Recent content by Helski

  1. Helski

    Attacking contactless cards [Part 4]

    Contactless bank cards are very convenient: I put the card to the terminal, and after a couple of seconds the phone rang in my pocket - the purchase was paid. But this convenience has a downside: attackers can steal money from the holders of such “plastic”. Let's talk about ways to hack bank...
  2. Helski

    Attacking contactless cards [Part 3]

    How chip card attacks work Almost all modern bank cards are equipped with a chip, which stores the information necessary for payments. In today's article, I will talk about the methods of fraud with such cards, as well as the methods used by banks to counter carders. CHIPOVOE LEGACY Hidden...
  3. Helski

    Attacking contactless cards [Part 2]

    How hackers steal money from bank cards Hidden content THE MOST COMMON TYPES OF FRAUD Let's start with attacks that payment systems and banks have to deal with on a regular basis. Payments without 3-D Secure Hidden content What is 3-D Secure Hidden content Attack of the clones Hidden content...
  4. Helski

    Attacking contactless cards [Part 1]

    You probably have several cards of international payment systems in your wallet, such as Visa or MasterCard. Have you ever wondered what algorithms are used in these cards? How secure are payments? We pay with cards every day, but we know very little about them for certain. Even more myths...
  5. Helski

    Email crawler tool

    Hidden content
  6. Helski

    Mask Phishing URL's

    There are a few great ways to obfuscate url's, one of my favourite is using unicode (see here for an interesting write-up): Hidden content The masking method I am going to link to today is a bash script to hide phishing URL under a normal looking URL (google.com or facebook.com). Useful if you...
  7. Helski

    FiercePhish - Blackhat Phishing Template

    FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more. The features will continue to be expanded and will include website spoofing, click tracking, and extensive...
  8. Helski

    [Free] Flash Update Page (Fake Template)

    Let me start off by saying - "I know this is outdated today". It is, but there are still fool people all around who still fall for this one. I made this fake "Flash Update" dialog site a while ago. At the moment of making it I made a 1:1 copy of the original dialog. Actually, I found it by...
  9. Helski

    Calling with number spoofing / Caller ID Spoofing

    There are quite often situations that you need to call somewhere and so that our interlocutor gets the phone that we need. There are a lot of examples here, we want to push the pack, are you doing a Nigerian scam, or you just need to confirm the transfer of sticks by phone, and so on and so...
  10. Helski

    SCAMPAGES — EMAIL OR TELEGRAM BOT RESULT

    This topic will be a little bit about whether you prefer to send the results to the Telegram bot and eventually to one via Telegram, or send via the C-Panel webmail. Telegram Bot ? A Telegram bot is responsible for all sorts of things, including using an API. Many users create useful bots...
Top