build a password of steel? Follow some simple steps to create company social media passwords that are complex, but easy to remember. Also, NEVER save your password on computers you share, or mobile devices you could lose or have stolen. (This means absolutely no more storing passwords on a post-its, spreadsheets or in email.)
2. Know when to hold ‘em: Keep company passwords hidden. Social media has gone mainstream—even in the workplace. What does this mean? Whole teams of staff, from interns to top executives, are now sending out messages from the corporate Twitter, Facebook, or LinkedIn account. Consider implementing a password management solution, like LastPass or KeePass to store, distribute, and manage your organization’s secrets. These systems let you and your team share passwords without actually making them visible.

Another very effective way to reduce the number of passwords floating around is with single sign-on technology, or SSO. The term ‘single sign-on’ might sound complicated, but it’s actually very simple in premise: SSO lets employees log into company social media accounts with the same username and password used for their company email account. This means access to a company’s main social media accounts is kept in the hands of one trusted central administrator, who holds the real “keys,” or passwords, to all social profiles. Similarly, putting employees into teams and giving them different levels of permissions, is another very effective way to keep your company’s social media accounts protected. This will allow administrators to give employees across an organization rights to post content on a social network—without ever giving out the password.

3. Click with caution. Are you sure you know how to spot a malicious link? Spammy links are a common way to hoax or phish in order to compromise social accounts. One sure-fire way to prepare for these potentially dangerous moments is to make sure your team is accessing social profiles through a secure third-party social media platform. Why? If a malicious link is clicked, a tool like the HootSuite dashboard will act as a buffer, giving you a warning so you can protect your valuable company Twitter or Facebook account from being hijacked. Also, this may seem obvious, but don't click on links in emails that tell you to change your social media network’s password.
4. Get your money’s worth. Send out your paid social media messages from a secure platform. Believe it or not, paid social media (like Promoted Tweets and Facebook’s Promoted Posts) is a billion-dollar business trend that is simply skyrocketing in popularity. Why? It works. For example, Promoted Tweets have shown engagement rates that are up to 15 times greater than traditional internet banner ads. So as more and more companies dole out large sums for tweets to promote their brands, it’s essential that they are diving into these products with security as a top priority. After all, what would be worse than dumping tens of thousands of dollars into social media advertising, only to have some hacker come along and with a few inappropriate tweets, ruin the entire investment? Choose and utilize a trusted social media management tool that allows you to buy ads right from within the platform—providing all of the security features mentioned above.
Burger King and Jeep aren’t the first big names to be put through the social media security gauntlet. Remember in 2011 when Fox News’ hacked Twitter account began sending out Tweets announcing that Barack Obama had been shot and killed? Or when, a few months later, NBC’s compromised handle reported an airplane crash at Manhattan’s Ground Zero? Celebrities have also very publicly victimized, like last year’s embarrassing hack into teen pop sensation Justin Bieber’s personal Twitter profile. Twitter hacking will likely be around as long as social media is, but with more businesses than ever using social networks to promote their brands, the need for advanced security and precaution is higher than ever.

Monday, June 9, 2014

ATM Hacking Guide

This article explains one of the known methods in ATM hacking, educational only.

You should know what a Automated Teller Machine (or Automatic Teller Machine or cash machine) which commonly known as ATM is. Yes, ATM is commonly used to access bank accounts in order to make cash withdrawals or credit card cash advances, where after keying in your PIN number, ATM will disburse cash notes to you. You should also know that when you withdraw let’s say 100 dollars, the ATM should dispense 5 USD notes in 20-dollar denomination. But what if now the ATM dispenses 20 20-dollar USD bills instead? It happened not because the bills and notes are not been stocked in correct denomination, but because you can actually make it happens at the ATM cash machines that leave its backdoor opened by not changing default factory administrative passwords and default combinations for the safe.

So what you going to do in order to hack and crack the ATM so that the cash machine will give you more money than it suppose to? It’s unlikely common ATM trickery or fraud scam that uses various high-tech devices to capture identity of your ATM card and PIN number. Firstly, identify the ATM maker and model from the video on news about ATM reprogramming scam fraud at at a gas station on Lynnhaven Parkway in Virginia Beach.

Unable to identify what model of ATM cashpoint is it? Matasano has revealed the brand and model of the ATM to be Tranax Mini Bank 1500 series. So it’s this type of cash machine is possible for hacking. 27B Stroke 6 reported that Triton’s ATMs’ manuals also contains factory default pass-code and backdoor key sequence, although no successful fraud story been reported on Triton’s ATM machines. Matasano also details the step that needed to be taken in order to be able to hack into the ATM for re-programming. That’s to get hold on a copy to Tranax Mini Bank 1500 Series (MB1500) operator manual or installation manual, which contains a lot of security sensitive information includes:
  • Instructions on how to enter the diagnostic mode or operator function menu.
  • Default Master, Service or Operator passwords.
  • Default Combinations For the Safe.
The manual that was found on the web Tranax_MB_Operator_Manual.pdf has been taken down, however, Google should be able to help you with its cache. Inside the Tranax Mini-Bank 1500 user guide manual, you can also learn how to set the denomination of the type of bill (the value of the cash notes i.e $1, $5, $10, $20, $50 or $100) that the ATM’s cassettes will be dispensing. That’s all you probably need to trick the ATM to think that the $20 bills it dispensed are actually of the $5 or $1 bill, possibly earning you a hefty profit. So, the only thing left now if you trying your luck to find an ATM cash machine that haven’t been changed its factory default passcodes and passwords. Tranax has shipped 70,000 ATMs, self-service terminals and transactional kiosks around US, where majority of those shipments are of the flagship Mini-Bank 1500 machine that was rigged in the Virginia Beach heist, according to eWeek.
The ATM scammer in Virginia Beach case successfully to re-program and trick the Tranax MB1500 series ATM to act as if it had $5 bills in its dispensing tray instead of $20 bills, and the withdraw cash using a pre-paid debit card with a 300% profit. However, he forgot to reprogram back the ATM to correct denomination, and the ATM was left misprogrammed for next 9 days before somebody reported the misconfiguration, and hence revealed the fraud.

Friday, May 30, 2014

Know how to hack ATM using dump

If you want to know how to hack ATM using Dump stay tuned to this article i will post soon the tutorial on how to achieve real ATM hacking technique.

Remember it will be only for educational purposes and if you try the methods that will be posted here it is at your own risk.


Wednesday, May 14, 2014

How to get a CVV number from a credit card

This tutorial shows how you can get a CVV number from a credit card if you have all the rest of the information but you don't have the security code.

You can try sites that doesn't verify when you spam the server with too much credit card info attemps.

One of those is PayPal.

You can add a credit card and if everything is correct it will let you add it but you can have the CVV code wrong. Since it is wrong you wont be able to use it until you enter the correct security code.

Just edit the information and start trying different codes. When the one that matchs your credit card information is correct, Paypal will say you have to verify the number they sent to your statement.

So now you have the working CVV number for your detail.

There is another sites that also doesn't verify several info attemps, like Liqpay.

This is only working when you only lack the security code from your detail. A lot of people gets all the rest of the info and they lack the security code. Since they don't know how to get it easily and safe most of times they void the card when trying too much to discover it.

Remember this is only for the CVV code not any other information.

Monday, May 12, 2014

Mobile cell phone chip can be hacked easy when they get old


Why you should care about your mobile phone chip aging.

In any event, any SIM card older than 3 years is at risk. Newer than that, not very likely.
“In enterprises where they’ve recently updated handsets, it’s highly unlikely they’ll be vulnerable,” says Rogers. “The phone is a red herring because people can use old SIMs in new phones and new SIMs in old phones.”
Even for phones that are vulnerable, the process of hacking the SIM card depends on the specific phone itself.
“The vulnerability is tailored to a specific device,” says Dr. Guy Levy-Yurista, Chief Technology Officer at AirPatrol Corporation, a provider of wireless security based in Columbia, MD. “There’s some trial and error on the part of the hacker that would have to happen. It’s really (on) a device by device basis.”
Still, even one device is enough to endanger the security of a company’s entire network. A compromised device could act like a disease vector in an epidemic, spreading malware to everything around it.
“The potential impact for the adversary going after Fortune 500 or government agencies is extremely significant,” says Levy-Yurista. “Smartphones are completely different from PCs. We carry them around everywhere and anywhere, they provide access to all the data that we need and that we use, and they can become a Trojan horse in our pocket that can collect data about everything we’re doing.”
To find phones that may already be compromised, you may want to use mobile tracking and security software such as AirWatch, which should already have SIM card information for enrolled phones. But don’t rely on just one. Mobile device managers are often used by companies to control the settings for all the phones on that company’s network, but it may not be enough.
“Mobile applications are extremely compromisable,” says Tom Kellerman, VP of cybersecurity at TrendMicro, in Cupertino, CA. “Mobile device managers may wipe a device if its stolen, but you’re assuming they’re always secure -- but any hacker can get underneath it and you’re going to assume the device is okay.”
Kellerman recommends the additional use of a mobile application reputation service, such as Veracode, which goes a step further to scan mobile apps to see what kind of information they may be passing along to third parties.
Of course, many of these mobile management systems only apply to phones that the company itself has given out -- but with “bring your own device” policies on the rise, it might not be enough to check only the official devices.
“The biggest blind spot in enterprise is the ability to identify cell phones in an environment even if they’re not on the network,” says Levy-Yurista. “A lot of intrusion systems just look at WiFi connections, but if the hacker turns off the WiFi connectivity and is using the 3G or 4G, many security systems become completely useless.”
Locating every device in a location, even if those devices may or may not be company-issued, requires the use of monitoring not only devices, but data.
A mobile enterprise compliance and security server, such as Mobile Active Defense, works to ensure that data is not leaking outside of a secured network by rerouting traffic going across the selected devices through the security firm’s servers.

Sunday, April 27, 2014

Real Bank Account Hacking

First of all, we have to learn about the manual hacking of ATM MACHINES AND BANKING ACCOUNTS before introducing the software.

Remember this is only for educational purposes.

If you do this beware consecuences.

HOW THE ATM MACHINE WORKS
If you have been to the bank, you find out that the money in the ATM MACHINE is being filled right inside the house where the machine is built with enough security.
To hack this machine manually, get an ATM card, wether valid or not, as long as it can freely enter into the machine. Then get a candle, light the candle and use the wax to cover the panel on the ATM CARD, covering that panel will make the card look defualt to the machine.
Now, go to any Bank near you and try this trick, but if you are caught, thats your own wella ooh! not mine. When you get to the machine, insert the card and enter a default pin which is 0000. Done that? Wait and see the action. The atm machine will dispense cash. But some times the machine would say card not smart or it would just eject your card. The reasons is because some atm machines are upgraded while others are not.
HOW DO I KNOW AN UPGRADED MACHINE
For you to know an upgraded atm machine, you will observe that most times when you use a particular atm machine, as the machine is dispensing the cash, the bank will also send you a debit alert. If the machine is not upgraded, it may take up to 30 minutes before the bank sends a debit alert. The candle trick is 60% efficient on a machine that is not upgrade but it may not work on upgraded machine because of its sensitivity.
THE BANK HACKING SOFTWARE
From our studies on the manual hacking of the atm machine, you will agree with me that its affects the bank alone but using the software affects the individual or organisation that owns the bank account.
HOW THE SOFTWARE WORKS
Like I said, the software is very easy to use, but you need a prepaid debit mastercard and a knowledge on how to hide your browsing ip (your location) on your pc. The money you hack will be sent to your prepaid debit mastercard not your bank account, this is for security reasons but afterwards, you can go to the nearest atm machine close to you and withdraw the money using your mastercard.
NOTE: I advice that you should not use your correct house address on your mastercard billing details to avoid probs for yourself.
Having known this, you download the software, install it, launch it and enter every information required on start. After this, logon to the control panel and click on transfer funds, then you will be brought to a page where you will enter the details of the bank account you want to hack. Details like account name, account number, name of bank, country and zipcode. After entering the informations, click submit and the person’s bank account balance will display, then enter the amount you want and click send to card, the money will be sent to your prepaid debit mastercard.
HOW TO GET THE SOFTWARE
I am currently selling this software at a give away price of $300 to serious minded people. If you need this software, contact me with this email k.han@gmx.us.
NOTE: You must be over 18 years to order for this software and by sending us an email means that you agree to the terms and condition of using this software.
FOR THOSE OF YOU WHO WILL ORDER FOR THIS SOFTWARE, DO GOOD TO DROP YOUR TESTIMONIES AND REVIEWS IN THE COMMENT BOX. And you can also order for order packages I have: Hacdoo(TROJAN) These trojan can steal informations stored in any computer. Informations like email id and passwords. With these trojan I get credit card logins, paypal login, bank logins and other passwords and ids. My hacker friends who sell bank logins, cc and paypal logins will tell you more about these. These trojan costs only $300. You can also buy bank logins and cc and paypal logins from me at cheap rate. These trojan is sophisticated, it do all the job for you. ATTENTION: We are not responsible for any transaction between you and any body advertising any thing on the comment box, the comment box is just there for you to share your reviews after buying any program to clear doubt from other buyer and many users are using the comment box to rip our customers, so you are responsible for any deal between you and any commentor. Thank you
HAPPY HACKING!

Thursday, April 3, 2014

How to Internet Shopping without being tracked


Anonymous purchases are one more step in enhancing your privacy. Making an anonymous purchase can shield your identity, credit card, and give companies very little data about you. Anonymous purchases can withold your identity, and prevent large amounts of fraud. Purchasing items anonymously isn’t only used for criminals and illegal items as perceived by the public. Anonymous purchases are made to shield your identity, and keep your data to you. In this day an age with the N.S.A.and many other data harvesting giants, the least amount of data you give out, the better.

Why do I want to purchase items anonymously?

When purchasing items online, physical or digital, you give out a lot of data. Names, addresses, phone numbers, date of birth, gender, emails, and many other pieces of sensitive information. When you input it into the website, it just disappears and says “Congratulations”, or “Order Received”. You don’t actually see where your data goes. What if the website isn’t trusted, what will they do with that data?  If the website isn’t trusted, can they steal your card data? Or even if the website is trusted, will they sell that information to a third party? Is the data you just entered into that website online kept to them? Many valid questions may circulate when purchasing items online. With so many scams and fraudsters on theinternet, how can you decide if a website is trusted or not?

Why you do want anonymity when purchasing

You may want to shield your credit card data from hackers or unknown websites. You may not feel safe inputting your sensitive information into the website. You may not want an item to show up on a bill of yours. You may want to shield your identity from the internet. or you simply may just want some privacy, or anonymity!

3 ways to purchase physical goods anonymously

 1. Mask Me – Mask Me is a FREE disposable credit card service from the privacy company, Abine. You attach a credit card to their free disposable credit cards and it allows you to make %100 legal purchases online with a masked card. With a masked card you can save your identity, and credit card information. Also, the cards can NEVER be charged without your consent. You choose how much you want to add to a card, and that much will be on the card (you can refill cards or get new ones each time). You can choose to obtain a new card whenever needed. Also, on your credit card statement ALL charges will show up as ABINE,INC. You don’t use any of your real data (you can mask your address and use all of ABINE,INC’s info), and it masks your credit card provider from seeing what you do!
Other method:
Anonymity is very important to many internet users. By having your "e-identity" exposed online, you can be stuck with a number of unwanted issues, such as:
  • Privacy invasion.
  • Internet tracking.
  • Exposure to being hacked.
However, what if we wanted to spend money anonymously? This is actually a hard task when it comes to the internet. To purchase something on the internet, you need to have a debit or credit card. Alternatively, you can use a PayPal account, but that also needs a debit or credit card to activate and use. In real life, we can use cash to purchase something anonymously.
When you purchase something with a credit or debit card, the serial number of the item you bought is stored by the bank for statements and customer purchase records. This means anyone who has access to that information knows what you are purchasing.
Also, if you are using PayPal, you are likely not safe. PayPal uses your real information, and the average person does not use safe practices. Lets say you bought something online, the person you purchased from will have your name and address already. What if your security question is "Mother's maiden name" or "First house"? This information is easy to obtain when your PayPal holds accurate information.
In today's Null Byte, I am going to show you how to get around the anonymous spending dilemma.

Requirements

  • Money for a prepaid debit card (at least 10 dollars will cover cost and put money on the card)
  • A PayPal account with real information and your bank account linked to it
  • Another shipping address (Optional)

Preparation

To do any method of anonymous online spending, we first must purchase a prepaid debit card and activate it. They can be found at any gas station or supermarket.
  • During activiation DO NOT enter your social security number.
  • Pay for the card in cash.
  • Do not register the card with any of your real information, such as address and name.
For added anonymity, you may want to use Tor to anonymize your traffic and spending accounts, not just who is spending the money.

Anonymous PayPal Method

To spend cash anonymously on the net in the easiest, most universal way would be to use PayPal. Let's go through the steps to do it. For this example, lets purchase something from eBay.

Spending

  1. Open up your PayPal account with a fake name, address, etc. Make its information match the fake stuff that you enter when registering the debit card.
  2. Create an eBay account with the same information. This will be your spending and receiving account.
  3. Purchase something on eBay with your new PayPal account, and have it shipped to a friend's house under your fake name (to avoid the question being asked, packages are delivered according to address, not name). 

Receiving

  1. Sell something on your fake PayPal account.
  2. After you receive payment and mail the goods, have your real PayPal and eBay accounts post an ad for a piece of paper.
  3. Sell the paper for the amount of money the goods were sold for to your fake account. This allows for a nice, natural-looking transfer. Anonymous.
You could also invest money into BTC, which is all anonymous.

By Nick Powell

Wednesday, March 12, 2014

PS4 Real Potential explained - Low Level

Everything is new and not much has been explained.This is just a transition. The normal transition any console generation has to do but this one is harder since the PS3 and Xbox 360 generation is still alive and kicking. 

So it will take longer. But expect the real next gen and real PS4 potential to be available in 2015.Thats the date where you will see whats going to happen with the next gen consoles. Most people just likes to talk and do some weird comparisions with PC but its just wrong. 

This is just a hint and from there just wait to see the reality in 2015 and the coming years. 

The PS4 system is the most advanced and complicated custom x86 system AMD has ever created. They said it , but some people ( most people ) just thinks they can laugh out about it with the ¨supercharged architecture¨ thing. 

And for the worse by just looking at todays performance and games , that is just nothing.

The PS4 has got 2x API overload but thats the lower limit.At some situations it can be up to 10x. The PS4 has an APU-HSA, The CPU can help the GPU in situations of extreme loads. Also using the parallelism system and the GDDR5 memory bandwidth for system and video. Something unique in technology for gaming.

So according to this real technological specs it can be said a safe value would be 5x times : 1.84 TFLOP x 5 = 9.2 TFLOPS.

Its know most people will likely laugh about it, but thats just reality. Thats the PS4 raw power most people thinks impossible.

Not only that raw power is real, but the PS4 is using different OS, Drivers and API that doesnt have the PC limitations for its graphics cards and game coding. 


Here comes why the PS4 will be the first x86 machine to be fully programmed at low level aka ¨Direct to the Metal¨ . This means the coding goes straight to te hardware in a direct way.

Any GPU for PC doesnt have the power its supposed to get by looking at the specs ( Teraflops this case ) .

Lets explain this with some reference :

- Nvidia GTX 780TI : 5.04 Teraflops 

- Nvidia GTX TITAN: 4.49 Teraflops

- AMD R9 290X : 5.63 Teraflops

And the ridiculous PC GPU that is being compared with the PS4 power is :

- AMD Radeon HD 7870 : 2.60 Teraflops

But there you have the PS4 with a RAW power of about 9.2 Teraflops or maybe some more. 

But without SOFTWARE and CODING LIMITATIONS. 

Optimization in its glory. DIRECT TO METAL.


By Nick Powell