Ethical hacking of antifraud systems

COURSE PROGRAMME
Collaborative project VEKTORT13 & CYBERYOZH ACADEMY
As part of the course, we will analyze the identifiers that are both relevant and used at the time of product release and have gained relevance after program compilation and publication. Some example identifiers are shown below.

Browser identifiers

1.1
1.1.1
1.1.2
1.1.3
1.1.4
1.1.5
1.1.6
1.1.7
1.1.8
1.1.9
1.1.10
1.1.11
1.1.12
1.1.13
1.1.14
1.1.15
1.1.16
1.1.17
1.1.18

Identifiers

Module №1
Included in plans: JUNIOR, MIDDLE и SENIOR
oRTC
WebRTC
AhoyRTC
UserAgent
WebRTC Fingerprint
Canvas Fingerprint
WebGL Fingerprint
Audio Fingerprints stack
Audio I/O Fingerprint
ClientRect Fingerprint
Browser Engine Fingerprint
TLS Fingerprint
Font Fingerprints stack
M1D Fingerprint
Browser Integrity protection system (Level 1)
VM Detection system
Puppeteer Detection System
Hardware Detection System

Identifiers of the operating system

1.2
1.2.1
1.2.2
1.2.3
1.2.4
1.2.5
1.2.6
1.2.7
1.2.8
1.2.9
1.2.10
1.2.11
1.2.12
1.2.13
1.2.14
1.2.15
1.2.16
1.2.17
1.2.18
1.2.19
PID Windows
Local Disk ID
Windows installation time and date
IE ID
System folders creation and modification date
.NET ID
SID
WUID
WMPID
Silverlight ID
Host ID/User ID
Disk GPT/MBR ID
Volume ID
Device ID
User Profile ID
Machine ID
Windows Update Client ID
Windows Store ID
Windows Product ID

Hardware identifiers

1.3
1.3.1
1.3.2
1.3.3
1.3.4
1.3.5
1.3.6
1.3.7
1.3.8
1.3.9
1.3.10
System UUID
System SKU
Motherboard SN
Chassis version
Chassis SN
BIOS version
BIOS Firmware Revision
HDD SN
HDD Firmware Revision
OHCI/AHCI/ACPI Hardware

Other identifiers

Fingerprint override detection tools

1.5
1.6
1.5.1
1.5.2
1.5.3
1.5.4
1.5.5
1.5.6
1.6.1

1.6.2

1.6.3
Keystroke pattern
E-Tag Tracking
Cookies
Hyperlink Auditing
Identifiers of ad networks
Google Header Tracking identifiers
What data Microsoft collects about you
What data Google Chrome collects about you
Influence of usage data on working with antifraud systems
1.7.1
1.7.2
1.7.3
Web resources (checkers)
Software solutions
Virtualization detection tools

Network identifiers

1.4
1.4.1
1.4.2
1.4.3
1.4.4
1.4.5
1.4.6
1.4.7
1.4.8
1.4.9
1.4.10
1.4.11
1.4.12
IPv4 Address
IPv6 Address
ASN
DNS
MAC-Address
Ping/two-way ping
OS fingerprint
Connection Type
Timezone
Open ports
HTTP Headers
mtu

Usage data

1.7
1.1.1
1.1.2
1.1.3
1.1.4
1.1.5
1.1.6
1.1.7
1.1.8
1.1.9
1.1.10
1.1.11
1.1.12
1.1.13
1.1.14
1.1.15

1.1.16
1.1.17
1.1.18
1.2.1
1.2.2
1.2.3
1.2.4
1.2.5

1.2.6
1.2.7
1.2.8
1.2.9
1.2.10
1.2.11
1.2.12
1.2.13
1.2.14
1.2.15
1.2.16
1.2.17
1.2.18
1.2.19
1.6.1
1.6.2
1.6.3
1.5.1
1.5.2
1.5.3
1.5.4
1.5.5
1.5.6
Many people underestimate these indicators, although in 2023, it is a social rating that will become the most important tool. Both antidetect tools and top-quality proxies are powerless against it. However, cybercriminals have not been resting on oars, and have already learned how to boost social rating to override the top antifraud systems.

Customer data assessment

2.1
2.1.1
2.1.2
2.1.3
2.1.4
2.1.5

User data

Module №2
Included in plans: JUNIOR, MIDDLE и SENIOR
Username assessment
Email assessment
Phone number assessment
Payment information assessment
Delivery address assessment

Social rating

Verification through photo and video

2.2
2.3
2.2.1
2.2.2
2.2.3
2.2.4
2.2.5
2.3.1
2.3.2
2.3.3
What data it is based on
How to check your social rating
Where social rating is used
How to boost your social rating
Some philosophical reasoning about how this world is going to hell
Tools and templates for "rendering" documents
Tools for creating fake verification videos
Introduction to image analysis of AF systems (the trump card of the Booking antifraud system)
2.2.1
2.2.2
2.2.3
2.2.4
2.2.5
2.3.1

2.3.2

2.3.3
When all other barriers have been passed, all hope remains with behavioral analysis. It drives cybercriminals crazy: a single mistake will send a successful order of an iPhone to manual verification.
There are several basic vectors of user analysis and assessment that you will have to master from the very start.

Types of user analysis by an antifraud system

3.1
3.1.1
3.1.2
3.1.3
3.1.4

Behavior analysis

Module №3
Included in plans: JUNIOR, MIDDLE и SENIOR
Behavior analysis
Analysis of the user device
Data analysis (IP, email)
Analysis of payment information

Using behavioral analysis for user assessment

3.2
3.2.1
3.2.2
3.2.3
3.2.4
3.2.5
3.2.6
3.2.7
Warming accounts up (pumpers)
Simulation of human typing
"Dead Man Accs"
Patterns of suspicious activity
Patterns of account sale and transfer
Patterns account theft or hacking
Patterns of using stolen payment data
3.2.1
3.2.2
3.2.3
3.2.4
3.2.5

3.2.6
3.2.7
You will learn to:
Get maximum information about the owner of the profile in the social networks.
De-anonymize owners of certain communities.
You will master many tools for collecting and analyzing information about a person or organization from social networks

Exploring social networks

Instagram
Twitter
Steam
LinkedIn
4.1
4.1.1
4.1.5
4.1.2
4.1.4
4.1.1.1

4.1.1.2
4.1.1.3
4.1.2.1
4.1.2.2
4.1.2.3
4.1.5.1
4.1.5.2
4.1.5.3
4.1.4.1

4.1.4.2

OSINT for studying operation of antifraud systems

Module №4
Profile parsing: pulling out all the information that a profile can provide
Determining close relations of the target
We will master tools, such as osi. ig, STERRA, and others.
Included in plans: JUNIOR, MIDDLE и SENIOR
Statistical analysis of the profile
Extracting useful information from tweets
We will master tools such as Twint, Social Bearing, and others.
Bulk search for previously used account names.
Finding out when the accounts became friends.
We will consider a database of account screenshots.
Collecting information about the company’s employees, their positions, and hierarchy
Retrieving information associated with the email address without leaving traces
Facebook
4.1.3
4.1.3.1
4.1.3.2
4.1.3.3
Using advanced search on Facebook
Checking a profile for leaks of a phone number or other information
We will master tools such as Social Searcher, WeWerify, graph. tips, etc.
Other social networks and ways to analyze their users (YouTube, Reddit, TikTok, Odnoklassniki, GitHub, etc.)
4.1.6
4.1.1.1


4.1.1.2

4.1.1.3
4.1.2.1
4.1.2.2

4.1.2.3
4.1.3.1

4.1.3.2


4.1.3.3
4.1.4.1


4.1.4.2
4.1.5.1

4.1.5.2

4.1.5.3

Exploring the phone number

Exploring the username

Exploring email

4.2
4.4
4.3
4.4.1
4.4.2
4.4.3
4.4.4
4.4.5
4.2.1
4.2.2
4.2.3
4.2.4
4.2.5
4.3.1
4.3.2
4.3.3
4.3.4
4.3.5
4.3.6
Revealing the IP address and service domains of the email sender
Checking email existence
Checking email for leaks or hacks
Studying email reputation
Checking which services the email is used in
Matching the phone number to accounts in social networks
Matching the phone number to ad aggregators
Finding reputation of the number
Finding how the number is written in the contacts
Looking for the phone number mentioning in open sources
You will learn to
Determine who is behind the email.
Find where the email is used
Check the email for leaks or hacks
Use tools such as Parsemail, hunter. io, and others.
De-anonymizing owners of certain communities.
Searching through standard search engines
Using bulk search on various resources
Determining where the username is used
Looking for cases of username mentioning
Looking for related nicknames and email addresses by leaked passwords
You will learn to
Find out from the phone number who it belongs to and what services it is used in, and where it has been mentioned.
Determine the approximate location of the telephone number owner.
Use tools such as Phoneinfoga, Smart_SearchBot, GetContact, NumBuster, and others.
You will learn to
Find all cases of mentioning the username and link them into a coherent picture.
Find people behind usernames.
You will master tools such as Snoop Project, Sherlock, whatsmyname, namecheckup, and more.
4.2.1

4.2.2

4.2.3
4.2.4

4.2.5
4.3.1

4.3.2

4.3.3

4.3.4

4.3.5

4.3.6
4.4.1


4.4.2
4.4.3
4.4.4
4.4.5

Search by image

Studying metadata

Advanced features of search engine, or Google Hacking

Using API queries for obtaining more information

Exploring web archives

4.5
4.8
4.7
4.9
4.6
4.5.1
4.5.2
4.5.3

4.5.4
4.7.1
4.7.2
4.7.3

4.7.4
4.8.1

4.8.2
4.6.1
4.6.2
Finding the image on all kinds of sites
Finding faces in images in social networks
Reducing the blur in photos and removing other defects, restoring them through the use of neural networks
Creating facial composites
Image metadata
Video metadata
Metadata of websites and documents
Finding the person who created a document (for example, a Google document)
Using additional features of search engine for efficient search
Google Docs — learning to find access to sensitive information that is contained in the public domain: passwords, databases, administrator accounts.
You will learn to
Find people in images on various resources
Remove defects that hide data in images
Set up a neural network to identify and organize objects in a video stream (for example, streaming)
Use tools such as Pimeyes, search4faces, photo-map, Watsor, and others.
You will learn to
Through the metadata, find information about the person who generated these data, and explore the software and hardware environment in which the data were generated
Use tools such as Fotoforensics, imgonline, Foca, and others.
You will learn to
Use as many capabilities of standard web search engines as possible — find something that could not be found the usual way.
Use tools such as Fotoforensics, imgonline, Foca, and others.
Viewing the web page history in from the social network
Studying the website history and learning what information can be obtained
You will learn to
Study and analyze the previous state of web pages
Use tools such as Wayback Machine, Cached Pages, and others.
4.5.1

4.5.2

4.5.3



4.5.4
4.6.1

4.6.2
4.8.1

4.8.2
You will learn to
Determine the address/location from the image.
Track aircraft, ships, and trains.
Use tools such as mashedworld, openstreetmap, suncalc, Grid Reference Finder, esri2. maps, and others.
Customize work with Map Switcher.

Geo-OSINT (GEOINT)

Assessing datum points
4.10.1
4.10.1.1
4.10.1.2
4.10.1.3
Assessing datum points
Global
Local
Private
4.10.7
4.10
Reconnaissance by Google, Yandex, openstreetmap, and other maps.
Finding what images have been uploaded to social networks at a specific geolocation
Finding what videos have been uploaded to YouTube in a specific geolocation
OSINT by satellite images
Learning to identify the address/location from an image
OSINT of aircraft, ships, and trains
4.10.2

4.10.3

4.10.4

4.10.5
4.10.6
4.10.8
4.10.7.1
4.10.7.2
How the nature can reveal the secrets of geolocation
Determining the approximate location by the shadow from the sun
4.10.2

4.10.3



4.10.4


4.10.5
4.10.6
You will learn to
De-anonymize the site owner.
Find and study the hidden structure of the website.
Find out what and who is behind an IP address.
Use tools such as Dirb, Dirhunt, URL Fuzzer, and others.

Web OSINT

You will learn to
Explore and study the network infrastructure of Internet resources
You will learn to
How data are bought and sold on the black market
How to search for information on the dark web

Internet resources

Researching IP addresses
4.11.2
Networking basics
Research using ad identifiers
Exploring the structure of a website
Shodan

Dark OSINT

4.11.2.1
4.11.2.2
4.11.2.3
4.12.1.1

4.12.1.2

4.12.1.3
4.12.1.4
4.12.1.5
4.12.1.6
4.13.1
4.13.2
4.13.3
4.13.4
4.11.1
4.11
Finding the IP address using a logger
Finding device location
Finding what the target IP address has downloaded from torrents
Everything about data: banner (network services), device metadata, and IPv6.
Shodan search engine: search queries, search filters, report generation (compilation)
Shodan maps
Searching for vulnerabilities
Shodan screenshots
Shodan CLI
What is the dark web?
Black market for personal data
Dark web search engines
TorBot
4.11.3
4.11.4
4.12.1
4.13
4.12
4.11.2.1

4.11.2.2
4.11.2.3
4.11.3
4.11.4
4.12.1.1


4.12.1.2


4.12.1.3
4.12.1.4
4.12.1.5
4.12.1.6
4.13.1
4.13.2
4.13.3
4.13.4
We will take a deep look at some of them and dig into their background. As for the rest, we will only discuss things that distinguish them from the others. If you want to be a good specialist, you must know the features, strengths, and weaknesses of antifraud systems and be able to connect them (and, surely, bypass them).
We will talk about the de-anonymization of the users who brought a lot of criminals to the court. Fortunately, cybercriminals are poorly aware of them and become easy prey.

The most popular antifraud systems and the tools used in them

5.1
5.1.1
5.1.2
5.1.3
5.1.4
5.1.5
5.1.6
5.1.7
5.1.8

5.1.9
5.1.10
5.1.11
5.1.12

Antifraud systems

Module №5
Included in plans: JUNIOR, MIDDLE и SENIOR
GeoComply
Amazon fraud detector
eBay and its antifraud system
Google fraud monitor
Sift
Seon
Stripe
Akamai is the Gray Eminence of the Internet. It even remembers the porn you watched 10 years ago
Antifraud systems in games (WoW, LA2, etc.)
Infoprotector and other content protection systems
Fingerprint.com, etc.
Bonus! A representative of the affiliate program will tell you how affiliate programs suffer from scammers and how they deal with them.

Interaction of antifraud systems with law enforcement agencies

5.2
5.2.1
5.2.2
5.2.3
5.2.4
VPN and proxy de-anonymization through connection mapping
VPN and proxy de-anonymization through third-party sites
How the FBI catches cybercriminals using cloud antidetect solutions
Getting data from proxy providers (911 story)
5.1.1
5.1.2
5.1.3
5.1.4
5.1.5
5.1.6
5.1.7
5.1.8


5.1.9

5.1.10

5.1.11
5.1.12
5.2.1

5.2.2

5.2.3


5.2.4
First, you will learn to analyze what data a website or an application collects about you, and what tools it uses.
In this unit, we will analyze various antidetect solutions. Antidetect solutions help test antifraud systems. Few people know that proper settings can turn an ordinary browser into a very worthy antidetect solution, and, using special plug-ins, it can also be very convenient.
We will need a professional solution that would be much cooler and more functional than those available to cybercriminals, a machine that, if properly used, will break the antifraud system.
You will learn to create training tools. In the same unit, we will tell you how to select and connect an antifraud system to your website.

Tools for analyzing antifraud systems

Antidetect solutions

Setting up a professional antidetect tool, through and through

6.1
6.2

Setting up the sandbox/training environment

6.1.1
6.1.2
6.1.3
6.3
6.4
6.3.1
6.3.2
6.3.3
6.3.4
Tools for analyzing the data collected by websites
Tools for analyzing the data collected by installed software
Documentation of the antifraud system used
6.2.1
6.2.2
6.2.3
6.2.4
6.4.1
6.4.2
6.4.3
6.4.4
Setting up an antidetect tool
Buying and setting up a proxy
Getting a virtual credit card
Starting several unique computers on your PC (for software or for working in a browser)
Setting up Firefox for multi-accounting
Plugins for multi-accounting
Antidetect browsers
Antidetect tools based on a virtual machine
This training course makes no sense without practice.
Which antifraud system should be chosen for your site
How to create a sandbox for pentesting antifraud systems
Using the detect. expert website for honing your skills
6.1.1

6.1.2

6.1.3
6.2.1

6.2.2
6.2.3
6.2.4
6.3.1
6.3.2
6.3.3
6.3.4
6.4.1

6.4.2

6.4.3

6.4.4

Bypassing antifraud systems

Module №6
Included in plans: MIDDLE и SENIOR
In this unit, we will look at Apple devices and the hidden features of macOS.

There are many myths around macOS-based systems. We will analyze both methods for anonymizing devices and methods for modifying devices for multi-accounting. The training course will be under the directives used by US intelligence agencies (original documents will be provided).

You will learn to make our device invisible.
We will consider and prepare your MacBook for multi-accounting and turn it into one of the best antidetect tools. This will always remain relevant, because Apple devices always have the highest trust rating from Antifraud systems.
You will get very useful software and learn to use it.

MacOS Hardened

Module №7
Included in plans: SENIOR
Antifraud systems will pay well for bypassing their solutions. The reward reaches hundreds of thousands of dollars for regular cooperation. However, this is the top level. It is easier to check security of a particular service or online store since such resources rarely know how to properly configure security and can become easy prey for scammers. You can prevent this and make good money.
In this unit, we will consider the main legal earning schemes for which users use antidetect tools.
This is not a training course for earnings. I only tell you the key feature of the business, how money is made.

Pentesting antifraud systems

Analysis of work with specific websites

8.1
8.2
8.1.1
8.1.2
8.1.3
8.1.4
8.1.5
8.2.1

8.2.2

Monetization of knowledge

Module №8
Included in plans: MIDDLE и SENIOR
The legal basis for penetration testing
Contacts of an antifraud system that pays well for bypassing it
Creating a CV for a pentester job
Bug bounty — the most popular programs and websites
Reward from law enforcement agencies for help in disclosing crimes and finding criminals
Bonus 1: How to create your legal entities worldwide without leaving your PC
Bonus 2: How to work with VCC correctly (where to buy, how to withdraw funds)
8.1.1

8.1.2


8.1.3

8.1.4

8.1.5
8.2.1


8.2.2
For some reasons, we do not disclose the content of this unit. Please do not disturb our support team with questions like "tell me how to get a PS5 for almost nothing". First, the support team does not know such details; second, I will tell you, third, you can be caught and jailed for this, so you better try to win PS5 in contests. Fourth, never take part in competitions held by participants of this training course. You won’t like it for sure.
In the same unit, you will be given contacts of communities where cybercriminals discuss criminal schemes. You should monitor them to keep abreast of current schemes and sell knowledge on Bug bounty websites.

Schemes of cybercrime

Module №9
Included in plans: SENIOR
support@cyberyozh.com
We use cookies to personalize content provided by analytic and advertisement partners to offer you the best service experience.