Header Ads

What is RATs ???  and how it is popular in hacking remotely(Remote Administrative tool)
A remote administration tool (a RAT) is a piece of software that allows a remote "operator" to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses, "RAT" software is usually associated with criminal or malicious activity. Malicious RAT software is typically installed without the victim's knowledge, often as payload of a Trojan horse, and will try to hide its operation from the victim and from security software.
The operator controls the RAT through a network connection. Such tools provide an operator the following capabilities:
Screen/camera capture or image control
File management (download/upload/execute/etc.)
Shell control (from command prompt)
Computer control (power off/on/log off if remote feature is supported)
Registry management (query/add/delete/modify)
Hardware Destroyer (overclocker)
Other software product-specific functions
Its primary function is for one computer operator to gain access to remote PCs. One computer will run the "client" software application, while the other computer(s) operate as the "host(s)".
RAT trojan horses[edit]
Many trojans and backdoors now have remote administration capabilities allowing an individual to control the victim's computer. Many times, a file called the server must be opened on the victim's computer before the trojan can have access to it. These are generally sent through email, P2P file sharing software, and in internet downloads. They are usually disguised as a legitimate program or file. Many server files will display a fake error message when opened, to make it seem like it didn't open. Some will also disable antivirus and firewall software. RAT trojans can generally do the following:
Block mouse and keyboard
Change the desktop wallpaper
Download, upload, delete, and rename files
Destroy hardware by overclocking
Drop viruses and worms
Edit Registry
Use your internet to perform denial of service attacks (DoS)
Format drives
Steal passwords, credit card numbers
Alter your webbrowsers homepage
Hide desktop icons, taskbar and files
Silently install applications
Log keystrokes, keystroke capture software
Open CD-ROM tray
Overload the RAM/ROM drive
Send messageboxes
Play sounds
Control mouse or keyboard
Record sound with a connected microphone
Record video with a connected webcam
Show fake errors
Shutdown, restart, log-off, shut down monitor
Record and control victim's screen remotely
View, kill, and start tasks in task manager
A well-designed RAT will allow the operator the ability to do anything that they could do with physical access to the machine. Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on April Fool's Day or a holiday. Prank RATs are generally not harmful, and won't log keystrokes or store information about the system on the computer. They usually do disruptive things like flip the screen upside-down, open the CD-ROM tray, or swap mouse buttons.
Notable RAT software and trojans
Back Orifice
NetBus
iControl
Sub Seven
Beast Trojan
Bifrost
Blackshades
Darkcomet
LANfiltrator
Optix Pro
no 1 rat tool # Dark Comet #

Dark Comet 
There is no doubt that Dark Comet is the best Rat ever and a free RAT too and also the old one too and still many users use it because of its great functions like in this rat you dont have to forward port it has UNPN function enabled which automatically forward your port and no need to forward from the router plus it is the most stable rat i have ever used in free versions but the bad thing is its not updating as its coder has stooped updating dark comet and started working on a key logger project.

No comments:

Powered by Blogger.