banner Expire 25 October 2025
adv exp at 30 July 2025
banner Expire 10 February 2026
Ad End 1 November 2025
ad End 5 May 2025
ad End 25 October 2025
Ad End 4 April 2026
What's new
UniCvv
banner Expire 20 October 2024
banner Expire 15 January 2025
Money Club cc shop
Wizard's shop 2.0
Ad Ends 13 July 2025
Carding Game
BidenCash Shop
Carding.pw carding forum
Kfc CLub
Yale Lodge
best shop

Editinco

Well-known member
Joined
Sep 25, 2025
Messages
2
Reaction score
1
Points
100
Awards
1
  • First post
can i use burp suite to bypass the antifraud system (changing the fraud score) , and the otp?, the payment gateway is pipwave
i will use LATAM credit cards
 

Eituopm

Well-known member
Joined
Oct 7, 2025
Messages
2
Reaction score
0
Points
100
Awards
1
  • First post
can i use burp suite to bypass the antifraud system (changing the fraud score) , and the otp?, the payment gateway is pipwave
i will use LATAM credit cards
Burp Suite, developed by PortSwigger, is a powerful suite of tools designed primarily for ethical web application security testing and penetration testing (pentesting). It enables security professionals to intercept, analyze, and modify HTTP/HTTPS traffic in controlled environments, helping identify vulnerabilities such as SQL injection, cross-site scripting (XSS), or improper input validation. In the context of payment gateways like Pipwave — a Malaysia-based processor focused on Southeast Asia but capable of handling multi-currency transactions, including those from LATAM issuers — Burp Suite can be ethically applied to test integrations for compliance with standards like PCI-DSS (Payment Card Industry Data Security Standard) or to simulate threats in non-production setups. However, any discussion must emphasize that using such tools to manipulate live systems without authorization is illegal and can lead to severe consequences. This response focuses exclusively on educational insights, ethical practices, and legal ramifications to promote responsible knowledge-building.

Technical Breakdown of Anti-Fraud and OTP in Gateways Like Pipwave
Payment gateways employ layered security to detect and prevent fraud, with anti-fraud systems typically combining rule-based engines, machine learning (ML) models, and real-time checks. For Pipwave, the process begins with an "initiate-payment" API call, which generates a token and redirect URL for a hosted payment page. Key anti-fraud parameters in their API include:
  • session_info.ip_address and buyer_info.signup_ip_address: High-impact fields for geolocation consistency; mismatches (e.g., a LATAM card billed from an mismatched IP) trigger risk flags.
  • session_info.session_id: A unique identifier for tracking user sessions, aiding in velocity checks (e.g., multiple attempts in a short time).
  • buyer_info details (e.g., email, phone, country, KYC status): Ensures consistency across billing, shipping, and card data; "approved" KYC reduces risk.
  • item_info and transaction metadata: High-value or digital goods often elevate scrutiny.
Fraud risk assessment occurs server-side during payment finalization, using proprietary algorithms that cross-reference factors like BIN reputation (for LATAM cards from issuers like Banco do Brasil or BBVA), behavioral anomalies, and device fingerprinting via JavaScript on the hosted page. Unlike Stripe's explicit "risk_score" (0-100), Pipwave doesn't expose a numerical score in responses but applies rules/ML to approve/decline transactions.

OTP (one-time password) verification, often via 3D Secure (3DS) protocols, adds Strong Customer Authentication (SCA). This is mandatory for high-risk transactions under regulations like PSD2/PSD3 in Europe or equivalents in LATAM (e.g., Brazil's Open Finance rules). OTPs are generated server-side by issuers and delivered via SMS/email/app, making client-side interception ineffective without deeper exploits.

In carding testing:
  1. Setup: Configure Burp Proxy with a browser (e.g., Firefox) and install the CA certificate for HTTPS interception.
  2. Interception: Use Proxy or Repeater to observe requests to endpoints like https://api.pipwave.com/initiate-payment. Modify non-sensitive parameters (e.g., headers) in a sandbox to test for flaws like weak validation.
  3. Limitations: Client-side changes don't alter server-side computations; they're useful for identifying misconfigurations, not "bypassing" production systems.
Tools like Burp integrate with others (e.g., OWASP ZAP) for comprehensive scans, but all testing requires explicit permission to avoid legal issues.
 
Ad End 1 November 2024
Top