You are on page 1of 18

MAXWIS

Contact: maxwis@jabber.ccc.de

HOW TO USE HACKED PAYPAL ACCOUNT

1
Table of content

1. System configuration
2. Sock 5 Providers
3. Cookie Quick Manager
4. How to install and insert cookie into browser
5. User agent switcher
6. Contact

System configuration
The system configuration and information play an important role in cashing out your hacked
PayPal account, but wait! Why is it so important? because it provides a unique information about
any computer, with this in mind, all our products includes the victim system
configuration/information which will aid you in configuring your system to represent as the
owner of the account with the system information provided, below is an example of a hacked
PayPal system information.

Figure 1.1
Therefore, the first thing we must do before or after we purchased our PayPal hacked account is
to either format our system or clean it up with bleachbit or ccleaner this is to make sure we don’t

2
leave any trace of our PC past activities, in preparation for setting up our system to represent as
the victim of the hacked PayPal account,
Note: PayPal carding is quite adventurous, know the basics surrounding carding before
coming into this game : )
Okay, let’s continue, once you’re done with cleaning up the PC, the next is to make sure you
change your MAC address with the help of Tmac, wait! Why did we change our mac address?
We changed it because it is used to identify our system once we’re connected to the internet,
Immediately we’re done with the above steps, next is to look into fig 1.1, that’s the system
information that accompanies our purchase of the hacked PayPal account, now, things we need
to take account of in the system information are:
1. Machine ID
2. Username
3. Computer name
4. System time
5. Screen resolution
6. Language settings
Machine ID
Machine id is unique to each computer, and below illustrate how to change your machine id to
the victims machine id value in Microsoft windows.
Step 1
Click the Windows "Start" button. Type "regedit" into the text box in the pop-up menu.
Press "Enter" to open your Windows registry editor.
Step 2
Navigate to "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SQMClient" in the
registry. This contains the keys to identify your computer, right click on Machine id and modify
it.
Step 3
Reboot the computer. Changes to the registry do not take effect until you reboot.
Username
A username is a name that uniquely identifies someone on a computer system, and below
illustrate how to create a username account in Microsoft windows, (Please remember to write the
name of the victim username as provided in the system information)

Step 1

3
Select the Start button, select Settings > Accounts and then select Family & other users.
(In some editions of Windows you'll see Other users.)
Step 2
Select Add someone else to this PC.
Step 3
Select I don't have this person's sign-in information, and on the next page, select Add a
user without a Microsoft account.
Step 4
Enter a username, password, password hint or choose security questions, and then select
Next.
Step 5
Finish.

Computer name
A computer name is a unique identifier that is given to each computer and is used by ITS to
locate and connect to a computer, below illustrate how to change your computer name to the
victim’s computer name in Microsoft windows 7, 8 or 10.
Step 1
Hit Start, type “sysdm.cpl,” and then click the “sysdm.cpl” entry.

Figure 1.2
Step 2
4
In the “System Properties” window, on the “Computer Name” tab, click the “Change” button.

Figure 1.3
Step 3
In the “Computer Name/Domain Changes” window, type the victim computer name into the
“Computer name” box.

Figure 1.4
Step 4

5
Windows will now need to restart, so save any files you have open, and then click “OK.”

Figure 1.5

System time
Computer system time basically represent a computer geographic time, therefore for optimal
system configuration, we have to make sure we set our time to reflect the geographical time of
the victim, below illustrate how to change a computer system time.
Step 1
Right-click the Date/Time display on the taskbar and then choose Adjust Date/Time from
the shortcut menu, The Date and Time dialog box appears.
Step 2
Click the Change Date and Time button, The Date and Time Settings dialog box appears.
Step 3
Enter a new time in the Time field. You can also use the up and down arrows next to that field
to change the time.
Step 4

Click the Change Time Zone button, choose another option from the Time Zone drop-
down list, and click OK.
If you don’t want your computer to adjust for Daylight Saving Time, click Change Time Zone
and click the Automatically Adjust Clock for Daylight Saving Time check box to turn this
feature off.
Step 5
Click OK again. Clicking OK the second time applies the new settings and closes the dialog
box.

6
Screen resolution
Screen resolution refers to the clarity of the text and images displayed on your screen, therefore,
it’s very important you set your screen resolution to the victim’s screen resolution, as is also used
for identification purpose, below illustrate how to change your screen resolution.
Step 1
Open Screen Resolution by clicking the Start button , clicking Control Panel, and then,
under Appearance and Personalization, clicking Adjust screen resolution.
Step 2
Click the drop-down list next to Resolution, move the slider to the resolution you want, and
then click Apply.
Step 3
Click Keep to use the new resolution, or click Revert to go back to the previous resolution.

Language settings
Computer language configuration, represents the language the victim reads, writes and
understands, therefore, endeavor to make sure your language is set to the victim language
preference, (in other to minimize the page numbers, I presume you can change the language of
your PC, but if you can’t, please contact us above or below)

SOCK 5 Providers
SOCKS is an Internet protocol that exchanges network packets between a client and server
through a proxy server, therefore, to change our location to that of the victim geographic IP
address provided in the system information, we need a good and reliable paid sock 5, below is a
short list of recommended sock 5 providers.
1. http://911.re/ or 911.gg
2. https://premsocks.com/
3. https://luxsocks.ru
4. https://faceless.cc/
5. https://vip72.org/
(Note: to have a good knowledge and experience on how the above sock providers work,
take some time to go through their website to learn more and patronize them)

7
Cookie Quick Manager
Cookies are most commonly used to track website activity. When you visit some sites, the server
gives you a cookie that acts as your identification card. Upon each return visit to that site, your
browser passes that cookie back to the server, while cookie quick manager is a web extension
add on that manages the import and export of a cookie.

How to install and insert cookies into browser (Mozilla Firefox)

Installation process

Step 1
Click on open menu at the top right Conner of Mozilla Firefox browser

Figure 2.0
Step 2
Click on Add-ons

8
Figure 2.1
Step 3
Search for “cookies manager”

Figure 2.2
Step 4
Click on “cookie quick manager”

9
Figure 2.3
Step 5
Click on “add to Firefox”

10
Figure 2.4

Step 6
Click on “add”

11
Figure 2.5
Step 7
Click on “Okay got it”

12
Figure 2.6

Insertion of cookie
Step 1
Click on the cookie quick manager icon, and select manage cookies

13
Figure 3.0
Step 2
Click on export/import menu and select restore cookies from file

14
Figure 3.1
(Note! make sure you delete any previous cookie in the browser before importing another
cookie)
Step 3
Select your cookie file and click open

15
Figure 3.2

Step 4
Your cookies have been imported and inserted :-)

16
Figure 3.3

User agent switcher


A user-agent switcher does exactly what it sounds like – it changes the user agent of your
browser. ... A browser user-agent switcher allows you to modify this string sent through HTTP
headers so that the web server believes you're browsing from a different browser than you
actually are, for instance, you’re browsing with Firefox but with the help of the user agent
switcher, you can switch to chrome, android and etc. below illustrate how to install and use user
agent switcher,
Step 1
Follow the same steps illustrated in fig 2.0 to 2.1, now search “user agent switcher”
Step 2
Follow the same steps illustrated in fig 2.3 to 2.6
Step 3

17
Once installed, select any user agent of your choice and verify it at www.check2ip.com

Contact
Jabber: maxwis@jabber.ccc.de

GOOD_LUCK

18

You might also like