Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

001 Rats

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Hello Friends I am Shozab Haxor…..!

You are Watching Parrot Security.....!


01-
What Is Rat (Remote Administration Tool)..?
A remote administration tool (RAT) is a piece of software that allows a
remote "operator" to control a system as if he has physical access to
that system. While desktop sharing and remote administration have
many legal uses, "RAT" software is usually associated with criminal or
malicious activity. Malicious RAT software is typically installed without
the victim's knowledge, often as payload of a Trojan horse, and will try
to hide its operation from the victim and from security software.

02-
How Do Rats Work..?
Many trojans and backdoors now have remote administration
capabilities allowing an individual to control the victim's computer.
Many times, a file (often called a client or stub) must be opened
on the victim's computer before the hacker can have access to it.
These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a
legitimate program or file. Many clients/stubs will display a Fake
error message when opened, to make it seem like it didn't open.
Some will also disable antivirus and firewall software

03-
Functions of a Rat..?
 Screen/camera capture or image control
 File management (download/upload/execute/etc.)
 Shell control (from command prompt)
 Computer control (power off/on/log off if remote feature is
supported)
 Registry management (query/add/delete/modify)
 Hardware Destroyer (overclocker)
 Other software product-specific functions
 Block mouses and keyboards
 Change the desktop wallpapers
 Downloads, uploads, deletes, and rename files
 Destroys hardware by overclocking
 Drop viruses and worms
 Edit Registry
 Use your internet connection to perform denial of service
attacks (DoS)
 Format drives
 Steal passwords, credit card numbers
 Alter your web browser's homepage
 Hide desktop icons, task bar and files
 Silently install applications
 Log keystrokes, keystroke capture software
 Open CD-ROM tray
 Overload the RAM/ROM drive
 Send message boxes
 Play sounds
 Control mouse or keyboard
 Record sound with a connected microphone
 Record video with a connected webcam
 Show fake errors
 Shutdown, restart, log-off, shut down monitor
 Record and control victim's screen remotely
 View, kill, and start tasks in task manager
 Let the hacker surf the web with the IP-address of the infected
computer

04-
Top Notable RATS and Trojans 
 Back Orifice
 NetBus
 iControl
 LuminosityLink
 PlugX
 PoisonIvy
 Sub Seven
 PixelRat
 Beast Trojan
 Bifrost
 Blackshades
 DarkComet
 LANfiltrator
 Win32.HsIdir
 Optix Pro
 Nanocore
 Quasar Rat
In MY Further Videos I Will Tell You about Their Setup One By
One So Please Wait My Further Videos..

Done :)

Thanks For Watching...!

Plz LIke Share Subscribe & Support Me :()

You might also like