Uncategorized

How Ransomware Uses Encryption To Commit Cybercrimes?

How Ransomware Uses Encryption To Commit Cybercrimes? 
━━━━━━━━━━━━━
Encryption is designed to protect your data, but encryption can also be used against you.
For instance, targeted ransomware is a cybercrime that can impact organizations of all sizes, including government offices. Ransomware can also target individual computer users.
How do ransomware attacks occur? 
━━━━━━━━━━━━━
Attackers deploy ransomware to attempt to encrypt various devices, including computers and servers. The attackers often demand a ransom before they provide a key to decrypt the encrypted data. Ransomware attacks against government agencies can shut down services, making it hard to get a permit, obtain a marriage license, or pay a tax bill, for instance.
Targeted attacks are often aimed at large organizations, but ransomware attacks can also happen to you.
━━━━━━━━━━━━━
Uncategorized

Ransomware

Ransomware
The ACSC report indicates that the ransomware is a type of post-exploitation  
denial-of-service (DoS) attack that uses malware to stop legitimate network user(s)  
from accessing the content of their device(s) or the system. It is typically accom- 
panied by a request for payment (ransom demand) from the victim, to unlock  
compromised computer. Modern forms of ransomware use encryption to encrypt  
the data on compromised systems. This forces the victim to pay the ransom, in  
exchange for the decryption key. 
Payment is typically demanded through Bitcoin or other cryptocurrencies due  
to the anonymity associated with its use. The instructions are released through a  
“ransom message” that explains how the payments are to take place. The adversary  
typically demands monetary payments according to what the targeted company or  
individual can afford. This information is gained through the scanning phase of the  
compromise. Some forms of ransomware also include payment increases to encourage
Stay tuned for more information like this.
Uncategorized

HACKER FUNDAMENTALSA Tale of Two Standards

HACKER FUNDAMENTALS
A Tale of Two Standards 
OSI, TCP and What\’s Going on Here?
A good way to understand what a protocol is, would be to view it like a language. If people were network interfaces and all spoke their own language, there would be no way for them to properly communicate. A protocol works the same way, by agreeing to use certain methods or standards, many groups can build and create things that can all communicate with each other. So when you see TCP/IP protocol, think of it like a collection of rules computers must all follow to allow the millions and millions of networked machines called the Internet to function.
OSI was never meant to be just a model. Back in the 1970s, it was a competing protocol against TCP/IP and was actually a better protocol in design. The main reason it didn\’t take hold was that its addresses were hexadecimal and very complex. In fact, it was thought back then, that it had too many available addresses. Being based in hex, it allowed far more than the current protocol standard of IPv4. I should point out that the next version of IP, version 6, uses hex addresses which allow many more available ranges then IPv4. Go figure.
Examples of addresses include:
Hexadecimal – 12:34:56:78:9A:BC
IPv4 (current standard) – 74.125.225.98
IPv6 (new format) – fe80::223:4eff:fec0:5b48
A Tale of Two Models
OSI is still used today to describe network communication and for standards to unite, while the TCP model is used to show relation between the various protocols it contains. Below is a diagram of how the two map out to each other.
Uncategorized

RECOVERING A STOLEN LAPTOP

RECOVERING A STOLEN LAPTOP
STEP 1
Notify your network administrator of the theft. Locating a stolen laptop using a MAC address isn\’t possible unless the thief gets on the same LAN. This makes recovery unlikely, with the exception of a computer used on a corporate or college network. In such a case, let the network administrator know of the theft. Supply the MAC address of the laptop and the network administrator can watch for the laptop to log on to the network.
STEP 2
Forget about tracking a stolen laptop over the Internet using a MAC address — it\’s not possible. This second-level information is not passed through the router to the third-level ISP (Internet Service Provider).
STEP 3
Increase your chances of recovery by preinstalling anti-theft software that \”phones home\” to a service provider.
STEP 1
Contact your ISP to see if the thief has accessed the Internet using your service. The ISP issues a location-specific IP address when a computer accesses the Internet. If the owner of a stolen laptop discovers an IP address assigned to her computer since the theft, then the police can track its location.
STEP 2
Investigate whether programs such as Yahoo Messenger or email software that automatically logs on at boot-up are still being accessed. Contact the service provider with appropriate police report documentation and a subpoena to obtain a recent IP address for a stolen laptop.
STEP 3
Use preinstalled anti-theft clients to obtain a recent IP address for the stolen laptop. Supply the IP information to law enforcement.
STEP 1
Contract with a third party for anti-theft protection. Computrace LoJack for Laptops offers a three-year anti-theft guarantee for its software. Buyers subscribe to a service that uses installed BIOS firmware to track a stolen computer and supply recovery information to the police. Computrace LoJack claims to recover three out of four stolen laptops using its service.
STEP 2
Download and install an open source anti-theft client. There is no charge to install the software
Uncategorized

HOW TO CRACK ACCOUNTS – BARE BASICS

HOW TO CRACK ACCOUNTS – BARE BASICS 
This is how to crack accounts for people who are literally noobs, meaning that you have no idea what cracking is and how it works. This would\’ve been something I wished I had when I started out cracking.
Basically what cracking is, it\’s taking combolists, and running them through a program to check if that info is valid. You usually want to use proxies so your IP doesn\’t get banned Combolists: It\’s a txt file full of emails and passwords, in the format email:pass Proxies: The \”gateway\” between you and the internet. Basically use this so your IP doesn\’t get banned. Checkers: These are the checkers you use to check the combolist. 
Steps of cracking: 
1. Get a combolist 
2. Get a checker for whatever account you want to crack 
3. Get proxies 
4. Load combolists and proxies into the checker 
5. Press start Your checker should now start checking each email from different proxies to see if it\’s a valide combo for that service You use proxies since the company, let\’s say Disney again, will ban your IP for logging in too many times. The proxy makes it so it seems like your logging in from different locations each time. Beware cracking is ILLEGAL. But the risk is very low. Cracking is unethical. Anyway, have fun!
Uncategorized

PUBG Tricks | Get Free Legendary Outfit + Silvers + Scraps & More!

PUBG Tricks | Get Free Legendary Outfit + Silvers + Scraps & More!

PUBG Tricks – How To Get Legendary Outfit, Silvers, Scraps, etc.
First Of All Just Open PUBG Mobile. Now Go To Trophy Near Start Button & Click On Tournament Center > Then Just Go To Points Shop & Play
Also Click On Stream and Play any Video & You Will See a crate box in the bottom there. Collect Your Reward
Just Note – for Stream put Your Phone For 2 Hours & Collect Your Reward
[Working] Get 1 Premium Crate For Free
Open Pubg Mobile Game and Go to Events Tab.
Go to Extreme Treasure Banner From Event Tab.
Tap on Rocket Icon from Corner.
Open Pubg Mobile Game and Go to Events Tab.
Go to Extreme Treasure Banner From Event Tab.
Tap on Rocket Icon from Corner.
Open Pubg Mobile Game and Go to Events Tab.
Go to Extreme Treasure Banner From Event Tab.
Tap on Rocket Icon from Corner.
Tap anywhere on image and you will get 1 Premium Crate for free.
Open it and Get a chance to win Legendary Item.
[Working] Get Silver Fragments, BP Coins & Bonus Challenge Vouchers Free
Open Pubg Mobile Game and Go to Events Tab.
Tap on Recommended Tab and Go to Weekly Reports.
Move towards bottom of that Page and Collect everything.
Go to your Mail Box and Redeem your Rewards. You can Collect all this every Week as per your Gameplay.
Uncategorized

How do I hack someone computer or mobile by his/her ip address?

 How do I hack someone computer or mobile by his/her ip address? 
First of all you need to know the difference between the two types of ip address,i.e.
 static ip and dynamic ip.
 Most of the people doesn\’t have a static ip. Only some big organization or companies have static ip address. On the other hand almost every common person have dynamic ip connection. Dynamic ip means that, every time you disconnect and reconnect to the internet, your system is assigned a completely new ip address.
 Whereas in static ip, it doesn\’t matter how many times you reconnect to the internet, your ip would be the same everytime
If you are planning to attack someone who is having a static ip connection then you can move on. But if the victim is having a dynamic ip connection then you can not guess the validity of that ip.
 In this case if the victim disconnects and reconnect to the internet then you have to obtain the ip address once again. So i think you got the differences between the two types of ip address by now.
Now back to the question. Even if you have the victim\’s ip address, its not going to help you unless there is a backdoor in the victim\’s system. By backdoor, i mean an open port that can listen to and reply back to your data packets. This can even be done if there is a vulnerable application present in victim\’s system. The best example of a backdoor is something known as the trojan horse or RAT standing for remote administration tool. So i think you\’ve got answer to your question.
Uncategorized

How to Create Bins

 How to Create Bins By darkweb 
#mostrequestedtutorial #hacks 
Before you start, you should know one thing, there are two types of trial CC Verification in Premium Accounts trial Or to purchase Any stuffs online.
First one is Validity Check Trial.
-> This type of trial just checks CC EXP CVV Validation and starts your trial.
-> Very Very easy to bypass their verification.
-> Eg. Tidal,(or any new shopping website) 
The second one is the Authorisation Hold trial.
-> This type of trial makes an authorisation hold on the card for 1 USD.
-> It also has a verification system to verify cardholder name if the card is VBV.
-> Eg. Netflix, PayPal, Amazon etc
For Finding a bin you need the following things Needed before starting Work
=> Hardworking
=> Patience
=> CC Generator
=> CC Checker
=> Good Internet connection
=> VPN (Premium)
Now if you want to find a bin for the second type of Premium Accounts Or Shoping Online you should follow the STEPS:-
Step 1:- 
 Go to Country/BANK to BIN websites like
Ex: https://www.bincodes.com/bin-search (They are more website but I personally recommend this one)
 Step 2:- 
Choose Any Country you want (Mainly Low secured countries like OMAN, UAE, USA and etc)
Step 3:- 
Choose Small Banks (They are less secured)
Step 4:- 
Choose one BIN of Debit card (not credit)
Step 5:- 
Generate CC with it
Step 6 :- 
Check with it
 Step 7 :- 
Get lives one
 Step 8 :- 
Test it
Step 9:- 
 Start from The step 2 again till you get working one.
For type 1 Trials:
Choose USA, CAPITAL ONE Mastercards.
1) Choose one BIN of Debit level card (not credit)
2) Generate CC with it
3)Check with it
4)Get lives one
5)Test it
Do Again and again till you get working one 
Don’t forget to change your IP to the CC Countries IP.
I hope you guys understand it.
Uncategorized

Hack anyones social media account easy way (spam)

Hack anyones social media account easy way (spam)
Many of you have demanded how to hack social media accounts without brute force (the best but most tedious method)
So here is the easiest method for you 
Request Desktop site for using full Website
 Step.1: Go to Z-shadow.co 
Step.2: Sign Up\’ make sure you don\’t forget your username\’ Email and Password.
 Step.3: choose what you want to hack. then on there tap on ENGLISH Option a small box will pop up\’ copy the link and send it to the person you wanna hack\’ tell him / her it\’s for free 2 Millions of Followers\’ (use any trick to get them to click it and login) Use your creativity. 
 If he logs in then hes hacked! Last Step: Now you just have to go to Z-Shadow and go to Total Victims\’ there you\’ll see the person\’s login details! 
⚠️ Please note that this is only for educational purposes. Do not use it to gain unlawfull access.
Remember you are a white hat hacker.
Old and good method for noobs. 
Uncategorized

How To Get Free Microsoft Free VPS For 24/7 (1 Months)Private Method

How To Get Free Microsoft Free VPS For 24/7 (1 Months)
Private Method
2. Create a Virtual Machine with Windows or Linux and make sure to select a low spect(2 cpus, 4gig ram etc) so your free credits last.
3. Once you\’ve set up your specs and user/password, deploy the VM in cloud. 
4. Once the VM has been created, go to the info menu and select the Connect option (RDP is the best option) 
5. Wait for windows to load, start twitch on a browser and hop on a stream with \”Drops\”; select the lowest resolution possible and also remove the \”Low Latency\” option in the stream settings. 
6. Check every couple of hours that your VM is still working properly. 
7. After some time, you\’ll receive a key given that you have run that stream for a lot of hours. Ms will ask for your CC to verify this account and give you 170 $ worth of free credits for 31 days.After your trial ends, you can still use their \”Always Free\” services which are limited.
Uncategorized

HOW TO BYPASS URL SHORTNER

​​ HOW TO BYPASS URL SHORTNER 
ғᴏʀ ʙʏᴘᴀssɪɴɢ ᴜʀʟ sʜᴏʀᴛᴇɴᴇʀs ᴀɴᴅ ᴀᴜᴛᴏᴍᴀᴛɪᴄᴀʟʟʏ ᴘʀᴏɢʀᴇssɪɴɢ, ᴅᴏ ᴛʜᴇsᴇ sᴛᴇᴘs.
1) ᴅᴏᴡɴʟᴏᴀᴅ ᴛʜᴇ ᴇxᴛᴇɴsɪᴏɴ ᴛᴀᴍᴘᴇʀᴍᴏɴᴋᴇʏ ᴏɴ ᴇɪᴛʜᴇʀ ᴄʜʀᴏᴍᴇ ᴏʀ ғɪʀᴇғᴏx
2) ɢᴏ ᴛᴏ ᴛʜɪs ᴡᴇʙsɪᴛᴇ: adsbypasser.github.io
3) ɪɴsᴛᴀʟʟ ᴛʜᴇ ᴇʟɪᴛᴇ ᴠᴇʀsɪᴏɴ sᴄʀɪᴘᴛ (ɪᴛs ғʀᴇᴇ) ᴀɴᴅ ᴛʜᴇʀᴇ ʏᴏᴜ ɢᴏ.
ɴᴏᴡ ʏᴏᴜ ᴄᴀɴ ᴠɪsɪᴛ ᴀɴʏ ᴀɴɴᴏʏɪɴɢ sʜᴏʀᴛᴇ .sᴛ ᴏʀ ᴀɴʏ ᴏᴛʜᴇʀ ᴜʀʟ sʜᴏʀᴛᴇɴᴇʀ ᴀɴᴅ ᴛʜᴇ sᴄʀɪᴘᴛ ᴡɪʟʟ ʙʏᴘᴀss ᴛʜᴇ ᴛɪᴍᴇ ᴛʜᴀᴛ ʏᴏᴜ ʜᴀᴅ ᴛᴏ ᴡᴀɪᴛ ʙᴇғᴏʀᴇ
 ᴄᴏᴘʏ ᴡɪᴛʜ ᴄʀᴇᴅɪᴛs ᴇʟsᴇ ɢᴇᴛ ғᴜᴄᴋᴇᴅ ɪ ᴍ ᴠᴇʀʏ sᴇʀɪᴏᴜs ɴᴏᴡ ʀᴇɢᴀʀᴅɪɴɢ ᴄᴏᴘʏɪɴɢ ᴡɪᴛʜᴏᴜᴛ ᴄʀᴇᴅɪᴛs 
Uncategorized

HOW TO UNBLOCK YOURSELF ON WHATSAPPIF SOMEONE BLOCKS YOU

HOW TO UNBLOCK YOURSELF ON WHATSAPP
IF SOMEONE BLOCKS YOU 
Step 1: Write down your blocker’s phone
number
If you have the contact that blocked you saved
on your phone, write it down somewhere and
delete it from your phone.
Step 2: Back up your chats
I believe you already know how to back up your
WhatsApp chat (both messages and media files).
Well, if you don’t then here is a quick guide to
creating a Google Drive backup:
Open WhatsApp.
Go to Menu Button > Settings > Chats > Chat
backup.
 Tap Back up to Google Drive and set up the
backup frequency to your liking.
 You will be prompted to select a Google
account that you will back up your chat history
to. If you do not have a Google account, tap Add
account when prompted. Please remember the
Google account you are using for the backup.
 Tap Back up over to choose the network you
wish to use for backup. Please note that backing
up over cellular may result in additional data
charges.
Step 3: Delete your WhatsApp account Go to account settings on your WhatsApp and
delete your account.
By deleting your number, it means you are no
longer active on WhatsApp so technically, you
cannot block someone who’s not on WhatsApp.
Whoever blocks you will no longer have you on
the blocked list.
Step 4: Clear WhatsApp data
 Now go to your phone settings > app >
WhatsApp and clear the data.
Step 5: Reactivate WhatsApp
 Open your WhatsApp and register your
number on the WhatsApp platform. This time,
you are registering for the first time over again.
Step 6: Restore Chats
 Restore your chat back up.
 Make sure the same Google account that
was used to perform the backup has been added
to your phone.
 Uninstall and reinstall WhatsApp.
 After verifying your number, you will be
prompted to restore your messages and media
from Google Drive.
 After the restoration process is complete,
tap Next and your chats will be displayed once
initialization is complete.
 After restoring your chats, WhatsApp will
begin restoring your media files.
NOTE: You need to restore from the backup on
your google drive but if you didn\’t do so,
WhatsApp will automatically restore the backup
from your local storage memory which could be
SDcard or phone internal memory as the case
may be.
Step 7: Re-add contact
Lastly, save the contact you wrote down earlier
back on your phone. Now look for the person/
contact that blocked you in the first place and
send a message.
This is how to unlock your WhatsApp account
whenever someone blocks you.
I hope this is helpful.
Uncategorized

Advance Android Programming and Developing Course.

Advance Android Programming and Developing Course. 
FREE OF COST 
WHICH COST $ 1000 💵 
DOWNLOAD LINK 🔗 :
Who this course Designed and Made for?
Those people love Security.
Those people love Hacking.
Those people want to increase the Security page in your application.
Those people have business with Application.
FOLLOW THE DOWNLOAD INSTRUCTIONS WHICH GIVEN IN WEBSITE TO DOWNLOAD..
( COVERED ALL THE LATEST ADVANCE LEVEL METHODS ) 2020
DOWNLOAD LINK 🔗 :
COPY WITH CREDITS LIMITED EDITION 
SHARE AND SUPPORT US ON 
Uncategorized

3 reasons why encryption matters

 3 reasons why encryption matters 
━━━━━━━━━━━━━
Why is encryption important? Here are three reasons:
1⃣ Internet privacy concerns are real
━━━━━━━━━━━━━
Encryption helps protect your online privacy by turning personal information into “for your eyes only” messages intended only for the parties that need them — and no one else.
You should make sure that your emails are being sent over an encrypted connection, or that you are encrypting each message.
Most email clients come with the option for encryption in their Settings menu, and if you check your email with a web browser, take a moment to ensure that SSL encryption is available.
2⃣ Hacking is big business
━━━━━━━━━━━━━
Cybercrime is a global business, often run by multinational outfits.
Many of the large-scale data breaches that you may have heard about in the news demonstrate that cybercriminals are often out to steal personal information for financial gain.
3⃣ Regulations demand it
━━━━━━━━━━━━━
The Health Insurance Portability and Accountability Act (HIPAA) requires healthcare providers to implement security features that help protect patients’ sensitive health information online.
Institutions of higher learning must take similar steps under the Family Education Rights and Privacy Act (FERPA) to protect student records.
Retailers must contend with the Fair Credit Practices Act (FCPA) and similar laws that help protect consumers.
Encryption helps businesses stay compliant with regulatory requirements and standards. It also helps protect the valuable data of their customers.
━━━━━━━━━━━━━
Uncategorized

How to increase Virtual RAM to Make Your System Faster

How to increase Virtual RAM to Make Your System Faster
1. Press and Hold down the \’Windows\’ Key and Press the \’Pause/Break\’ button at the top right of your keyboard. Or simply Right-Clicking \’My Computer\’ and then Select \’Properties\’.
2. Click on the \’Advanced\’ tab.
3. Under \’Performance\’, click \’Settings\’.
4. Then click the \’Advanced\’ tab on the button that pops up.
5. Under \’Virtual Memory\’ at the bottom, click \’Change\’.
6. Click the \’Custom Size\’ button.
7. For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although I use 4000), and for the Maximum size type in anywhere from 2000-2500 (although I use 6000).
8. Click \’Set\’, and then exit out of all of the windows.
9. Finally, Restart your computer.
10. You now have a faster computer and 1-2GB of Virtual RAM.
Uncategorized

Types Of Encryption

Types Of Encryption 
━━━━━━━━━━━━━
There are several types of encryption, each developed with different needs and security needs in mind. Here are the most common examples of encryption.
Data Encryption Standard (DES)
━━━━━━━━━━━━━
Data Encryption Standard is considered a low-level encryption standard. The U.S. government established the standard in 1977. Due to advances in technology and decreases in the cost of hardware, DES is essentially obsolete for protecting sensitive data.
Triple DES
━━━━━━━━━━━━━
Triple DES runs DES encryption three times. Here’s how it works: It encrypts, decrypts, and encrypts data — thus, “triple.” It strengthens the original DES standard, which became regarded as too weak a type of encryption for sensitive data.
RSA
━━━━━━━━━━━━━
RSA takes its name from the familial initials of three computer scientists. It uses a strong and popular algorithm for encryption. RSA is popular due to its key length and therefore widely used for secure data transmission.
Advanced Encryption Standard (AES)
━━━━━━━━━━━━━
Advanced Encryption Standard is the U.S. government standard as of 2002. AES is used worldwide.
TwoFish
━━━━━━━━━━━━━
Twofish is considered one of the fastest encryption algorithms and is free for anyone to use. It’s used in hardware and software.
━━━━━━━━━━━━━
Uncategorized

How is Telegram better than Whatsapp

How is Telegram better than Whatsapp
1. Cloud storage
Telegram has cloud storage. Means all your text messages, images media files & documents will be saved on their cloud. You can log out and log in any number of times from any number of devices simultaneously without losing any data, you don’t need to worry about backup & restore. You can view the active sessions and see on which devices are you logged in now. There by you can download any file any time anywhere.
2. Media compression
User can choose whether to compress the image and video or send the uncompressed version.
3. Group member number capacity
A normal group capacity in Telegram is 200. But when this is reached the Group transforms to a Super Group with capacity of 5000. (A Super Group has some more features than a Normal Group)
4. Username feature
You can communicate with any one on telegram even if you doesn\’t have the contact number of other. This ensure the privacy of user’s contact number.
5. Channels
A channel is somewhat similar to groups, which can accommodate unlimited number of members. The creator of channel can decide who can post and other members can view the posts.
6 Multi platform support
Telegram is available for Android, ios,windows phone,windows pc , Mac os, Linux os and even through any browser.
7. Secret chat
Secret chat is a kind of end to end encrypted chat in which one can set self-destruct timer.The messages will be automatically deleted when the timer hits.It is not hackable in any way.
8. Bots
It is a piece of program which is based on AI and machine learning in small level. It can perform various tasks.For example an image bot can fetch images from name.
There are multiple types of bots.Popular bots are Image bot, sticker bot, gif bot.
9. Voice calls
Latest version of telegram supports voice calls.
10. Sends any kind of file
Users can send any kind of file through Telegram. Whatsapp limits video, images & document type files. This is not nice for advanced users.
11. Multiple sessions
Users on telegram can login on multiple devices on same time and received messages on every device.
They can remember their sessions on even browser too. This is a cool feature.
Uncategorized

CCNA Complete Courses Free Download

CCNA Complete Courses Free Download 

 The Cisco Certified Network Associate (CCNA) certification is the second level of Cisco’s five-level career certification process. A CCNA certification certifies a technician’s ability to install, set up, configure, troubleshoot and operate a medium-sized routed and switched computer network. This also includes implementing and verifying connections to a wide area network (WAN).
◾️ CCNA Security Latest Course Download:
◾️ CCNA Wireless Latest Course Download:
◾️ CCNA Service Provider Latest Course Download:
◾️ CCNA Cyber Ops Latest Course Download:
◾️ CCNA Data Center Latest Course Download:
◾️CCNA Routing and Switching Latest Course Download:
◾️CCNA Cloud Latest Course Download:
◾️ CCNA Collaboration Latest Course Download:
Uncategorized

Symmetric & Asymmetric Encryption: What’s The Difference?

Symmetric & Asymmetric Encryption: What’s The Difference? 
━━━━━━━━━━━━━
An encryption key is a series of numbers used to encrypt and decrypt data. Encryption keys are created with algorithms. Each key is random and unique.
There are two types of encryption systems: symmetric encryption and asymmetric encryption. Here’s how they’re different.
Symmetric encryption uses a single password to encrypt and decrypt data.
Asymmetric encryption uses two keys for encryption and decryption. A public key, which is shared among users, encrypts the data. A private key, which is not shared, decrypts the data.
━━━━━━━━━━━━━
Uncategorized

4 Most Popular Refunding Methods. [ 4 Methods Combined ]

 4 Most Popular Refunding Methods. [ 4 Methods Combined ]
IF YOU DO ANYTHING ILLEGAL WITH IT I SHALL NOT HELD RESPONSIBLE , THIS GUIDE IS FOR EDUCATIONAL PURPOSE ONLY
Alright so i\’ve decided to put all the known refund methods into 1 thread to make it easier for people and also because every \”new refunding method\” people post here just repeats itself over 1000 times in different threads and its just spam at this point.
 
With those methods you can start earning somewhere from 40-700$ per order
and some of them literally take 5-10 minutes in a call or live chat. (done it myself too)
 
So lets get into them
 
Some backround regarding account you are doing the refunds with.
It\’s better to do from old accounts with a few legit orders and wait a period of atleast 3 months from refund to refund and legit orders if you want to refund the same store.
METHOD 1 :
1. Called DNA (Did not arrive)
This method is very simple and self explanatory
1.You order the item , receive it (from what i\’m hearing from my customers is due to the covid-19 situations most stores just leave it in the building and you don\’t even need to sign so they have no proof you ever received it.
2. You wait at least 2 days after receiving the product
3. Go to live chat and say that the item hasn\’t arrived.
4. They will most likely ask if you checked with your neighbors/garage/porch basically everything near you.
5. You say you did and couldn\’t find the item.
6. The rep will check his options and will usually offer you either a replacement or a refund.
7. If the rep says he wants to launch an investigation with the courier you immediately hang up the call or the live chat and go quickly start a new one and repeat the steps above.
8. Repeat steps 3 to 6 until you get offered a replacement/refund.
* Some tips and tricks
1. They will not start an investigation without your knowledge that\’s why you need to hang up the moment you see that word.
2. You need to be likeable to the rep and nice so ask him/her how its going and are they staying safe due to the covid situation.
3. Make a story that the product was a gift for your relative\’s birthday or to your wife or niece. Just make it sound so the rep will feel sorry for you and would want to offer you the quickest help which is a replacement/refund without depressing you even more.
4. I personally suggest using this method only on orders that weren\’t signed on receival and no more than 300$ (of course you can use it on 1k$ items too its just my personal advice)
Method 2 : 
2. Called EB (Empty box)
this method also very simple to execute and takes between 5-30 minutes to get the refund confirmation
1.You order the item , receive it
2.You wait atleast 2 days after receiving the product.
3.Start a live chat with the rep , greet him/her , ask how are they doing and if they are safe during this horrible pandemic.
4.say that you have ordered the product as a present for your nephew/son/wife and when they opened it they are so dissapointed that the box was empty and that it was the most emberassing moment of your life.
4.If the rep asks you if the box was damaged you simply reply no that it isn\’t damaged and completely intact. (to avoid courier investigation)
5.The rep will offer you a replacement/refund.
*Some tips and tricks.
1. You need to be likeable to the rep and nice so ask him/her how its going and are they staying safe due to the covid situation.
2. Make a story that the product was a gift for your relative\’s birthday or to your wife or niece. Just make it sound so the rep will feel sorry for you and would want to offer you the quickest help which is a replacement/refund without depressing you even more.
3. You can add that you are a long time customer and ordered multiple times and never imagined such a scenario could happen that a big company will deliver you an empty box.
4. I personally suggest using this method only on orders below 1,000$ (even 800-1000 can be tricky sometimes)
Method 3 & 4 Coming Soon..