SlideShare una empresa de Scribd logo
1 de 11
Magic Of Rat
Presented By : Nikesh Balami
What Is Remote Access
Trojan(RAT)?
Remote access Trojans (RATs) are typically
client-server programs.
They are doing a similar job like official remote
control and management tools.
The big difference is that a RAT installs itself
hidden and runs invisible for the user.
 It gives an attacker full control over the infected
machine as if he was sitting right in front of it.
 RATs are often used to upload and implant other
malware.
What We Are Going To Used?
NO-IP account on (www.no-ip.com)
NO-IP DUC
Darkcomet RAT
What Does NO-IP DUC Means?
No-IP DUC allows you to apply a fixed IP to your
domains hosted under servers with dynamic IPs.
You will be able to host a site in your own computer,
even if your IP address changes every time you
connect to the Internet
DUC stands for Dynamic Update Client. This means
that the program will keep track of any changes in your
IP, and will automatically update the DNS stored in the
NO-IP servers. Thus, the people visiting your website
will never know the they've been redirected to another
IP.
What Does Darkcomet RATs
Means?
DarkComet is one of the most popular RATs in use
today, gaining recent notoriety after its use by the
Syrian government.
The encryption method used in DarkComet has
already been extensively analyzed by various
researchers.
The DarkComet client stores information about
servers in a SQLite database, which is kept in the
directory from which the client runs.
Types Of RATs Tools OR
Software
Dark Comet RAT
Back Orifice
Bandook RAT
Bifrost
LANfiltrator
Optix Pro
ProRat
What Really Can We Do?
Block mouse and keyboard
Change your desktop wallpaper
Download, upload, delete, and rename files
Drop viruses and worms
Edit Registry
Use your Internet to perform distributed denial of
service attacks (DDOS)
Format drives
Grab passwords, credit card numbers
Hijack homepage
What Really Can We Do? Cont..
Hide desktop icons, taskbar and files
Log keystrokes, keystroke capture software
Open CD-ROM tray
Overload the RAM/ROM drive
Print text
Play sounds
Control mouse or keyboard
Record sound with a connected microphone
Record video with a connected web cam
Shutdown, restart, log-off, shut down monitor
Steal passwords
View screen
View, kill, and start tasks in task manager
At Last
Using RATs on remote systems
without their permission is illegal. This
article is for educational purpose only.
Don't do anything illegal. I will not be
held responsible for that.
Thank You

Más contenido relacionado

La actualidad más candente

Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network ForensicsSavvius, Inc
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Wail Hassan
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
System hacking
System hackingSystem hacking
System hackingCAS
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.AbutalebFahmi Albaheth
 
Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle AttackDos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attackmarada0033
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacksphanleson
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptNitesh Dubey
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security RiskDedi Dwianto
 

La actualidad más candente (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Dos attack
Dos attackDos attack
Dos attack
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
System hacking
System hackingSystem hacking
System hacking
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle AttackDos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attack
 
Metasploit framwork
Metasploit framworkMetasploit framwork
Metasploit framwork
 
What is malware
What is malwareWhat is malware
What is malware
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacks
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Wannacry
WannacryWannacry
Wannacry
 
Port scanning
Port scanningPort scanning
Port scanning
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security Risk
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 

Similar a Magic of RATs(Remote Access Torgens)

Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHackingAve Nawsh
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoorsseth edmond
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan BackdoorsJauwadSyed
 
Meeting02_RoT.pptx
Meeting02_RoT.pptxMeeting02_RoT.pptx
Meeting02_RoT.pptxothmanomar13
 
Remote access trojan
Remote access trojanRemote access trojan
Remote access trojanssuser1eca7d
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control AddressAngie Lee
 
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote AccessHacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote AccessEC-Council
 
RSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System HackRSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System HackDan Gunter
 
Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7Jesse Burke
 
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan BalazsHacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan BalazsShakacon
 

Similar a Magic of RATs(Remote Access Torgens) (20)

Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
about botnets
about botnetsabout botnets
about botnets
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Meeting02_RoT.pptx
Meeting02_RoT.pptxMeeting02_RoT.pptx
Meeting02_RoT.pptx
 
Remote Access For Desktop With Encryption System (
Remote  Access For Desktop With Encryption System (Remote  Access For Desktop With Encryption System (
Remote Access For Desktop With Encryption System (
 
It act seminar
It act seminarIt act seminar
It act seminar
 
Nanu
NanuNanu
Nanu
 
Remote access trojan
Remote access trojanRemote access trojan
Remote access trojan
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote AccessHacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
 
Hackers dictionary
Hackers dictionaryHackers dictionary
Hackers dictionary
 
RSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System HackRSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System Hack
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
 
Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7
 
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan BalazsHacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
 

Más de Open Knowledge Nepal

Grassroots awareness and the impact of Civic Tech in Nepal
Grassroots awareness and the impact of Civic Tech in NepalGrassroots awareness and the impact of Civic Tech in Nepal
Grassroots awareness and the impact of Civic Tech in NepalOpen Knowledge Nepal
 
Open Data and Artificial Intelligence
Open Data and Artificial IntelligenceOpen Data and Artificial Intelligence
Open Data and Artificial IntelligenceOpen Knowledge Nepal
 
Open Access Publishing: Developing Countries
Open Access Publishing: Developing CountriesOpen Access Publishing: Developing Countries
Open Access Publishing: Developing CountriesOpen Knowledge Nepal
 
Information and Technology, not an Hard Subject
Information and Technology, not an Hard SubjectInformation and Technology, not an Hard Subject
Information and Technology, not an Hard SubjectOpen Knowledge Nepal
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngOpen Knowledge Nepal
 
AOSC Orentation for 1st Year student
AOSC Orentation for 1st Year studentAOSC Orentation for 1st Year student
AOSC Orentation for 1st Year studentOpen Knowledge Nepal
 

Más de Open Knowledge Nepal (20)

Grassroots awareness and the impact of Civic Tech in Nepal
Grassroots awareness and the impact of Civic Tech in NepalGrassroots awareness and the impact of Civic Tech in Nepal
Grassroots awareness and the impact of Civic Tech in Nepal
 
Open Data and Artificial Intelligence
Open Data and Artificial IntelligenceOpen Data and Artificial Intelligence
Open Data and Artificial Intelligence
 
Code for Nepal and Open Data
Code for Nepal and Open DataCode for Nepal and Open Data
Code for Nepal and Open Data
 
Open Knowledge Network
Open Knowledge NetworkOpen Knowledge Network
Open Knowledge Network
 
Open Knowledge & PublicBodies Nepal
Open Knowledge & PublicBodies NepalOpen Knowledge & PublicBodies Nepal
Open Knowledge & PublicBodies Nepal
 
Open Data and Nepal Open Data Index
Open Data and Nepal Open Data IndexOpen Data and Nepal Open Data Index
Open Data and Nepal Open Data Index
 
Open Data - What and How??
Open Data - What and How??Open Data - What and How??
Open Data - What and How??
 
Open Access Publishing: Developing Countries
Open Access Publishing: Developing CountriesOpen Access Publishing: Developing Countries
Open Access Publishing: Developing Countries
 
Global - Local Open Data Index
Global - Local Open Data Index Global - Local Open Data Index
Global - Local Open Data Index
 
Information and Technology, not an Hard Subject
Information and Technology, not an Hard SubjectInformation and Technology, not an Hard Subject
Information and Technology, not an Hard Subject
 
Ball Eater
Ball EaterBall Eater
Ball Eater
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
 
Intro to Data visualization
Intro to Data visualization Intro to Data visualization
Intro to Data visualization
 
Firefox Student Ambassador
Firefox Student Ambassador Firefox Student Ambassador
Firefox Student Ambassador
 
Firefox Student Ambassador (FSA)
Firefox Student Ambassador (FSA)Firefox Student Ambassador (FSA)
Firefox Student Ambassador (FSA)
 
Machine Learning and Robotic Vision
Machine Learning and Robotic VisionMachine Learning and Robotic Vision
Machine Learning and Robotic Vision
 
Nepal
Nepal Nepal
Nepal
 
AOSC Orentation for 1st Year student
AOSC Orentation for 1st Year studentAOSC Orentation for 1st Year student
AOSC Orentation for 1st Year student
 
Acme Firefox Presentation
Acme Firefox PresentationAcme Firefox Presentation
Acme Firefox Presentation
 
Day 3-Important stuff
Day 3-Important stuffDay 3-Important stuff
Day 3-Important stuff
 

Último

Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 

Último (20)

Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

Magic of RATs(Remote Access Torgens)

  • 1. Magic Of Rat Presented By : Nikesh Balami
  • 2.
  • 3. What Is Remote Access Trojan(RAT)? Remote access Trojans (RATs) are typically client-server programs. They are doing a similar job like official remote control and management tools. The big difference is that a RAT installs itself hidden and runs invisible for the user.  It gives an attacker full control over the infected machine as if he was sitting right in front of it.  RATs are often used to upload and implant other malware.
  • 4. What We Are Going To Used? NO-IP account on (www.no-ip.com) NO-IP DUC Darkcomet RAT
  • 5. What Does NO-IP DUC Means? No-IP DUC allows you to apply a fixed IP to your domains hosted under servers with dynamic IPs. You will be able to host a site in your own computer, even if your IP address changes every time you connect to the Internet DUC stands for Dynamic Update Client. This means that the program will keep track of any changes in your IP, and will automatically update the DNS stored in the NO-IP servers. Thus, the people visiting your website will never know the they've been redirected to another IP.
  • 6. What Does Darkcomet RATs Means? DarkComet is one of the most popular RATs in use today, gaining recent notoriety after its use by the Syrian government. The encryption method used in DarkComet has already been extensively analyzed by various researchers. The DarkComet client stores information about servers in a SQLite database, which is kept in the directory from which the client runs.
  • 7. Types Of RATs Tools OR Software Dark Comet RAT Back Orifice Bandook RAT Bifrost LANfiltrator Optix Pro ProRat
  • 8. What Really Can We Do? Block mouse and keyboard Change your desktop wallpaper Download, upload, delete, and rename files Drop viruses and worms Edit Registry Use your Internet to perform distributed denial of service attacks (DDOS) Format drives Grab passwords, credit card numbers Hijack homepage
  • 9. What Really Can We Do? Cont.. Hide desktop icons, taskbar and files Log keystrokes, keystroke capture software Open CD-ROM tray Overload the RAM/ROM drive Print text Play sounds Control mouse or keyboard Record sound with a connected microphone Record video with a connected web cam Shutdown, restart, log-off, shut down monitor Steal passwords View screen View, kill, and start tasks in task manager
  • 10. At Last Using RATs on remote systems without their permission is illegal. This article is for educational purpose only. Don't do anything illegal. I will not be held responsible for that.