Real talk about EMV cloning (aka selling ice to Eskimos)

crisiswhatcrisis

Director of Pussy Control
Premium
Joined
16.01.21
Messages
16
Reaction score
31
Points
13
Let me make the following statement clear as a fucking bell:

———
Creating a FUNCTIONAL, physical clone of an EMV card is not possible, for a whole fuck-ton of reasons.
———​

It seems so simple, doesn’t it ladies? Just buy a 201 dump, run any of your trusty hi-co cr80 trashsquares through ye olde MSR, and voilá, right?

Maybe you’re more enlightened after some cursory perusal of forums like this and you think you know what the fuck you’re doing, right? Maybe you have an Omnikey 3121, some bullshit Java cards you paid way too much for, and that flaming turd of a virus dropping app that someone sold you in a bundle of other slick looking malware slingers - ooh, be still my quivering terminal!

Both of you kind of fucksticks are deficient in the sort of knowledge that keeps you thirsty for breaking even on your “investment” in this business, and even if you do break your ass free from the hypnotic seduction of your ignorance, unless you educate yourself about the technology you are up against you will continue to be fodder for the cretins below you, present company excluded of course.

SO WHY THE FUCK CAN’T IT BE DONE, HERR PROFESSOR?

Well, I am so very happy you asked, trog! If you wouldn’t mind mopping up your droolpuddle while I regale you and your friends here, I shall gladly do so:

REASON NUMBER ONE:
When you DIP THAT CHIP, a super complicated series of shit happens - the order of which is controlled by SOMETHING YOU HAVE NO CONTROL OVER: the payment terminal itself. But guess what? Essential transaction information like the card number, expiration date, discretionary data, et cetera - NONE of that shit gets transmitted between terminal and processor, processor and acquiring bank, issuing bank and acquiring bank, I mean for fucks sake, not even the goddamn name on the front of the card, BEFORE this one critical step happens.

What step? FUCKING CRYPTOGRAPHIC KEY IDENTIFICATION AND EXCHANGE, between the TERMINAL and the little bitty fucking tiny ass chip under those gold finger bits. Terminal says HEY BABY I HEAR YOU LIKE KEYS, and finger-bangs that little bitch chip a little til it gives up its public key, which the TERMINAL then replies with its own public key, and once the chip and the terminal have secure communications, the TERMINAL asks the chip some dirty questions about how it likes to get down, and as the two chat it up about how it likes to give and take, they also swap transaction keys… Just like the public keys earlier, but they change, and depend on the private key for the issuing bank, which is generated on the fly based on deep voodoo crypto shit stored one-way in the chip, and the private key assigned to the TERMINAL by the merchant processor.

Once ALL THAT IS DONE, in the blink of a fucking eye, once the TERMINAL and the chip can talk securely, does ANY of the fucking payment shit get shot back and forth. All of that shit is also cryptographically signed and encrypted - USUALLY but there ARE some mostly useless exceptions - some NFC for one, more on this later - and so even out of the gate, for a successful EMV clone operation you have to have possession of the cryptographic keys that you cannot read the actual values of, not even with Super CardPeek XTREAMedition. The functions do not exist, and attempting to read those locations low level directly will fail because again, THE IMPORTANT BITS are generated on the fly - this is the ATR shit you hear EMVfagUk and the other ice-vendors talk about.

TL;DR? You have no control over the sequence of events that result in a transaction, successful or not, thus you cannot capture the data needed to do it manually, except by capture and playback of packets sent back and forth. Yes, sequence prediction and replay attacks notwithstanding - i challenge anyone who does MiTM style replay attacks on legit straight EMV transactions using hardware terminals and a legit merchant processor to SHOW ME THE MONEY. No? Know why? Because you can’t.

REASON NUMBER TWO:
If EMV cloning were possible, then some Russians would have been doing it twenty years ago when chip and pin was introduced in Europe, leading to what I can only estimate to be the simultaneous destruction of the Eurozone and the incredible post-Soviet rebirth of the Russian economy - both of which did not happen, leading us to the third and final,

REASON EMV CLONING IS NOT POSSIBLE:

If it were, then nobody would be selling software bundles, Java cards or Omnikey 3121s for the low ass prices you find. HID reader writer availability would dry up tighter than your mom’s pussy after a facelift. There would be more lucrative money to be had with making the clones and using them than would EVER be made otherwise, and the price of 201 dumps would skyrocket higher than pigeon tits.

in fact, were it possible to clone and use an EMV card, we would all likely be so broke that just the scent of the cologne worn by all the Russian mobsters who would control it would cost a young white pretty little whore’s whole year of wages in solid gold fucking bars to even get a whiff downwind.

SO WHERE IS ALL THE MONEY IN IT?

Elementary, my little Eskimos! In selling all of you little bushbabies ALL THE ICE YOU CAN DOWNLOAD !

Do the math, rugrats.

CLASS DISMISSED, GOODNIGHT LADIES!
 

crisiswhatcrisis

Director of Pussy Control
Premium
Joined
16.01.21
Messages
16
Reaction score
31
Points
13
CONSIDER THIS HOMEWORK FOR EXTRA CREDIT:

How the fuck do EMV cards work? A guide written by the people who actually came up with the shit (relax, its a fucking PDF


hell, in fact, just roll another doobie, go to emvco.com and click on the link in the top that says EMV® TECHNOLOGIES. Yeah, there’s a fuckin ® in that shit, cause EMVCo LLC own the trademark.

Read to your heart’s content. Or till your brains ooze out of your ears cause its BORING ASS SHIT but just like in high school (for those who weren’t macking on middle schoolers or blowin down doobies with the ceramics teacher in the kiln room) KNOWLEDGE comes from BORING SHIT until you USE IT.

NO QUIZ TOMORROW, TEN POINTS FOR ANYONE WHO BRINGS ME BROWNIES.
 

The REAL Reo

Premium
Joined
28.08.21
Messages
35
Reaction score
21
Points
8
Let me make the following statement clear as a fucking bell:

———
Creating a FUNCTIONAL, physical clone of an EMV card is not possible, for a whole fuck-ton of reasons.
———​

It seems so simple, doesn’t it ladies? Just buy a 201 dump, run any of your trusty hi-co cr80 trashsquares through ye olde MSR, and voilá, right?

Maybe you’re more enlightened after some cursory perusal of forums like this and you think you know what the fuck you’re doing, right? Maybe you have an Omnikey 3121, some bullshit Java cards you paid way too much for, and that flaming turd of a virus dropping app that someone sold you in a bundle of other slick looking malware slingers - ooh, be still my quivering terminal!

Both of you kind of fucksticks are deficient in the sort of knowledge that keeps you thirsty for breaking even on your “investment” in this business, and even if you do break your ass free from the hypnotic seduction of your ignorance, unless you educate yourself about the technology you are up against you will continue to be fodder for the cretins below you, present company excluded of course.

SO WHY THE FUCK CAN’T IT BE DONE, HERR PROFESSOR?

Well, I am so very happy you asked, trog! If you wouldn’t mind mopping up your droolpuddle while I regale you and your friends here, I shall gladly do so:

REASON NUMBER ONE:
When you DIP THAT CHIP, a super complicated series of shit happens - the order of which is controlled by SOMETHING YOU HAVE NO CONTROL OVER: the payment terminal itself. But guess what? Essential transaction information like the card number, expiration date, discretionary data, et cetera - NONE of that shit gets transmitted between terminal and processor, processor and acquiring bank, issuing bank and acquiring bank, I mean for fucks sake, not even the goddamn name on the front of the card, BEFORE this one critical step happens.

What step? FUCKING CRYPTOGRAPHIC KEY IDENTIFICATION AND EXCHANGE, between the TERMINAL and the little bitty fucking tiny ass chip under those gold finger bits. Terminal says HEY BABY I HEAR YOU LIKE KEYS, and finger-bangs that little bitch chip a little til it gives up its public key, which the TERMINAL then replies with its own public key, and once the chip and the terminal have secure communications, the TERMINAL asks the chip some dirty questions about how it likes to get down, and as the two chat it up about how it likes to give and take, they also swap transaction keys… Just like the public keys earlier, but they change, and depend on the private key for the issuing bank, which is generated on the fly based on deep voodoo crypto shit stored one-way in the chip, and the private key assigned to the TERMINAL by the merchant processor.

Once ALL THAT IS DONE, in the blink of a fucking eye, once the TERMINAL and the chip can talk securely, does ANY of the fucking payment shit get shot back and forth. All of that shit is also cryptographically signed and encrypted - USUALLY but there ARE some mostly useless exceptions - some NFC for one, more on this later - and so even out of the gate, for a successful EMV clone operation you have to have possession of the cryptographic keys that you cannot read the actual values of, not even with Super CardPeek XTREAMedition. The functions do not exist, and attempting to read those locations low level directly will fail because again, THE IMPORTANT BITS are generated on the fly - this is the ATR shit you hear EMVfagUk and the other ice-vendors talk about.

TL;DR? You have no control over the sequence of events that result in a transaction, successful or not, thus you cannot capture the data needed to do it manually, except by capture and playback of packets sent back and forth. Yes, sequence prediction and replay attacks notwithstanding - i challenge anyone who does MiTM style replay attacks on legit straight EMV transactions using hardware terminals and a legit merchant processor to SHOW ME THE MONEY. No? Know why? Because you can’t.

REASON NUMBER TWO:
If EMV cloning were possible, then some Russians would have been doing it twenty years ago when chip and pin was introduced in Europe, leading to what I can only estimate to be the simultaneous destruction of the Eurozone and the incredible post-Soviet rebirth of the Russian economy - both of which did not happen, leading us to the third and final,

REASON EMV CLONING IS NOT POSSIBLE:

If it were, then nobody would be selling software bundles, Java cards or Omnikey 3121s for the low ass prices you find. HID reader writer availability would dry up tighter than your mom’s pussy after a facelift. There would be more lucrative money to be had with making the clones and using them than would EVER be made otherwise, and the price of 201 dumps would skyrocket higher than pigeon tits.

in fact, were it possible to clone and use an EMV card, we would all likely be so broke that just the scent of the cologne worn by all the Russian mobsters who would control it would cost a young white pretty little whore’s whole year of wages in solid gold fucking bars to even get a whiff downwind.

SO WHERE IS ALL THE MONEY IN IT?

Elementary, my little Eskimos! In selling all of you little bushbabies ALL THE ICE YOU CAN DOWNLOAD !

Do the math, rugrats.

CLASS DISMISSED, GOODNIGHT LADIES!
lol, you sir are insane. I love it
 

KonKardur

Premium
Joined
01.03.22
Messages
40
Reaction score
2
Points
8
Great to bring that into light, it's not magic , just commen sense
 

crisiswhatcrisis

Director of Pussy Control
Premium
Joined
16.01.21
Messages
16
Reaction score
31
Points
13
Hm. And what is about the prilex group?
What about it? You must be one of those mushmouth Brazilians who captions the porn I watch with stupid keywords in Portufuçaõguêse like “novinho”, because the only place prilex has ever been a danger in the wild is fucking Brasil - yea, I said it RIGHT, Brasil, cause hablo español y j’en parle français & your language is an abuse of the human mouth and Rio is the dirtiest and sexiest terror of a city I have ever fucking been to - both during and after your week long orgy of murder and music greased up with jizz and paint and blood and sweat. Best party ever, would go again, A++++.

Back to your pussy ass attempt to derail my thread, tho. So prilex’s emv “clone” shit isnt cloning, its a fucked up man in the middle gambit that only works because Brasilian banks had a problem with full EMV compliance and most transactions fall back to using magstripe data since the issuer private keys werent the right length, etc etc.

You other toads can read more from Kaspersky or the usual data feeds.

GOODNIGHT, LADIES.
 
Joined
16.09.22
Messages
13
Reaction score
10
Points
3
Let me make the following statement clear as a fucking bell:

———
Creating a FUNCTIONAL, physical clone of an EMV card is not possible, for a whole fuck-ton of reasons.
———​

It seems so simple, doesn’t it ladies? Just buy a 201 dump, run any of your trusty hi-co cr80 trashsquares through ye olde MSR, and voilá, right?

Maybe you’re more enlightened after some cursory perusal of forums like this and you think you know what the fuck you’re doing, right? Maybe you have an Omnikey 3121, some bullshit Java cards you paid way too much for, and that flaming turd of a virus dropping app that someone sold you in a bundle of other slick looking malware slingers - ooh, be still my quivering terminal!

Both of you kind of fucksticks are deficient in the sort of knowledge that keeps you thirsty for breaking even on your “investment” in this business, and even if you do break your ass free from the hypnotic seduction of your ignorance, unless you educate yourself about the technology you are up against you will continue to be fodder for the cretins below you, present company excluded of course.

SO WHY THE FUCK CAN’T IT BE DONE, HERR PROFESSOR?

Well, I am so very happy you asked, trog! If you wouldn’t mind mopping up your droolpuddle while I regale you and your friends here, I shall gladly do so:

REASON NUMBER ONE:
When you DIP THAT CHIP, a super complicated series of shit happens - the order of which is controlled by SOMETHING YOU HAVE NO CONTROL OVER: the payment terminal itself. But guess what? Essential transaction information like the card number, expiration date, discretionary data, et cetera - NONE of that shit gets transmitted between terminal and processor, processor and acquiring bank, issuing bank and acquiring bank, I mean for fucks sake, not even the goddamn name on the front of the card, BEFORE this one critical step happens.

What step? FUCKING CRYPTOGRAPHIC KEY IDENTIFICATION AND EXCHANGE, between the TERMINAL and the little bitty fucking tiny ass chip under those gold finger bits. Terminal says HEY BABY I HEAR YOU LIKE KEYS, and finger-bangs that little bitch chip a little til it gives up its public key, which the TERMINAL then replies with its own public key, and once the chip and the terminal have secure communications, the TERMINAL asks the chip some dirty questions about how it likes to get down, and as the two chat it up about how it likes to give and take, they also swap transaction keys… Just like the public keys earlier, but they change, and depend on the private key for the issuing bank, which is generated on the fly based on deep voodoo crypto shit stored one-way in the chip, and the private key assigned to the TERMINAL by the merchant processor.

Once ALL THAT IS DONE, in the blink of a fucking eye, once the TERMINAL and the chip can talk securely, does ANY of the fucking payment shit get shot back and forth. All of that shit is also cryptographically signed and encrypted - USUALLY but there ARE some mostly useless exceptions - some NFC for one, more on this later - and so even out of the gate, for a successful EMV clone operation you have to have possession of the cryptographic keys that you cannot read the actual values of, not even with Super CardPeek XTREAMedition. The functions do not exist, and attempting to read those locations low level directly will fail because again, THE IMPORTANT BITS are generated on the fly - this is the ATR shit you hear EMVfagUk and the other ice-vendors talk about.

TL;DR? You have no control over the sequence of events that result in a transaction, successful or not, thus you cannot capture the data needed to do it manually, except by capture and playback of packets sent back and forth. Yes, sequence prediction and replay attacks notwithstanding - i challenge anyone who does MiTM style replay attacks on legit straight EMV transactions using hardware terminals and a legit merchant processor to SHOW ME THE MONEY. No? Know why? Because you can’t.

REASON NUMBER TWO:
If EMV cloning were possible, then some Russians would have been doing it twenty years ago when chip and pin was introduced in Europe, leading to what I can only estimate to be the simultaneous destruction of the Eurozone and the incredible post-Soviet rebirth of the Russian economy - both of which did not happen, leading us to the third and final,

REASON EMV CLONING IS NOT POSSIBLE:

If it were, then nobody would be selling software bundles, Java cards or Omnikey 3121s for the low ass prices you find. HID reader writer availability would dry up tighter than your mom’s pussy after a facelift. There would be more lucrative money to be had with making the clones and using them than would EVER be made otherwise, and the price of 201 dumps would skyrocket higher than pigeon tits.

in fact, were it possible to clone and use an EMV card, we would all likely be so broke that just the scent of the cologne worn by all the Russian mobsters who would control it would cost a young white pretty little whore’s whole year of wages in solid gold fucking bars to even get a whiff downwind.

SO WHERE IS ALL THE MONEY IN IT?

Elementary, my little Eskimos! In selling all of you little bushbabies ALL THE ICE YOU CAN DOWNLOAD !

Do the math, rugrats.

CLASS DISMISSED, GOODNIGHT LADIES!
Would be nice if i known that before i bought the msr, omnikey and cards.
 

Roger

Supreme
Joined
03.03.21
Messages
105
Reaction score
45
Points
28
I also think EMV will be hard to replicate, but SDA is possible. Those who buy 201 are doing so by forcing MSR and NFC reads to bypass EMV.
 

Ianmoone

Basic
Joined
13.11.21
Messages
84
Reaction score
43
Points
18
Let me make the following statement clear as a fucking bell:

———
Creating a FUNCTIONAL, physical clone of an EMV card is not possible, for a whole fuck-ton of reasons.
———​

It seems so simple, doesn’t it ladies? Just buy a 201 dump, run any of your trusty hi-co cr80 trashsquares through ye olde MSR, and voilá, right?

Maybe you’re more enlightened after some cursory perusal of forums like this and you think you know what the fuck you’re doing, right? Maybe you have an Omnikey 3121, some bullshit Java cards you paid way too much for, and that flaming turd of a virus dropping app that someone sold you in a bundle of other slick looking malware slingers - ooh, be still my quivering terminal!

Both of you kind of fucksticks are deficient in the sort of knowledge that keeps you thirsty for breaking even on your “investment” in this business, and even if you do break your ass free from the hypnotic seduction of your ignorance, unless you educate yourself about the technology you are up against you will continue to be fodder for the cretins below you, present company excluded of course.

SO WHY THE FUCK CAN’T IT BE DONE, HERR PROFESSOR?

Well, I am so very happy you asked, trog! If you wouldn’t mind mopping up your droolpuddle while I regale you and your friends here, I shall gladly do so:

REASON NUMBER ONE:
When you DIP THAT CHIP, a super complicated series of shit happens - the order of which is controlled by SOMETHING YOU HAVE NO CONTROL OVER: the payment terminal itself. But guess what? Essential transaction information like the card number, expiration date, discretionary data, et cetera - NONE of that shit gets transmitted between terminal and processor, processor and acquiring bank, issuing bank and acquiring bank, I mean for fucks sake, not even the goddamn name on the front of the card, BEFORE this one critical step happens.

What step? FUCKING CRYPTOGRAPHIC KEY IDENTIFICATION AND EXCHANGE, between the TERMINAL and the little bitty fucking tiny ass chip under those gold finger bits. Terminal says HEY BABY I HEAR YOU LIKE KEYS, and finger-bangs that little bitch chip a little til it gives up its public key, which the TERMINAL then replies with its own public key, and once the chip and the terminal have secure communications, the TERMINAL asks the chip some dirty questions about how it likes to get down, and as the two chat it up about how it likes to give and take, they also swap transaction keys… Just like the public keys earlier, but they change, and depend on the private key for the issuing bank, which is generated on the fly based on deep voodoo crypto shit stored one-way in the chip, and the private key assigned to the TERMINAL by the merchant processor.

Once ALL THAT IS DONE, in the blink of a fucking eye, once the TERMINAL and the chip can talk securely, does ANY of the fucking payment shit get shot back and forth. All of that shit is also cryptographically signed and encrypted - USUALLY but there ARE some mostly useless exceptions - some NFC for one, more on this later - and so even out of the gate, for a successful EMV clone operation you have to have possession of the cryptographic keys that you cannot read the actual values of, not even with Super CardPeek XTREAMedition. The functions do not exist, and attempting to read those locations low level directly will fail because again, THE IMPORTANT BITS are generated on the fly - this is the ATR shit you hear EMVfagUk and the other ice-vendors talk about.

TL;DR? You have no control over the sequence of events that result in a transaction, successful or not, thus you cannot capture the data needed to do it manually, except by capture and playback of packets sent back and forth. Yes, sequence prediction and replay attacks notwithstanding - i challenge anyone who does MiTM style replay attacks on legit straight EMV transactions using hardware terminals and a legit merchant processor to SHOW ME THE MONEY. No? Know why? Because you can’t.

REASON NUMBER TWO:
If EMV cloning were possible, then some Russians would have been doing it twenty years ago when chip and pin was introduced in Europe, leading to what I can only estimate to be the simultaneous destruction of the Eurozone and the incredible post-Soviet rebirth of the Russian economy - both of which did not happen, leading us to the third and final,

REASON EMV CLONING IS NOT POSSIBLE:

If it were, then nobody would be selling software bundles, Java cards or Omnikey 3121s for the low ass prices you find. HID reader writer availability would dry up tighter than your mom’s pussy after a facelift. There would be more lucrative money to be had with making the clones and using them than would EVER be made otherwise, and the price of 201 dumps would skyrocket higher than pigeon tits.

in fact, were it possible to clone and use an EMV card, we would all likely be so broke that just the scent of the cologne worn by all the Russian mobsters who would control it would cost a young white pretty little whore’s whole year of wages in solid gold fucking bars to even get a whiff downwind.

SO WHERE IS ALL THE MONEY IN IT?

Elementary, my little Eskimos! In selling all of you little bushbabies ALL THE ICE YOU CAN DOWNLOAD !

Do the math, rugrats.

CLASS DISMISSED, GOODNIGHT LADIES!
I love how you don’t even know what your talking about. Sounds like someone’s mad he hasn’t figured it out yet. I however have and you sir are a fucking idiot. It 100 percent is possible and I’ve successfully done it.
 

crisiswhatcrisis

Director of Pussy Control
Premium
Joined
16.01.21
Messages
16
Reaction score
31
Points
13
I also think EMV will be hard to replicate, but SDA is possible. Those who buy 201 are doing so by forcing MSR and NFC reads to bypass EMV.
Exactly. The cryptography involved by itself is a major roadblock - and the people who bump their gums talking like they understand how it works are fodder for my amusement.

Succinctly, if you know what a ‘201’ really is, and you claim that’s what you ‘cloned’ onto a Java card - all I have to say is who’s the fucking idiot, eh?
 

Ianmoone

Basic
Joined
13.11.21
Messages
84
Reaction score
43
Points
18
Exactly. The cryptography involved by itself is a major roadblock - and the people who bump their gums talking like they understand how it works are fodder for my amusement.

Succinctly, if you know what a ‘201’ really is, and you claim that’s what you ‘cloned’ onto a Java card - all I have to say is who’s the fucking idiot, eh?
Obviously you seeing as you haven’t figured it out yet and there’s more then just me on the forums here that have successfully done it
 
Last edited:

soccorio

Basic
Joined
30.11.21
Messages
40
Reaction score
12
Points
8

Jeromep

Premium
Joined
11.01.23
Messages
19
Reaction score
5
Points
4
I got a question for bud,
Let me make the following statement clear as a fucking bell:

———
Creating a FUNCTIONAL, physical clone of an EMV card is not possible, for a whole fuck-ton of reasons.
———​

It seems so simple, doesn’t it ladies? Just buy a 201 dump, run any of your trusty hi-co cr80 trashsquares through ye olde MSR, and voilá, right?

Maybe you’re more enlightened after some cursory perusal of forums like this and you think you know what the fuck you’re doing, right? Maybe you have an Omnikey 3121, some bullshit Java cards you paid way too much for, and that flaming turd of a virus dropping app that someone sold you in a bundle of other slick looking malware slingers - ooh, be still my quivering terminal!

Both of you kind of fucksticks are deficient in the sort of knowledge that keeps you thirsty for breaking even on your “investment” in this business, and even if you do break your ass free from the hypnotic seduction of your ignorance, unless you educate yourself about the technology you are up against you will continue to be fodder for the cretins below you, present company excluded of course.

SO WHY THE FUCK CAN’T IT BE DONE, HERR PROFESSOR?

Well, I am so very happy you asked, trog! If you wouldn’t mind mopping up your droolpuddle while I regale you and your friends here, I shall gladly do so:

REASON NUMBER ONE:
When you DIP THAT CHIP, a super complicated series of shit happens - the order of which is controlled by SOMETHING YOU HAVE NO CONTROL OVER: the payment terminal itself. But guess what? Essential transaction information like the card number, expiration date, discretionary data, et cetera - NONE of that shit gets transmitted between terminal and processor, processor and acquiring bank, issuing bank and acquiring bank, I mean for fucks sake, not even the goddamn name on the front of the card, BEFORE this one critical step happens.

What step? FUCKING CRYPTOGRAPHIC KEY IDENTIFICATION AND EXCHANGE, between the TERMINAL and the little bitty fucking tiny ass chip under those gold finger bits. Terminal says HEY BABY I HEAR YOU LIKE KEYS, and finger-bangs that little bitch chip a little til it gives up its public key, which the TERMINAL then replies with its own public key, and once the chip and the terminal have secure communications, the TERMINAL asks the chip some dirty questions about how it likes to get down, and as the two chat it up about how it likes to give and take, they also swap transaction keys… Just like the public keys earlier, but they change, and depend on the private key for the issuing bank, which is generated on the fly based on deep voodoo crypto shit stored one-way in the chip, and the private key assigned to the TERMINAL by the merchant processor.

Once ALL THAT IS DONE, in the blink of a fucking eye, once the TERMINAL and the chip can talk securely, does ANY of the fucking payment shit get shot back and forth. All of that shit is also cryptographically signed and encrypted - USUALLY but there ARE some mostly useless exceptions - some NFC for one, more on this later - and so even out of the gate, for a successful EMV clone operation you have to have possession of the cryptographic keys that you cannot read the actual values of, not even with Super CardPeek XTREAMedition. The functions do not exist, and attempting to read those locations low level directly will fail because again, THE IMPORTANT BITS are generated on the fly - this is the ATR shit you hear EMVfagUk and the other ice-vendors talk about.

TL;DR? You have no control over the sequence of events that result in a transaction, successful or not, thus you cannot capture the data needed to do it manually, except by capture and playback of packets sent back and forth. Yes, sequence prediction and replay attacks notwithstanding - i challenge anyone who does MiTM style replay attacks on legit straight EMV transactions using hardware terminals and a legit merchant processor to SHOW ME THE MONEY. No? Know why? Because you can’t.

REASON NUMBER TWO:
If EMV cloning were possible, then some Russians would have been doing it twenty years ago when chip and pin was introduced in Europe, leading to what I can only estimate to be the simultaneous destruction of the Eurozone and the incredible post-Soviet rebirth of the Russian economy - both of which did not happen, leading us to the third and final,

REASON EMV CLONING IS NOT POSSIBLE:

If it were, then nobody would be selling software bundles, Java cards or Omnikey 3121s for the low ass prices you find. HID reader writer availability would dry up tighter than your mom’s pussy after a facelift. There would be more lucrative money to be had with making the clones and using them than would EVER be made otherwise, and the price of 201 dumps would skyrocket higher than pigeon tits.

in fact, were it possible to clone and use an EMV card, we would all likely be so broke that just the scent of the cologne worn by all the Russian mobsters who would control it would cost a young white pretty little whore’s whole year of wages in solid gold fucking bars to even get a whiff downwind.

SO WHERE IS ALL THE MONEY IN IT?

Elementary, my little Eskimos! In selling all of you little bushbabies ALL THE ICE YOU CAN DOWNLOAD !

Do the math, rugrats.

CLASS DISMISSED, GOODNIGHT LADIES!



I got a question for you bud, a common sense question. Why the hell then all of these skimming devices are popping up across the world. Why are people bother skimming (or otherwise getting the complete cc info + pin) If there is no market for it? carding online doesnt require pin yet there are tons of skimmers running as we speak collecting the PIN as well. What is the point in all of that if cloning a card is not possible?
 

soccorio

Basic
Joined
30.11.21
Messages
40
Reaction score
12
Points
8
my friend u don't read, i said check emvchipso dot com and read there.
 

crisiswhatcrisis

Director of Pussy Control
Premium
Joined
16.01.21
Messages
16
Reaction score
31
Points
13
I got a question for bud,




I got a question for you bud, a common sense question. Why the hell then all of these skimming devices are popping up across the world. Why are people bother skimming (or otherwise getting the complete cc info + pin) If there is no market for it? carding online doesnt require pin yet there are tons of skimmers running as we speak collecting the PIN as well. What is the point in all of that if cloning a card is not possible?
Skimming devices are magstripe readers - that data is static, and can be cloned. EMV data is generated on the fly using cryptographic functions of the chip on the card, and NFC transactions use some of that data as well. I never said there wasn't a market for skimmers or the dumps that result from their use, in fact that's what 99% of the shit available on all these markets is sourced from. Carding doesn't require a PIN because in the US, issuers have not begun yet to require it for credit transactions, only debit transactions over the existing payment networks, but in Europe and the rest of the world credit transactions have required a PIN for years. I only said that creating a functional (ie., usable multiple times) clone of an EMV payment card is not possible due to the cryptographic elements not being duplicable, by design, by anyone but the issuer.

The people that say you can clone an EMV card pass one transaction and call it cloned - and that's because they are cloning the static data.
 

jplugzz

Carding Novice
Joined
25.07.23
Messages
1
Reaction score
0
Points
1
My first real Clone card I made didn't have the emv coded
 

crisiswhatcrisis

Director of Pussy Control
Premium
Joined
16.01.21
Messages
16
Reaction score
31
Points
13
My first real Clone card I made didn't have the emv coded
So, then what did you clone, the magstripe data? EMV refers to "Europay, Mastercard & Visa" , the creators of the payment method used by "smart" cards, or chip cards, so from what you are saying, you cloned a card that had no EMV data elements programmed into the cloned card - therfore the only other information you could have cloned from the first card would be magnetic stripe data and the static, readable elements from the chip that are available via NFC and chip reads.

Sure, you can clone one-time data that you can pull from the chip, but that's not going to get you another authorization if you duplicate it into another chip. Anyone can copy the readable elements on the card, and call it a clone - and if it works once, and that's what you need, then good for you, but notice I said in my original post, a functional clone, meaning you can use it exactly like the original. YMMV.
 

sysop12

Basic
Joined
02.09.23
Messages
19
Reaction score
5
Points
3
So basically only way to cashout cc in Europe is FULLZ and using it to buy stuff online, right?
 
Top Bottom