SlideShare une entreprise Scribd logo
1  sur  11
Magic Of Rat
Presented By : Nikesh Balami
What Is Remote Access
Trojan(RAT)?
Remote access Trojans (RATs) are typically
client-server programs.
They are doing a similar job like official remote
control and management tools.
The big difference is that a RAT installs itself
hidden and runs invisible for the user.
 It gives an attacker full control over the infected
machine as if he was sitting right in front of it.
 RATs are often used to upload and implant other
malware.
What We Are Going To Used?
NO-IP account on (www.no-ip.com)
NO-IP DUC
Darkcomet RAT
What Does NO-IP DUC Means?
No-IP DUC allows you to apply a fixed IP to your
domains hosted under servers with dynamic IPs.
You will be able to host a site in your own computer,
even if your IP address changes every time you
connect to the Internet
DUC stands for Dynamic Update Client. This means
that the program will keep track of any changes in your
IP, and will automatically update the DNS stored in the
NO-IP servers. Thus, the people visiting your website
will never know the they've been redirected to another
IP.
What Does Darkcomet RATs
Means?
DarkComet is one of the most popular RATs in use
today, gaining recent notoriety after its use by the
Syrian government.
The encryption method used in DarkComet has
already been extensively analyzed by various
researchers.
The DarkComet client stores information about
servers in a SQLite database, which is kept in the
directory from which the client runs.
Types Of RATs Tools OR
Software
Dark Comet RAT
Back Orifice
Bandook RAT
Bifrost
LANfiltrator
Optix Pro
ProRat
What Really Can We Do?
Block mouse and keyboard
Change your desktop wallpaper
Download, upload, delete, and rename files
Drop viruses and worms
Edit Registry
Use your Internet to perform distributed denial of
service attacks (DDOS)
Format drives
Grab passwords, credit card numbers
Hijack homepage
What Really Can We Do? Cont..
Hide desktop icons, taskbar and files
Log keystrokes, keystroke capture software
Open CD-ROM tray
Overload the RAM/ROM drive
Print text
Play sounds
Control mouse or keyboard
Record sound with a connected microphone
Record video with a connected web cam
Shutdown, restart, log-off, shut down monitor
Steal passwords
View screen
View, kill, and start tasks in task manager
At Last
Using RATs on remote systems
without their permission is illegal. This
article is for educational purpose only.
Don't do anything illegal. I will not be
held responsible for that.
Thank You

Contenu connexe

Tendances

Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applicationsNiyas Nazar
 
Network Security
Network SecurityNetwork Security
Network Securityforpalmigho
 
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows toolIntroducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows toolMichael Gough
 
Ceh V5 Module 07 Sniffers
Ceh V5 Module 07 SniffersCeh V5 Module 07 Sniffers
Ceh V5 Module 07 SniffersMina Fawzy
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsLearningwithRayYT
 
Network scanning
Network scanningNetwork scanning
Network scanningoceanofwebs
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.pptmabiratu
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityA. Shamel
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYafaque jaya
 
System hacking
System hackingSystem hacking
System hackingCAS
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasuresNoushin Ahson
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingNetsparker
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
 

Tendances (20)

Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
Network Security
Network SecurityNetwork Security
Network Security
 
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows toolIntroducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Malware
MalwareMalware
Malware
 
Ceh V5 Module 07 Sniffers
Ceh V5 Module 07 SniffersCeh V5 Module 07 Sniffers
Ceh V5 Module 07 Sniffers
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Network scanning
Network scanningNetwork scanning
Network scanning
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Spyware
SpywareSpyware
Spyware
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
System hacking
System hackingSystem hacking
System hacking
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 

Similaire à Magic of RATs(Remote Access Torgens)

Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHackingAve Nawsh
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoorsseth edmond
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan BackdoorsJauwadSyed
 
Meeting02_RoT.pptx
Meeting02_RoT.pptxMeeting02_RoT.pptx
Meeting02_RoT.pptxothmanomar13
 
Remote access trojan
Remote access trojanRemote access trojan
Remote access trojanssuser1eca7d
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control AddressAngie Lee
 
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote AccessHacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote AccessEC-Council
 
RSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System HackRSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System HackDan Gunter
 
Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7Jesse Burke
 
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan BalazsHacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan BalazsShakacon
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CDamiable_indian
 

Similaire à Magic of RATs(Remote Access Torgens) (20)

Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
about botnets
about botnetsabout botnets
about botnets
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Meeting02_RoT.pptx
Meeting02_RoT.pptxMeeting02_RoT.pptx
Meeting02_RoT.pptx
 
Remote Access For Desktop With Encryption System (
Remote  Access For Desktop With Encryption System (Remote  Access For Desktop With Encryption System (
Remote Access For Desktop With Encryption System (
 
It act seminar
It act seminarIt act seminar
It act seminar
 
Nanu
NanuNanu
Nanu
 
Remote access trojan
Remote access trojanRemote access trojan
Remote access trojan
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote AccessHacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
 
Hackers dictionary
Hackers dictionaryHackers dictionary
Hackers dictionary
 
RSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System HackRSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System Hack
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
 
Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7
 
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan BalazsHacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
 

Plus de Open Knowledge Nepal

Grassroots awareness and the impact of Civic Tech in Nepal
Grassroots awareness and the impact of Civic Tech in NepalGrassroots awareness and the impact of Civic Tech in Nepal
Grassroots awareness and the impact of Civic Tech in NepalOpen Knowledge Nepal
 
Open Data and Artificial Intelligence
Open Data and Artificial IntelligenceOpen Data and Artificial Intelligence
Open Data and Artificial IntelligenceOpen Knowledge Nepal
 
Open Access Publishing: Developing Countries
Open Access Publishing: Developing CountriesOpen Access Publishing: Developing Countries
Open Access Publishing: Developing CountriesOpen Knowledge Nepal
 
Information and Technology, not an Hard Subject
Information and Technology, not an Hard SubjectInformation and Technology, not an Hard Subject
Information and Technology, not an Hard SubjectOpen Knowledge Nepal
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngOpen Knowledge Nepal
 
AOSC Orentation for 1st Year student
AOSC Orentation for 1st Year studentAOSC Orentation for 1st Year student
AOSC Orentation for 1st Year studentOpen Knowledge Nepal
 

Plus de Open Knowledge Nepal (20)

Grassroots awareness and the impact of Civic Tech in Nepal
Grassroots awareness and the impact of Civic Tech in NepalGrassroots awareness and the impact of Civic Tech in Nepal
Grassroots awareness and the impact of Civic Tech in Nepal
 
Open Data and Artificial Intelligence
Open Data and Artificial IntelligenceOpen Data and Artificial Intelligence
Open Data and Artificial Intelligence
 
Code for Nepal and Open Data
Code for Nepal and Open DataCode for Nepal and Open Data
Code for Nepal and Open Data
 
Open Knowledge Network
Open Knowledge NetworkOpen Knowledge Network
Open Knowledge Network
 
Open Knowledge & PublicBodies Nepal
Open Knowledge & PublicBodies NepalOpen Knowledge & PublicBodies Nepal
Open Knowledge & PublicBodies Nepal
 
Open Data and Nepal Open Data Index
Open Data and Nepal Open Data IndexOpen Data and Nepal Open Data Index
Open Data and Nepal Open Data Index
 
Open Data - What and How??
Open Data - What and How??Open Data - What and How??
Open Data - What and How??
 
Open Access Publishing: Developing Countries
Open Access Publishing: Developing CountriesOpen Access Publishing: Developing Countries
Open Access Publishing: Developing Countries
 
Global - Local Open Data Index
Global - Local Open Data Index Global - Local Open Data Index
Global - Local Open Data Index
 
Information and Technology, not an Hard Subject
Information and Technology, not an Hard SubjectInformation and Technology, not an Hard Subject
Information and Technology, not an Hard Subject
 
Ball Eater
Ball EaterBall Eater
Ball Eater
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
 
Intro to Data visualization
Intro to Data visualization Intro to Data visualization
Intro to Data visualization
 
Firefox Student Ambassador
Firefox Student Ambassador Firefox Student Ambassador
Firefox Student Ambassador
 
Firefox Student Ambassador (FSA)
Firefox Student Ambassador (FSA)Firefox Student Ambassador (FSA)
Firefox Student Ambassador (FSA)
 
Machine Learning and Robotic Vision
Machine Learning and Robotic VisionMachine Learning and Robotic Vision
Machine Learning and Robotic Vision
 
Nepal
Nepal Nepal
Nepal
 
AOSC Orentation for 1st Year student
AOSC Orentation for 1st Year studentAOSC Orentation for 1st Year student
AOSC Orentation for 1st Year student
 
Acme Firefox Presentation
Acme Firefox PresentationAcme Firefox Presentation
Acme Firefox Presentation
 
Day 3-Important stuff
Day 3-Important stuffDay 3-Important stuff
Day 3-Important stuff
 

Dernier

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Dernier (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

Magic of RATs(Remote Access Torgens)

  • 1. Magic Of Rat Presented By : Nikesh Balami
  • 2.
  • 3. What Is Remote Access Trojan(RAT)? Remote access Trojans (RATs) are typically client-server programs. They are doing a similar job like official remote control and management tools. The big difference is that a RAT installs itself hidden and runs invisible for the user.  It gives an attacker full control over the infected machine as if he was sitting right in front of it.  RATs are often used to upload and implant other malware.
  • 4. What We Are Going To Used? NO-IP account on (www.no-ip.com) NO-IP DUC Darkcomet RAT
  • 5. What Does NO-IP DUC Means? No-IP DUC allows you to apply a fixed IP to your domains hosted under servers with dynamic IPs. You will be able to host a site in your own computer, even if your IP address changes every time you connect to the Internet DUC stands for Dynamic Update Client. This means that the program will keep track of any changes in your IP, and will automatically update the DNS stored in the NO-IP servers. Thus, the people visiting your website will never know the they've been redirected to another IP.
  • 6. What Does Darkcomet RATs Means? DarkComet is one of the most popular RATs in use today, gaining recent notoriety after its use by the Syrian government. The encryption method used in DarkComet has already been extensively analyzed by various researchers. The DarkComet client stores information about servers in a SQLite database, which is kept in the directory from which the client runs.
  • 7. Types Of RATs Tools OR Software Dark Comet RAT Back Orifice Bandook RAT Bifrost LANfiltrator Optix Pro ProRat
  • 8. What Really Can We Do? Block mouse and keyboard Change your desktop wallpaper Download, upload, delete, and rename files Drop viruses and worms Edit Registry Use your Internet to perform distributed denial of service attacks (DDOS) Format drives Grab passwords, credit card numbers Hijack homepage
  • 9. What Really Can We Do? Cont.. Hide desktop icons, taskbar and files Log keystrokes, keystroke capture software Open CD-ROM tray Overload the RAM/ROM drive Print text Play sounds Control mouse or keyboard Record sound with a connected microphone Record video with a connected web cam Shutdown, restart, log-off, shut down monitor Steal passwords View screen View, kill, and start tasks in task manager
  • 10. At Last Using RATs on remote systems without their permission is illegal. This article is for educational purpose only. Don't do anything illegal. I will not be held responsible for that.