Skip to main content

Hacking through R.A.T : REMOTE ADMINISTRATION TOOL

What is Remote Administration Tool ( R.A.T)

Yeah, you guessed it right. I am talking of Remote Administration Tool, not the small pesky creature which might have troubled you for the last few days. Believe me, if you are troubled by that Rat, then this one is going to blow your minds. A Remote administration tool (RAT) is a piece of software that allows a remote “operator” to control a system as if he has physical access to that system.

You may have used TEAM VIEWER, VNC, etc. They are Remote Administration Tool but think of  a situation when a  hacker installs a malicious R.A.T on your computer (Back Orifice, iControl, NetBus, DarkComet,BlackShades,etc)  without your knowledge. Such type of software hide its operation from the victim and from security software. Think  of  the possibilities what such a software could do. Maybe you are typing confidential company reports, entering your Bank Credentials, typing your passwords,etc. That R.A.T  can log all your activities and secretly transmit that to the Hacker. You may be using the latest antivirus products but what if the R.A.T is using zero day exploits which are unknown to antivirus vendors too.

Ohh, your curiosity is aroused.  Well Remote Administration Tool can do any of the following things:

Block mouses and keyboards or even control themEdit registryDownload,uploads,deletes,and rename filesDestroy hardware using OverclockingUse your internet connection as a proxy or perform Denial of Service(DOS) attack.Format drivesSteal passwords, credit card numbersSilently install applications and virusesLog keystrokes using keyloggerSend message boxes(Yep, Hacker may want to bully you)Shutdown,restart,log-off,etcRecord media with connected webcam and microphonePlay soundsView,kill,and start tasks in task manager

 

Huh,the list is long but these are the major functions most of the R.A.T can do but basically if the R.A.T is well designed, the operator can do anything they could do with physical access to the machine. You ain’t scared, Ohh, you wanna try it yourself.

Some links to download Remote Administration Tool are:

www.darkcomet-rat.com (“Official Site of DarkComet”)

www.hackforums.net (“This is a Hacking forum so be aware that you may be hacked using those softwares. Please verify by yourself”)

https://0day.in (“Another Hacking forum”)

 

After you get it, some common ways of spreading it are:

1: You may set up a Server and offer it as legitimate software.

2: You may send it via e-mail.

3: You may use pen-drives or any medium to share it.

Off course, you need to present it as a legitimate software, otherwise who would even click on it. You may use file binder for it. File binder is used to hide your R.A.T behind some legitimate software. You could use Crypter in order to protect it from Ant viruses, otherwise they would be detected by Antiviruses and all your efforts would be in vain.

 

Good Luck Guys, if you have any problem. Comment Below.

Happy Hacking

Comments

  1. I lost my bitcoin to fake blockchain.com impostors on Facebook, they contacted me as blockchain official support and i fell stupidly for their mischievous act, this made them gain access into my blockchain wallet whereby 6.0838 btc was stolen from my wallet in total .I was almost in a comma and dumbfounded because this was all my savings i relied on . Then I made a research online and found a recovery expert , with the contact address- STRAIGHTHACKER99[at]GMAIL Dot COM...WhatssaPP (+4915217853324)
    I wrote directly to the specialist explaining my loss. Hence, he helped me recover my bitcoin just after 2 days he helped me launch the recovery program , and the culprits were identified as well , all thanks to his expertise . I hope I have been able to help someone as well.

    ReplyDelete

Post a Comment

plz add ur comment here

Popular posts from this blog

Upcoming Book- Kali Linux Revealed: Mastering the Penetration Testing Distribution

More exciting news! In the past year, Kali Linux Official Team has been working internally on an Official Kali Linux book – Kali Linux Revealed: Mastering the Penetration Testing Distribution . This is the first official Kali book from Offsec Press , and is scheduled for release on June 5th, 2017 . Kali Linux Revealed will be available in both hard copy and online formats. Keeping the Kali Linux spirit, the online version of the book will be free of charge, allowing anyone who wishes to hone their skills and improve their knowledge of Kali to do so at no cost. This book, together with our official Kali documentation site will encompass the body of knowledge for the Kali Linux Certified Professional   (KLCP) .

Kali Linux: A complete InfoSec Distro

BackTrack has always been a popular choice when it comes to security and penetration testing. This open source distro has gained a lot of popularity and was rolled till version 5 with frequent changes to the variants. This project from Offensive Security has been moved from Ubuntu to Debian and the operating system is now renamed as Kali Linux. If you have installed a fresh copy of Kali Linux, then you might have noticed some awesome security and penetration tools under Kali Linux drop down menu list. These tools are powerful and yet efficient to use. If you go through the menu list of security tools, you might have noticed that few like Wireless Attacks, Forensics and Reverse Engineering is added, which is quite impressive. One more section has been added in the list, ie Hardware Hacking. One more thing that you would be happy to see is Arduino kit on the list. Arduino is a single-board microcontroller designed to make the process of using electronics in multi-disciplinary projects mo...

EOF of Kali Linux 1.0

Kali Sana (ver. 2.0) has been out there couple of months ago and the response was great. Kali Moto (ver. 1.0) has been given 2 months of grace period to date the version to 2.0. To upgrade, edit the souces.list file and put the following entries. cat >> EOF < /etc/apt/sources.list deb http://http.kali.org/kali sana main non-free contrib deb http://security.kali.org/kali-security/ sana/updates main contrib non-free EOF Then, run the following command to do upgrade Kali Moto to Kali Sana. apt-get update apt-get dist-upgrade # get a coffee, or 10. reboot