This article is not intended to teach you how to steal credit card data, but we want to tell you that in the future you can terhindari criminal theft of credit card data. Glossary of credit card crime in the usual term "carding" since the existence of hundreds of percent increase internet. Ironically entry in Indonesia in the top 10 (was ranked first) so that a credit card imprint Bank-Bank Indonesia declined when shopping online at sites abroad.
This is also the natural by the author who wish to subscribe to the magazine game overseas with online payment via credit card.
The hacker crime once like this one, why? Because if only nge-hack or deface the website (change display / website links) is something that is not there. And this can be to detection of crimes and can be easily seized if he enter the sites have a Tracker (ip tracking program / link) or LOG FILE (a file that records user activity / ip go to the website). Carding if they can be free without a trace, and sometimes also after the data, they are among the hackers, so it difficult to track the first person to steal credit card data. Genesis recently that terrorist website also register in the carding of the results.
There are several ways that are used by hackers in stealing credit cards, among others:
1. Packet sniffer, it is the fastest way to get any data. The concept works just the program they can see or create files from logging data sent by e-commerce website (online sales) that they drill. In general, they mengincar website that do not have encryption or security sites that do not have good security.
2. Make a spyware program, trojan, worms and the like that act like Keylogger (keyboard loggers, program record keyboard activity) and the program is assigned via E-mail Spamming (put it in a file attachment), Personalization (chat), messenger (yahoo, MSN ), or sites with a particular icon or iming-iming Netter interesting to download and open the file. This program will record all activity to your computer in a file, and will send email to hackers. Sometimes the program can be run directly when you go to a site in a hacker or porn site.
3. Create phishing sites, sites that look similar or the same as the original site. example in Indonesia, when the site click the BCA (www.klikbca.com), had experienced the same thing. the site looks the same as the address klikbca but contrived as some of the different www.clikbca.com, www.kikbca.com, etc., so if the wrong type Netter, akan stray to the site. Fortunately the person who created the site he said does not intend evil. So if a hacker carding a site tuh, siap-siap deh a credit card you designate perforated.
4. Through e-commerce site is directly and steal all of its customers. This is quite difficult and need expert hacker or hackers who have the experience to do so. In general, they use a method of injection (include the script can be run by the site / server) for a site that has a firewall. There are several ways that injection of commonly used HTML injection and SQL injection. For sites that have no security or firewall, ready-prepared dikerjain abis-abisan.
There are a few more ways that the hacker, but way above is the most common hacker is done for carding. Ways that are not public akan described later in the future. Crime does not only happen because there is intention of the perpetrator, but because of the opportunity
Wednesday, April 29, 2009
0 komentar