Long time no see. First post on english, let's start. Today special is pwning the old carding shop called "electronicpromo". Electronicpromo allows various carder from around the world to check credit card balance, additional check if credit card is valid and working, check for VBV (Verified by Visa) & MCSC (Mastercard Secure Code) etc. We will cover all of them later but first.. Let take a small look at information of Electronicpromo.
I Gathering info Electronicpromo
Website : electronicpromo.net IP : 126.96.36.199 Name servers: yns1.yahoo.com ; yns2.yahoo.com Mail server : mail.electronicpromo.net
Domain is registered @ melbourneit.com. You can check whole whois at whois.melbourneit.com. Particular thing I found very interesting is registration and creation date of domain which is 01/05/2010. Seems that either domain administrator don't have a life, or lives in a country which doesn't celebrate (International) Workers' Day . Just to note that whois registration info is private, either by private-whois or another offshore service.
II What does EP offer
Login form @ front-page
Registration page: It is invite only so don't bother contacting them, if you are security researcher, I can give it to you for free, just write me on twitter (@dn5__)
Dashboard / Account home You can see service they offer: CCV Checker 69; 3D Secure Checker & Balance CVV Checker
CCV Checker 69 - Visa, Mastercard, Amex, Discover; Accepting all country
3D Secure Checker - Visa, Mastercard; Accepting all country
Balance CVV Checker (Check card balance) - Visa, Mastercard, Amex, Discover; Accepting all country
Profile page / Change password
They even offer own API, which is by the way, exploitable but we will leave that for later on. Bellow is the picture of their API Service.
III MY HAX0RZ SKILLS
First step is to dig inside of domain name, check behaviour and such. Lets start!
$ dig www.electronicpromo.net +noadflag ; <<>> DiG 9.10b1 <<>> www.electronicpromo.net +noadflag ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 44933 ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;www.electronicpromo.net. IN A ;; ANSWER SECTION: www.electronicpromo.net. 306 IN A 188.8.131.52 ;; Query time: 15 msec ;; SERVER: 192.168.1.1#53(192.168.1.1) ;; WHEN: Mon Mar 17 22:38:51 Central European Standard Time 2014 ;; MSG SIZE rcvd: 57
At the time of writting this document, we've checked IP address to which we access electronicpromo.net domain. Based upon our research we've found that IP address with numbers 184.108.40.206 is dedicated from datacenter located in USA. Owner of this IP is Black Lotus Communications company (BLCC) who provide DDoS protection.
This kind of reference give us clue to ask same company for additional information of their client who need this service. In this case Black Lotus provide emergency response center telephone number but I was kind enough to contact abuse center by e-mail. Black Lotus will be forced to reveal information so we can sinkhole domain and do additional tracking of administration.
Location of IP address by map/graph:
Lets keep smashing the box. While doing the vulnerability assestment on Electronicpromo, I've found out that they have "_vti_inf" file which reveals us that FrontPage is installed, and that we can check FrontPage Configuration Information. Looking up into this file, comments reveals us this:
Frontpage Version - 220.127.116.1103 Frontpage SHTML Script URL - _vti_bin/shtml.exe/_vti_rpc Frontpage Author Script URL - _vti_bin/_vti_aut/author.exe Frontpage Admin Script URL - _vti_bin/_vti_adm/admin.exe
Without too much complication of process we use, here are the relative informations. Oh yes, by the way, thanks for setting file_uploads register to 1 (On)! Gived us much, much help.
$ uname -a Linux la427.electronicpromo.net 2.6.32-358.2.1.el6.x86_64 #1 SMP Wed Mar 13 00:26:49 UTC 2013 x86_64 $ mysql --version mysql Ver xx.xx Distrib 5.1.73 (masked*) $ openssl version OpenSSL 1.0.1e-fips 11 Feb 2013
Definitely my box.
$ php -r "print getenv("DOCUMENT_ROOT")"; /home/elecpro/public_html $ php -r "print getenv("SERVER_ADMIN")"; firstname.lastname@example.org
I hope you found this post interesting. Post will be updated probably. If not, ask me questions on my twitter @dn5__ or email me . Please note that this post is for educational purpose only. This post is not made to show off my skills but to show respect to people who are still there to break cyber-crime. This post will be proceeded to IC3 as complain. Do not redistribute to your blog. Domains will be sinkholed ASAP.
 http://en.wikipedia.org/wiki/International_Workers%27_Day  http://www.blacklotus.net/