Credit Card 101 – Part 1

Hello guys , we are back with another awesome article. In this series of articles ( credit card 101 ) we are going to learn about various credit cards , how credit cards work , how to hack credit cards and most important how to secure your personal credit card. So to start with credit card hacking we must first understand how credit cards are designed and how they work.

Credit Card Numbers :

So lets consider a random credit card for example ( This is not my credit card ).

4485 3151 5882 2849
Now the credit card number is divided into various parts which help the payment gateway to charge the original consumer of the credit card. 
1. The first number (4) is the MII
2. The next 5-6 numbers are the issuer ID
3. The next numbers leaving the last number are the user ID
4. The last number is the check number also known as check algorithm number.

What is MII ?

MII basically stands for major industry identifier . This is a constant number that is given to the consumer according to the needs of the consumer . For example in most cases a consumer uses his/ her credit card numbers for online transactions. This is the reasons most credit card numbers start from 4 and 5 which means banking and financial industry . This digit can range from 0 to 9. We will provide more information in the bottom of the article .

What is Issuer ID ?

The issuer ID basically stands for the card provider i.e. visa , mastercard , etc. For example if the digit is 4xxxx then it is a VISA card and the length of the card is 16. We have provided more information about in the bottom of the article.

What is User ID ?

This number is basically the Identity of the user and the bank to which the card was issued . It depends on the users account number and other details . This number can be reused if a particular card holder stops using the service.

What is check number ?

A check number is used to ensure the validity of the card. It is the last digit of the credit card. Credit cards follow luhn check algorithm.

Luhn’s Credit Card Algorithm :

Original Number : 4485 3151 5882 2849
1. From the back , double every alternate number.
What we get : 8  (16)  6  (10)  (10)  (16)  4  8
2. If the doubled numbers are double-digit numbers then add them.
What we get  : 8   7   6   1   1   7   4   8
3. Write the alternate numbers that we deleted in the first step.
8475   6111   1872   4889
4. Add the new credit card number that we get.
5. If sum is a multiple of 10 then the credit card number is valid.
Since 80 is the multiple of 10 . We can conclude that 4485 3151 5882 2849 can be a valid credit card number.
MII / Digit Value Category
0 = other industry assignments 
= Airlines industry assignments.
= Airlines and other industry assignments
3 = Travel and entertainment 
= Banking and financial 
= Banking and financial 
= Merchandising and Banking 
= Petroleum 
= Telecommunications and other industry assignments 
= National assignment
Issuer ID                                  Card Number
  • Diner’s Club/Carte Blanche   300xxx-305xxx, 36xxxx, 38xxxx
  • American Express                   34xxxx, 37xxxx                   
  • VISA                                        4xxxxx                               
  • Mastercard                              51xxxx-55xxxx
  • Discover                                  6011xx     

Next Article
 ( will be updated soon )

More :

You can access full course free on the following platforms :

Please note all the content is copyright (c) material of Priyank Gada. Using this without permissions should be prohibited .
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...