Credit Card Dumps Track 1&2 Definition

Carding Tutorials, CVV Numbers
Share On Facebook
Share On Twitter
Share On Google Plus
Share On Linkedin
Share On Pinterest
Share On Reddit
Share On Stumbleupon
Share On Youtube
Credit Card Dumps Explained
What are Credit Card Dumps ?

Credit Card Dumps and Magnetic Stripe Definition Explained

In a financial credit card dumps there are 3 types of tracks where the information is stored in the magnetic stripe for industry use. These is what hackers calls DUMPS.


Track 1 is coded with DEC SIXBIT and the ODD Parity method.

The information is stored in different formats that goes from A to M.

The “A” is only used by the bank itself, so you don’t to take much attention to this letter.

The “B” is where the holder’s financial information is stored, the most important section of the magnetic stripe.

C to M, is used for the ANSI Subcommittee X3B10.

N to Z, is the information that is available for use of individual card issuers.

Here you can see how it looks like:


Let’s go fast and easy:

  • % for Start Sentinel
  • B for Bank Type Credit Card
  • 5XXXXXXXXXXXXXX2 for the Primary Account Number, in most cases this is the number printed on the front of the card, but not always.
  • ^ is the separator
  • GEORGENULL would be the the Holder’s last name
  • / is the separator
  • MAX the first name
  • ^ Again another separator
  • 11 Expiry Year, 03 Expiry Month
  • 101 the Service Code
  • 000000001000000003000000 the Discretionary Data
  • ? is the end.

So, now that you already know how the information is stored in Track 1 and the letter containers, you should already figured out that the Track 1&2 are the vital tracks and the Track 3 is useless. The credit card dumps are mainly the first 2 tracks.


This track is used by the ATM’s , physical payment processors and in any online website.

There are a lot of components in this track, in an easy first time check layout would be:

| Start Sentinel |  PRIMARY ACCOUNT NUMBER  | FIELD SEPARATOR |  Additional Data  | End Sentinel | Longitude Redundancy Check |

With a more complex examination, you can see how a credit card number and holder’s main information is stored into the Track 2:

5XXXXXXXXXXXXXX2=1103200XXXX00000000?* ^^ ^^ ^ ^ ^^ ||_ Card number || | |_ Encrypted||_ LRC |_ Start sentinel|| | PIN*** |_ End sentinel || |_ Service code Field separator _||_ Expiration

Here we will go step by step.

  • ; : Start Sentinel.
  • 5XXXXXXXXXXXXXX2: Primary Account Number, the PAN. This would be the Credit Card Number you always see printed on the front of the plastic.
  • =: Separator. Just used to separate, not much to add.
  • 1103: Expiry Date. Always Year/Month Format.
  • 200: Service Code. The first digit is used for interchange rules, the second for authorization purposes and the last digit controls the services this card will be using.
  • XXXX00000000: The Discretionary Data, which includes the PIN Verification, the card verification value and the last 3 digits here would be the CVV code marked in red.
  • ?: The End Sentinel.
  • With ^^ ^^ ^ ^ ^^ begins the Track 3, literally unused and completely useless.

Most carders and hackers out there, mainly seeks for the Track 1&2 Data, that’s where the CREDIT CARD DUMPS term comes from. A Dump is a method to retrieve the tracks stored in the magnetic stripe using hacking methods that we won’t discuss in this article. If you want to get further information you can read this related article:


You could find this extremely attractive as a lot of people thinks they can just use the cards and that’s it, they buy stuff. In the real world it works a little different, if you want to accomplish an illegal act by using another person credit card, there are many steps to follow to avoid the void of the card and a big headache with the bank issuer if they manage to find your IP address. A lot of wannabe “hackers” went into serious issues by using stolen credit card information.


If you believe you are a hacker, then you should not be here reading what a magnetic stripe contains. We always recommend not to get involved with illegal acts such as carding with dumps, but people does whatever they want at the end. Sometimes, you will get threaten by a real hacker that actually used your own credit card, and it won’t be funny anymore.

Feel free to comment about the credit card dumps and magnetic stripes information.


credit cards online

Leave a Reply

6 Comments on Credit Card Dumps Track 1&2 Definition

john doe said : Guest Report 3 months ago

Is data from a cvv2 card enought to be encoded onto a physical card?

Tony Long said : Guest Report 4 months ago

I want to support CCV hack, please reply to my email .

John said : Guest Report 5 months ago

very nice to be here

hckleaked said : administrator Report 8 months ago

This comment was on spam, because it is a backlink comment. But we decided to allow it because is the worst backlink-comment ever. Incredible.

hack games said : Guest Report 8 months ago

They can buy other stuff that they want with the same amount. It is very easy to copy and back up your PS3 games by using the PS3 game copier. Space Invaders, Galaxians and their many close cousins were suddenly everywhere.

ankara said : Guest Report 8 months ago

Excellent post! We will be linking to this great content on our site. Keep up the great writing.