Knowledge Is Power



Shimomura

Basic
Joined
25.02.24
Messages
3
Reaction score
0
Points
1
This information will help you find broken links and the causes of errors on the site, and will also show who is overloading the server or trying to hack it.
• Mail server log - records of all sent and delivered messages, mail server errors, reasons for rejecting letters.
• Database logs—database queries, server errors.
• Cron scheduler logs - a log of completed tasks, messages from the commands themselves, errors when starting the cron.



There are several options for receiving logs. The easiest and most effortless way is to buy them. There are a sufficient number of sellers on the forums who sell logs, and at different prices.
Purchase Log-oB
There are logs for $1 apiece, and some for $20. The price of a log depends on its quality, country, as well as the services that are located there. US logs are the most expensive on sale. Due to the fact that there are a huge number of banks, as well as PayPal accounts. Logs that cost 19 are most often without selection, and basically there is all sorts of rubbish, like social networks or toys, although sometimes you get lucky and come across some worthwhile things.


For example, when buying a log with a ACH/WIRE active, it is important to check not only the presence of a password for it, but also whether it is in
Cookies or has rdp access. We check with a regular search in a text engine with cookies, at the request of PayPal. If there are more than one line, then this log is considered good.
Extraction Log-ob
Also, in addition to purchasing logs, they can be obtained using malicious files - RAT and Stealer. Stillers
intercept all C files,
crypto wallets, RauRa accounts with
the victim's computer and are transferred to you.
Next comes their development. We will talk in more detail about the processing of cryptocurrency, PayPal and banks in the following articles. RATs, on the other hand, provide remote access to a PC, with which you can obtain the victim’s logs and also work on them


Popular stealers RedLine and Lumma collect information about the system, which includes:
1. Username;
2. Computer name;
3. List of installed software;
4. Equipment details;
5. Passwords, cookies, bank card and cryptocurrency wallet data saved in browsers are WHAT we need.
The main task in working with a log is picking it. In general, the logs contain enough information that is suitable for various purposes. It’s a personal matter for everyone who likes to work with what.
 
Top Bottom