goodlisten

Clip

How credit card hackers operate
listen on Spotify
55:40 - 58:10 (02:30)

Cam, a hacker, explains his process of buying and stealing credit card information, including his use of a debugger to search for strings matching a specific algorithm. He also addresses the question of credit card software security in databases.

Similar Clips
Cam's partner had the stolen credit cards while he had the skills to withdraw money from them.
21:11 - 23:04 (01:53)
listen on Spotify
Stolen Credit Cards
Summary

Cam's partner had the stolen credit cards while he had the skills to withdraw money from them. The plan was to cash out and send half the money to the perpetrators in Kosovo.

Chapter
Becoming a "Casher" of Stolen Credit Cards
Episode
85: Cam the Carder
Podcast
Darknet Diaries
The use of Hydra software helped a hacker gain access to credit card information stored in the point of sale systems of a coffee shop, restaurant, bar, and bakery, by exploiting the default usernames and passwords of their remote desktop protocol.
58:10 - 1:01:30 (03:20)
listen on Spotify
Cybersecurity
Summary

The use of Hydra software helped a hacker gain access to credit card information stored in the point of sale systems of a coffee shop, restaurant, bar, and bakery, by exploiting the default usernames and passwords of their remote desktop protocol.

Chapter
How hackers steal credit card information using Hydra
Episode
85: Cam the Carder
Podcast
Darknet Diaries
The guest talks about how he started an early business that deceptively installed credit card processors with help from his friends; he also shares how he develops his skills by figuring out how to deconstruct a new business environment to maneuver himself successfully through it.
09:57 - 11:34 (01:36)
listen on SpotifyListen on Youtube
Business
Summary

The guest talks about how he started an early business that deceptively installed credit card processors with help from his friends; he also shares how he develops his skills by figuring out how to deconstruct a new business environment to maneuver himself successfully through it.

Chapter
Becoming the Top Salesperson in the Payment Industry
Episode
Bryan Johnson: How He Is Getting Biologically Younger, Selling His Company for $800 Million, and More
Podcast
My First Million
True Crypt allows users to apply two passwords to decrypt the same encrypted drive, making it impossible to prove the existence of a secondary password.
2:24:00 - 2:26:18 (02:17)
listen on Spotify
True Crypt
Summary

True Crypt allows users to apply two passwords to decrypt the same encrypted drive, making it impossible to prove the existence of a secondary password. This feature is useful for individuals protecting sensitive corporate data or personal files.

Chapter
Recent Audit of TrueCrypt
Episode
#74: How a Computer Hacker Optimizes Online Dating, Opens Locked Cars, and Hijacks Drones
Podcast
The Tim Ferriss Show
The speaker shares their experience of losing their credit and debit cards during a wild night out and the struggle of keeping track of their cards.
02:20 - 03:03 (00:43)
listen on Spotify
Personal finance
Summary

The speaker shares their experience of losing their credit and debit cards during a wild night out and the struggle of keeping track of their cards.

Chapter
Sending weed through the mail
Episode
Ep 418 - Street Jokin'
Podcast
Matt and Shane's Secret Podcast