What are logs and how to make money on them

Lord777

Professional
Messages
2,578
Reaction score
1,532
Points
113
Hello to everyone, dear friends!
Today we'll talk about logs, tell you what it is and what they eat with. We will show you how we make money on them and how you can make money!
Let's go!

- Does Carders teach this?
- Yes, they do. They provide you with some of the top stealers, help with setup, installation and whatever else you might need.

Well, we continue!
To begin with, let us remind you that this article was written for educational purposes. We are not responsible for any possible harm caused by the materials of this article.

What are logs and how to work with them?
Log is data from the CH computer, which contains cookies, passwords, information about hardware, IP, as well as files from the desktop.

An example of a log from the AzorUlt stealer:
cc5803a0-dee1-4a22-882c-7151a0df41c0.png

This is how the log looks like. From different stealers, the logs may look different, but the meaning is about the same. The date indicated on the log is the date when the upload to the panel occurred. Thus, when buying logs, by opening this file at the initial stage, you can understand its limitation period. Usually conscientious sellers sell logs with a maximum of 3 weeks - a month. If the date is quite old, then the log is considered to be of poor quality.

The main task in working with the log is picking it. In general, the logs contain enough information that is suitable for various purposes. This is a personal matter for everyone who likes to work with what. You can engage in blackmail, drive in, you can steal someone else's accounts, and then ask for a ransom for them, you can work with crypt, with exchanges, with cold wallets, with eBay, Amazon accounts, etc.

You are limited only by your imagination.

In general, the most important thing in working with logs is for the system to perceive us as its own person . I use a simple and accessible bundle when working, namely Chromium + editthiscoockie + webrtc + VPN + useragent. Currently I use Windscribe and IP Vanish as VPN. Often the IP doesn't mean much to us, you can use any one, the main thing is that he doesn't have black metal. But with individual countries, you need to be more selective, for example, when working with a stick, it may be desirable to adjust for a zip CH, or take a clean sock.

The main requirement in working with logs is not passwords, as many people think, but the presence of cookies. With cookies, you can get the most out of it.

Where can I get the logs?
There are several options for obtaining logs. The first and easiest one is to buy them.
The prices, of course, are different. There are logs for $0.2 apiece, and there are also $ 20.

The price of a log depends on its quality, country, as well as the services that are inside.
The US logs are the most expensive. Why? Due to the fact that there are a huge number of banks and active PayPal accounts. Logs, which cost 20p, most often without a sample, and basically there is all sorts of rubbish, like social. nets or toys, but maybe you get lucky.

dcfe760f-af30-4f21-bbea-3a92371c7e0a.png

For example, when buying a log with a PayPal account, it is important to check not only the presence of a password for it, but also whether it is in the cookies. We check it with a regular search in a textbook with cookies, at the request of PayPal.

If there are lines and more than one, then this log is considered good.

Xv2nO0g.jpg

This is what a normal log looks like

If there is a line with the phrase "login_email", as in this case, PayPal will give us the mail we need automatically. This can be useful, since it often happens that the owner has a bunch of mails, but we do not have a password or login to PayPal. With such a log,

Having received at least a login, we can try to pick up a password from the account that we have.
Also, due to such a number of cookies, PayPal's antifraud treats us more favorably, and can give us something to hammer in without first pumping it.
What else do you need to know about the purchased log? Whether it was sold in 10 hands. The simplest check is via mail. First of all, we embed cookies into the browser and stamp on the owner's mail.
In the case of Gmail mail, you just need to check the logs in it. We wind the mail to the very bottom and press the "Details" button.

2VXS8QS.jpg

A window with the latest activities in the mail will open for us. Thus, you can understand if there were other extraneous logs besides ours.

bg4sImK.jpg

This is a good log

By IP and country, you can understand that over the past 3 days, there was no one on the account except me and the owner. In addition, you can see the letters in the basket, otherwise you never know, someone has already tried to "break" it. Running a little ahead, I will say right away that the owner does not receive any notifications about third-party logging, coz the system took us for its own person, because we had cookies.

Great, now that you have a whole log with cookies and passwords in hand, you can start working.

The second option for obtaining logs is your own stealer / botnet with a loader function.

IT IS THE SECOND OPTION WE WILL TEACH YOU IN OUR CARDING FORUM.

Having your own stealer, you do not have to worry that someone managed to pick your log. How can stealers differ from each other? Their functionality. Good stealers steal passwords from Firefox and Chrome, they have a form grabber setting (steals files from the desktop), and they also look for crypto wallets - wallet.dat.

When buying your own stealer, you need to take care of hosting - free or cheap ones will not last long, which is why there is a risk after the spill to be left with nothing, because your panel will simply fly off / be blocked and you will say goodbye to your logs. Therefore, you can either purchase a stealer on a ready-made bulletproof hosting, such as Nocturnal, or you have to install the panel on a suitable hosting yourself.

AKbzCej.jpg

DzOsqj8.jpg

This is what the Arkei panel looks like

YRIIeHb.jpg


In the meantime, there is no need to know about it.
As we can see from the above examples, the stealer panels look about the same. Content of passwords, logs in general, countries / ip, wallets, data from CC, files, etc.
How can we get the coveted logs into our panel? There are 2 options. Buy installations (installations of our virus), or distribute it yourself.
When purchasing installations, we receive logs in a predetermined quantity.

The main rule is 1000 installations - NOT EQUAL 1000 LOGS!

In general, what the kick is important is, and the kick depends on many factors. From the crypt (masking) of our file, from setting up the grabber form, etc. If we want to cover everything that is possible, then the response can be 20%, I checked it myself.

Usually, when buying 1000 installs, the average feedback will be about 70-80%, i.e. in the panel we will have 700-800 logs. But that's not all! Some of them may be empty, some of them may only contain cookies, some with 1-2 passwords, and this is absolutely normal. Ultimately, there can be about 250-300 fatty good logs.

Consider the distribution option yourself. You can just shove our encrypted .exe under the guise of cheats (school students)), or the latest program for something. After installing and running the stealer, the result will be displayed in the panel in the form of the same log. In addition, you can order the combination of your stealer with a real program, then our file will not raise any suspicions.

Distribution, as it is already clear, can be done on forums, on YouTube, on torrents, in VK. That with the first, that with the second option, the result will be the same - getting logs. But it is clear that, for example, when distributing in VK, you can not remember about quality.

How we made $ 10000
On a simple sale of logs, I was too lazy to pick them myself.
And we will earn more, because we have not squeezed all the juices from our logs yet :)

10000 $ are already sold by us accounts:
  • PayPal - 460 pcs.
  • eBay - 830 pcs.
  • Amazon - 270 pcs.

The full information in the article here:
 
Top