Many people have been asking me for more tutorials on how to use Burp for a while now. So I figured I’d finally give in and share my knowledge of one of the most powerful tools in your digital arsenal.
Burp is a versatile tool with hundreds of great features that can be used for more than just assessing sites – you can check for vulnerabilities, find hidden endpoints, manipulate web traffic, and mess with those pesky anti-fraud systems blocking your cards. When you know what you’re doing, the possibilities are vast.
Intercepting Requests
You see, when you browse any website, there’s a constant two-way conversation going on. Your browser (the front end) sends requests to the website’s servers (the back end), which process them and send back responses. It’s a digital conversation in which your browser asks you to view products or make purchases, and the server responds accordingly.
Burp Suite inserts itself right into the middle of this conversation as a proxy. It’s digital eavesdropping — you see every request coming out of your browser, and every response coming back. More importantly, you can pause this conversation, edit what’s being transmitted, and then let it continue. The server has no idea you just rewrote the script.
This is important because when you shop online, your browser doesn’t just talk to the main site. It also sends data to hidden antifraud systems like Stripe Radar or Forter, which analyze whether you’re a legitimate user or a fraudster using a bot. With Burp, you can intercept and manipulate both types of traffic — the main site requests and the hidden antifraud callbacks happening behind the scenes.
Bypassing CVV Requirements with Intercept
One common use for Burp, especially among autistic Binners, is to force sites to accept cards without a CVV. Binners generate cards in bulk and verify them with public checkers, but most sites require a CVV, which is why Burp has become such a valuable tool.
Here's a dirty little secret: When you submit your payment information at checkout, your browser sends a POST request containing all of your card details — the number, CVV expiration date, and everything else. Using Burp's Intercept feature, you can intercept this request before it reaches the server and edit it to your liking.
The trick is to either remove the CVV field entirely:
Or replace it with an empty value:
If the merchant’s backend verification is crap (and you’d be surprised how many big retailers screw this up), the payment might still go through. Some payment gateways set the CVV as “optional” rather than required, and lazy developers often don’t implement proper verification. I’ve seen stores before where you could even forge and change the prices of the items you check out.
Other big retailers have similar vulnerabilities that Binners uses to use their generated cards without any CVV codes.
Modifying the AntiFraud Request
Now that you understand the basics of interception, let’s dig deeper. We all know that modern antifraud systems are sneaky scripts. They inject JavaScript code into the pages you view, silently collecting mountains of data about you. These scripts track everything from your device configuration to how you move your mouse.
Here’s what these scripts typically collect:
All this data is packaged and sent to their servers (eg m.stripe.com for Stripe endpoints or forter.com) where AI systems decide whether you are a legitimate or suspicious person.
These systems know that their data can be tampered with, so they try to hide it from prying eyes. They:
But here’s the dirty truth: Security through obscurity is about as effective as that 414720 you bought for $1. These systems have to send data in a format your browser can handle, meaning it’s available for use if you know where to look.
Case in point: Riskified at Booking.com
Let’s get our hands dirty with Riskified, one of the most well-known fraud prevention systems out there, blocking carders left and right. Unlike some half-assed security measures, this one actually has some teeth.
First we need to set up interception rules in Burp Suite:
Now browse the site, select a flight, and try to go to the checkout page. Most likely, you will first go to:
beacon.riskified.com
Once connected here, it loads the JS needed to fingerprint your system. This isn't random data collection - it's a full digital cavity search that tries to send everything about you to:
c.riskified.com
Because we've set up interception, the fingerprint won't be sent to Riskified's servers. If you check the HTTP logs panel, you'll see that it's trying to send an obfuscated payload containing your digital DNA:
Deobfuscation
Antifraud sites hide your device fingerprint because if they didn't, spoofing would be child's play. It's like hiding your house key - sure, it's still there, but at least it makes the thief work.
Decrypting the code takes skill, but it's not rocket science. You just have to reverse engineer how JS created the payload. For those of you with an IQ below 70, just turn to AI. And if you're feeling smart, thinking it's just Base64 for Riskified (though many of them just use Base64 encoding), it's not:
But you know me, I love you all, so for this demo I have developed a tool that will help decrypt device fingerprints from popular antidetect solutions. For this demo I have included Riskified, but will add most antifraud providers soon.

BinX - binx.cc
To make things easier, go to the antifraud deobfuscation tool on BinX, select Riskified and paste our intercepted payload.
After deobfuscation, your device fingerprint data looks like an open book.
Then you can make strategic changes to improve trust factors and match your target profile:
Which I'll cover in the future too, but it shouldn't be that hard to know what to change. Just look at the data and use your giant brain.
Once you've made the changes, mask that shit again and replace the payload on the interceptor and FORWARD the request.
This process links your fabricated device fingerprint to your cookie. The system thinks you’re just another legitimate customer, not the digital fraudster you really are.
Conclusion
Manipulating antifraud systems with Burp Suite is like using a digital disguise kit. You’re not just changing your appearance — you’re changing what security cameras see. By placing Burp between your browser and these systems, you can feed them any device fingerprint you want, even without using antidetect.
Success depends on understanding what these systems are collecting and how they interpret it. Analyze your Burp logs to learn about antifraud requests before you interfere with them. Look for patterns in the JSON data. The more you understand what they’re checking, the more accurately you can manipulate it.
Remember: effective digital deception isn’t about being invisible — it’s about looking so normal that they never think to look twice.
Remember, we’ve barely scratched the surface of what Burp Suite can do. This beast of a tool has dozens of modules and hundreds of features I haven’t even touched on, from automated scanning to SQLi vulnerability scanning to endpoint fuzzing. It’s a complex tool that rewards those who take the time to master it. I’ll cover more advanced techniques in future tutorials.
Cheers to all carders. See you soon!
(c) Contact the author here: d0ctrine
Burp is a versatile tool with hundreds of great features that can be used for more than just assessing sites – you can check for vulnerabilities, find hidden endpoints, manipulate web traffic, and mess with those pesky anti-fraud systems blocking your cards. When you know what you’re doing, the possibilities are vast.
Intercepting Requests
You see, when you browse any website, there’s a constant two-way conversation going on. Your browser (the front end) sends requests to the website’s servers (the back end), which process them and send back responses. It’s a digital conversation in which your browser asks you to view products or make purchases, and the server responds accordingly.
Burp Suite inserts itself right into the middle of this conversation as a proxy. It’s digital eavesdropping — you see every request coming out of your browser, and every response coming back. More importantly, you can pause this conversation, edit what’s being transmitted, and then let it continue. The server has no idea you just rewrote the script.
This is important because when you shop online, your browser doesn’t just talk to the main site. It also sends data to hidden antifraud systems like Stripe Radar or Forter, which analyze whether you’re a legitimate user or a fraudster using a bot. With Burp, you can intercept and manipulate both types of traffic — the main site requests and the hidden antifraud callbacks happening behind the scenes.
Bypassing CVV Requirements with Intercept
One common use for Burp, especially among autistic Binners, is to force sites to accept cards without a CVV. Binners generate cards in bulk and verify them with public checkers, but most sites require a CVV, which is why Burp has become such a valuable tool.
Here's a dirty little secret: When you submit your payment information at checkout, your browser sends a POST request containing all of your card details — the number, CVV expiration date, and everything else. Using Burp's Intercept feature, you can intercept this request before it reaches the server and edit it to your liking.
The trick is to either remove the CVV field entirely:
Code:
{"card_number":"4111111111111111","expiry":"12/25""billing_zip":"10001"}
Or replace it with an empty value:
Code:
{"card_number":"4111111111111111","expiry":"12/25""cvv":"","billing_zip":"10001"}
If the merchant’s backend verification is crap (and you’d be surprised how many big retailers screw this up), the payment might still go through. Some payment gateways set the CVV as “optional” rather than required, and lazy developers often don’t implement proper verification. I’ve seen stores before where you could even forge and change the prices of the items you check out.
Other big retailers have similar vulnerabilities that Binners uses to use their generated cards without any CVV codes.
Modifying the AntiFraud Request
Now that you understand the basics of interception, let’s dig deeper. We all know that modern antifraud systems are sneaky scripts. They inject JavaScript code into the pages you view, silently collecting mountains of data about you. These scripts track everything from your device configuration to how you move your mouse.
Here’s what these scripts typically collect:
- Browser fingerprints (user agent screen resolution, installed fonts)
- Hardware Info (GPU information via CPU cores running WebGL)
- Mouse movements and click patterns (speed, natural jitter vs. bot-like trajectories)
- Typing rhythm (how fast you type, pauses between keystrokes)
- Are you using a headless browser or automation tools (Selenium etc.)
All this data is packaged and sent to their servers (eg m.stripe.com for Stripe endpoints or forter.com) where AI systems decide whether you are a legitimate or suspicious person.
These systems know that their data can be tampered with, so they try to hide it from prying eyes. They:
- Encode their payload in Base64
- Use character substitution (for example, replace a' with x' and vice versa)
- Hide your JavaScript code
- Split data between multiple requests
- Use custom encoding schemes
But here’s the dirty truth: Security through obscurity is about as effective as that 414720 you bought for $1. These systems have to send data in a format your browser can handle, meaning it’s available for use if you know where to look.
Case in point: Riskified at Booking.com
Let’s get our hands dirty with Riskified, one of the most well-known fraud prevention systems out there, blocking carders left and right. Unlike some half-assed security measures, this one actually has some teeth.
First we need to set up interception rules in Burp Suite:
- Go to Proxy > Options > Intercept Client Requests
- Add rule: AND domain name matches c.riskified.com
- Disable response interception
Now browse the site, select a flight, and try to go to the checkout page. Most likely, you will first go to:
beacon.riskified.com
Once connected here, it loads the JS needed to fingerprint your system. This isn't random data collection - it's a full digital cavity search that tries to send everything about you to:
c.riskified.com
Because we've set up interception, the fingerprint won't be sent to Riskified's servers. If you check the HTTP logs panel, you'll see that it's trying to send an obfuscated payload containing your digital DNA:
Deobfuscation
Antifraud sites hide your device fingerprint because if they didn't, spoofing would be child's play. It's like hiding your house key - sure, it's still there, but at least it makes the thief work.
Decrypting the code takes skill, but it's not rocket science. You just have to reverse engineer how JS created the payload. For those of you with an IQ below 70, just turn to AI. And if you're feeling smart, thinking it's just Base64 for Riskified (though many of them just use Base64 encoding), it's not:
But you know me, I love you all, so for this demo I have developed a tool that will help decrypt device fingerprints from popular antidetect solutions. For this demo I have included Riskified, but will add most antifraud providers soon.

BinX - binx.cc
To make things easier, go to the antifraud deobfuscation tool on BinX, select Riskified and paste our intercepted payload.
After deobfuscation, your device fingerprint data looks like an open book.
Code:
{
"lat": 37.7749,
"timezone": 240,
"timestamp": "1689452187394",
"cart_id": "7629384105",
"shop_id": "cf.bstatic.com",
"referrer": "https://secure.booking.com/",
"href": "https://cf.bstatic.com/static/tag_container/tag_container/a077563c1795a773c91150dd19adefe98d13fd65.html",
"riskified_cookie": "p8jkl352qxnrtyuvcbm7fds9ghzwe6",
"color_depth": 24,
"page_id": "9xzp4r",
"shop": "www.booking.com",
"hardware_concurrency": 8,
"has_touch": true,
"history_length": 7,
"document_title": "Booking.com",
"console_error": "console.memory is undefined",
"battery_error": "Error getBattery()",
"initial_cookie_state_0": "https",
"initial_cookie_state_1": "persistent",
"browser": {
"productsub": "20030107",
"is_opr": true,
"is_firefox": false,
"ev_len": 42
},
"os": {
"cpu": "Windows NT 10.0",
"platform": "Win32"
},
"webgl": {
"vendor": "Google Inc.",
"renderer": "ANGLE (Intel, Intel(R) UHD Graphics 620, OpenGL 4.5)"
},
"resolution": {
"dpr": 1.5,
"screenh": 1080,
"screenw": 1920,
"availh": 1040,
"availw": 1920,
"innerh": 900,
"innerw": 1600,
"outerh": 1040,
"outerw": 1920
},
"date_string": "Fri Mar 25 2025 14:23:07 GMT-0400 (Eastern Daylight Time)",
"intl": {
"locale": "en-GB",
"num_sys": "latn",
"cal": "gregory",
"tz": "America/New_York"
},
"downlink_error": "navigator.connection is undefined",
"nav_plu": "Chrome PDF Plugin,Chrome PDF Viewer,Native Client",
"nav_lang": "en-GB",
"page_language_data": {
"page_language": "en",
"has_translation": true
},
"incognito": {
"safari": true,
"chrome_quota": 120,
"service_worker_undefined": false,
"is_brave": true
}
}
Then you can make strategic changes to improve trust factors and match your target profile:
Which I'll cover in the future too, but it shouldn't be that hard to know what to change. Just look at the data and use your giant brain.
Once you've made the changes, mask that shit again and replace the payload on the interceptor and FORWARD the request.
This process links your fabricated device fingerprint to your cookie. The system thinks you’re just another legitimate customer, not the digital fraudster you really are.
Conclusion
Manipulating antifraud systems with Burp Suite is like using a digital disguise kit. You’re not just changing your appearance — you’re changing what security cameras see. By placing Burp between your browser and these systems, you can feed them any device fingerprint you want, even without using antidetect.
Success depends on understanding what these systems are collecting and how they interpret it. Analyze your Burp logs to learn about antifraud requests before you interfere with them. Look for patterns in the JSON data. The more you understand what they’re checking, the more accurately you can manipulate it.
Remember: effective digital deception isn’t about being invisible — it’s about looking so normal that they never think to look twice.
Remember, we’ve barely scratched the surface of what Burp Suite can do. This beast of a tool has dozens of modules and hundreds of features I haven’t even touched on, from automated scanning to SQLi vulnerability scanning to endpoint fuzzing. It’s a complex tool that rewards those who take the time to master it. I’ll cover more advanced techniques in future tutorials.
Cheers to all carders. See you soon!
(c) Contact the author here: d0ctrine
