What Is Rat (Remote Administration Tool)


 

01-

What Is Rat (Remote Administration Tool)..?

A remote administration tool (RAT) is a piece of software that allows a remote "operator" to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses, "RAT" software is usually associated with criminal or malicious activity. Malicious RAT software is typically installed without the victim's knowledge, often as payload of a Trojan horse, and will try to hide its operation from the victim and from security software.

02-

How Do Rats Work..?

Many trojans and backdoors now have remote administration capabilities allowing an individual to control the victim's computer. Many times, a file (often called a client or stub) must be opened on the victim's computer before the hacker can have access to it. These are generally sent through email, P2P file sharing software, and in internet downloads. They are usually disguised as a legitimate program or file. Many clients/stubs will display a Fake error message when opened, to make it seem like it didn't open. Some will also disable antivirus and firewall software

03-

Functions of a Rat..?

Screen/camera capture or image control

File management (download/upload/execute/etc.)

Shell control (from command prompt)

Computer control (power off/on/log off if remote feature is supported)

Registry management (query/add/delete/modify)

Hardware Destroyer (overclocker)

Other software product-specific functions

Block mouses and keyboards

Change the desktop wallpapers

Downloads, uploads, deletes, and rename files

Destroys hardware by overclocking

Drop viruses and worms

Edit Registry

Use your internet connection to perform denial of service attacks (DoS)

Format drives

Steal passwords, credit card numbers

Alter your web browser's homepage

Hide desktop icons, task bar and files

Silently install applications

Log keystrokes, keystroke capture software

Open CD-ROM tray

Overload the RAM/ROM drive

Send message boxes

Play sounds

Control mouse or keyboard

Record sound with a connected microphone

Record video with a connected webcam

Show fake errors

Shutdown, restart, log-off, shut down monitor

Record and control victim's screen remotely

View, kill, and start tasks in task manager

Let the hacker surf the web with the IP-address of the infected computer

04-

Top Notable RATS and Trojans 

Back Orifice

NetBus

iControl

LuminosityLink

PlugX

PoisonIvy

Sub Seven

PixelRat

Beast Trojan

Bifrost

Blackshades

DarkComet

LANfiltrator

Win32.HsIdir

Optix Pro

Nanocore

Quasar Rat

In MY Further Videos I Will Tell You about Their Setup One By One So Please Wait My Further Videos..

Done :)

Thanks For Watching...!

Plz LIke Share Subscribe & Support Me :



Post a Comment

0 Comments