Hacking through R.A.T : REMOTE ADMINISTRATION TOOL

0
1570
Remote Administration Tool

What is Remote Administration Tool ( R.A.T)

Yeah, you guessed it right. I am talking of Remote Administration Tool, not the small pesky creature which might have troubled you for the last few days. Believe me, if you are troubled by that Rat, then this one is going to blow your minds. A Remote administration tool (RAT) is a piece of software that allows a remote “operator” to control a system as if he has physical access to that system.

You may have used TEAM VIEWER, VNC, etc. They are Remote Administration Tool but think of  a situation when a  hacker installs a malicious R.A.T on your computer (Back Orifice, iControl, NetBus, DarkComet,BlackShades,etc)  without your knowledge. Such type of software hide its operation from the victim and from security software. Think  of  the possibilities what such a software could do. Maybe you are typing confidential company reports, entering your Bank Credentials, typing your passwords,etc. That R.A.T  can log all your activities and secretly transmit that to the Hacker. You may be using the latest antivirus products but what if the R.A.T is using zero day exploits which are unknown to antivirus vendors too.

Remote Administration Tool

Ohh, your curiosity is aroused.  Well Remote Administration Tool can do any of the following things:

  1. Block mouses and keyboards or even control them
  2. Edit registry
  3. Download,uploads,deletes,and rename files
  4. Destroy hardware using Overclocking
  5. Use your internet connection as a proxy or perform Denial of Service(DOS) attack.
  6. Format drives
  7. Steal passwords, credit card numbers
  8. Silently install applications and viruses
  9. Log keystrokes using keylogger
  10. Send message boxes(Yep, Hacker may want to bully you)
  11. Shutdown,restart,log-off,etc
  12. Record media with connected webcam and microphone
  13. Play sounds
  14. View,kill,and start tasks in task manager

 

Huh,the list is long but these are the major functions most of the R.A.T can do but basically if the R.A.T is well designed, the operator can do anything they could do with physical access to the machine. You ain’t scared, Ohh, you wanna try it yourself.

Some links to download Remote Administration Tool are:

www.darkcomet-rat.com (“Official Site of DarkComet”)

www.hackforums.net (“This is a Hacking forum so be aware that you may be hacked using those softwares. Please verify by yourself”)

https://0day.in (“Another Hacking forum”)

 

After you get it, some common ways of spreading it are:

1: You may set up a Server and offer it as legitimate software.

2: You may send it via e-mail.

3: You may use pen-drives or any medium to share it.

Off course, you need to present it as a legitimate software, otherwise who would even click on it. You may use file binder for it. File binder is used to hide your R.A.T behind some legitimate software. You could use Crypter in order to protect it from Ant viruses, otherwise they would be detected by Antiviruses and all your efforts would be in vain.

 

Good Luck Guys, if you have any problem. Comment Below.

Happy Hacking

Related Post

Download Wfuzz Password Cracker for free Wfuzz is a web application password cracker that cracks passwords using brute force attack. It is a multi features cracker that can also be used to fi...
Phishing Attack using Kali Linux: Hack Passwords, ... Phishing Attack using Kali Linux Other Kali Linux Tutorials: How to install Kali Linux Hack WIFI using Kali Linux // < !).push({}); // ]...
What is DOS attack and how to Hack using DOS DOS Attack: DENIAL OF SERVICE ATTACK Guys,you may have seen Mr. Robot and remember the event when Fsociety use the DDoS as a calling card to lure Ell...
Download Fgdump Crack Password Cracker for Free fgdump is a newer version of the pwdump tool for extracting NTLM and LanMan password hashes from Windows. fgdump is capable of running in the presence...
Command Prompt Tricks 2016 We have previously written about CMD tricks. Today we will go further and discuss about hacking windows system using its command prompt tricks. CMD is...
Top 10 Hacking and Security apps for Android Smartphones have became most popular gadgets nowadays and it is been used by almost everyone. People are now utilizing their smartphones for most of t...
Exploit Internet Explorer: Basic Tutorial     In this article we will share the process of How to exploit Internet explorer 7, 8 or 9. This exploit will allow you to patch ...
How to Crack WiFi Password: Detailed Guide Detailed Guide to Crack WIFI Password : Wi-Fi cracking is a very easy process, easier if it is secured with WEP encryption. In the below tutoria...

LEAVE A REPLY