Thursday, June 16, 2016

R.A.T’s (Control Your World from Your Remote)



Hello guys,  today we are going to discuss about one of the most powerful tool that is used by hackers and that is R.A.T’s. R.AT is an abbreviation word which stands for remote administration tool.
A remote administration tool (R.A.T) is a piece of software that allows a remote “operator” to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses, R.A.T software is usually associated with criminal or malicious activity. Malicious R.A.T software is typically installed without the victim’s knowledge often as a payload of Trojan horse and will try to hide its self from the victim and from security software.
As said before RAT’s are mostly used for malicious purposes, such as controlling remote PC’s, stealing victim’s data, deleting or editing some files, recording or capturing of the victim through webcams. With RAT’s we can do many things like the mentioned ones and more which we will discuss later in this tutorial. One can infect someone else by sending them a file called server. If and when the server file is execute and opened, it will gain control burrowing itself deep in the system and will start running in the background. In addition to this it can also send the hacker a message every time the system is turned on.
RAT’s can spread through different ways on to a system, as an example one can unknowingly install a RAT onto his system through different means like when installing a software, during the setup process the victim may click on the next button until the software is setup and installed then viola, the RAT has compromised the system not only this but the RAT can also spread itself through P2P (peer to peer) connection (file sharing service).
The other thing that am going to explain is “how the server is controlled?” Once installed, the RAT server can be controlled by what is called RAT client. The RAT client is usually an application that records and tracks your RAT’s movement in the system. It tells and show you how many systems are infected, information about the systems, what type and version of OS is our victim using and their ip-address including those connected to the system. After getting connected to the victim you can do many thing like sending a keylogger, uninstalling their antivirus or crashing purpose.
Are RAT’s legal or illegal?
There are some RATs which are legal and there are also other RATs which are not legal (illegal). The main difference of the legal RATs from the illegal ones is that the legal ones have no backdoor and they require permission from both sides while the illegal ones have a backdoor access to victim’s and they don’t require any permission from the owner. Illegal RATs are the ones hackers use in order to hack and exploit others.

I HOPE THIS TUTORIAL HAVE HELPED YOU UNDERSTAND THE CONCEPT OF RATs.
 In the next tutorial we will discuss about some RATs and how to install a RAT on to a system(computers or smart phones).

No comments:

Post a Comment