About Carding


In this post I will discuss Anti-Detect Browsers, fraud experts have probably heard about them but for some pros and especially for most newbies this will be very useful.

What do AD(Antidetect)-Browsers allow you to do?
Trough the use of AD-Browsers you can automatically create a unique system fingerprint for you, which can be incredibly useful for bypassing Anti-Fraud back-end systems (e.g. Threat-Metrix). This allows you to keep practicing good OpSec while appearing like most internet users, which is important for fraud.

Categories of AD-Browsers:

1. There are AD-Browsers which will change browser settings and config, this will imitate other devices/systems, for example imitate Windows and Safari. Within this category there are AD-Browsers based on…
1.1-Firefox, common examples are AD 7.5, AFF Combine or AD by Good Job
1.2-Chromium, common examples are AD 8, Genesis Security and AD by Cert

2. AD-Browsers which change hardware parameters, although this can be also used with VMs.
One example is:
-AFF COMBINE PRO, although also sometimes referred to as KRAKEN PRO, it was written for Vm-Ware but also includes Browser-AD.

The Options named in 1.2 will be more expensive, but this price is sort of justified.
There are also ADs which are written into an engine’s source code, one example would be Linkensphere.
As of my experience Linkensphere and Dolphin receive the most usage.

Personal recommendations to take into consideration:
-Store the AD in an encrypted container
-Frequently change configs
-Change configs when changing the website

Let’s talk about the setup of “Linkensphere”:
First let’s go over the config.
Whether to save and to encrypt cookies: choose “must have”.
Enable WebRTC, but disable the Local-Ip in WebRTC.
Note: When working with mobile configs there is an option
that let’s you simulate touch screens.
Feel free to use on of the thousands of free configs.

Some settings worth thinking about, is the physical screen size, choose the system default.
There is a parameter that asks whether TOR should be used for authorization, enable this.
Disable the saving of passwords.
Under system time choose option two.
For the rest of the settings read through the docs if you want to.

A Tool you may want to use, is a web emulator which is nice for warming up shops.

In general settings and config highly vary for the specific use case, I really encourage you to play around with them or ask friends for tips.
I hope this provided a brief overview on this highly complex topic.