A remote administration tool (R.A.T) is a piece of software
that allows a remote “operator” to control a system as if he has physical
access to that system. While desktop sharing and remote administration have
many legal uses, R.A.T software is usually associated with criminal or
malicious activity. Malicious R.A.T software is typically installed without the
victim’s knowledge often as a payload of Trojan horse and will try to hide its
self from the victim and from security software.
As said before RAT’s are mostly used for malicious purposes,
such as controlling remote PC’s, stealing victim’s data, deleting or editing
some files, recording or capturing of the victim through webcams. With RAT’s we
can do many things like the mentioned ones and more which we will discuss later
in this tutorial. One can infect someone else by sending them a file called
server. If and when the server file is execute and opened, it will gain control
burrowing itself deep in the system and will start running in the background.
In addition to this it can also send the hacker a message every time the system
is turned on.
RAT’s can spread through different ways on to a system, as
an example one can unknowingly install a RAT onto his system through different
means like when installing a software, during the setup process the victim may
click on the next button until the software is setup and installed then viola,
the RAT has compromised the system not only this but the RAT can also spread
itself through P2P (peer to peer) connection (file sharing service).
The other thing that am going to explain is “how the server
is controlled?” Once installed, the RAT server can be controlled by what is
called RAT client. The RAT client is usually an application that records and
tracks your RAT’s movement in the system. It tells and show you how many
systems are infected, information about the systems, what type and version of
OS is our victim using and their ip-address including those connected to the
system. After getting connected to the victim you can do many thing like
sending a keylogger, uninstalling their antivirus or crashing purpose.
Are RAT’s legal or illegal?
There are some RATs which are legal and there are also other
RATs which are not legal (illegal). The main difference of the legal RATs from
the illegal ones is that the legal ones have no backdoor and they require
permission from both sides while the illegal ones have a backdoor access to
victim’s and they don’t require any permission from the owner. Illegal RATs are
the ones hackers use in order to hack and exploit others.
I HOPE THIS TUTORIAL HAVE HELPED YOU UNDERSTAND THE CONCEPT
OF RATs.
No comments:
Post a Comment