SlideShare una empresa de Scribd logo
1 de 19
Ultimate Guide to Setup DarkComet RAT
with NoIP
What is Darkcomet?
DarkComet RAT is a free and popular Remote Administration Tool. This software is
an efficient type of software, especially created to remote control any Microsoft
Windows machine.
It is famous for being one of if not the most stable and most complete RAT’s
available. Just like VNC and other similar types of software, DarkComet gives you
the ability to connect to and control your systems, wherever you are.
You can keep a close eye on your computers to supervise the online activity of your
employees or children. Furthermore DatkComer RAT can be used to monitor your
system, remotely assist your clients or family members to recover lost data or repair a
computer.
The main functions of DarkComet RAT are System Monitor (Process, Registry,
Startup, DNS Manager, etc.), File manager (which is even more complete than an
FTP-server), Surveillance (Micro-capture, Keylogger, Screen capture, Webcam
capture, etc.), Network functions (Scan for local computers, monitor network activity,
WIFI viewer, download files from web, etc.) and much more.
Both the DarkComet RAT Controller and its Controlled module can be detected by
some antivirus-programs but that constitutes a false positive due of the abilities of the
program in the system. The package doesn’t and will not ever contain any viruses or
other types of malware. Its why DarkComet RAT got such a very good reputation.

HackingSpace.org
Requirement before Setup
1. Latest Darkcomet RAT Legacy v5.4.1. Link to download will be provided at the
end of this post.
2. A No-IP account (Click to visit site)
What is No-IP?
No-ip is a DNS redirectional service. You may have used it before if you managed a
RSPS. For RSPS, it was easier than remembering a specific IP like 83.111.911.83 for
an example. Rather RSPSserver.zapto.org or something. For your RAT, it simply
covers your ass if your IP changes. The problem with direct linking to your IP is if
your IP changes and you’re NOT using No-ip, you lose every single one of your
slaves. This is where No-ip comes to rescue, making sure that as long as you used it,
slaves are redirected to your real IP and you keep all of your slaves. It’s why it’s so
crucial.

HackingSpace.org
How to create and setup No-IP account?
Go to http://www.no-ip.com/ and hover over “Sign in” and click “Sign up for an
account”.

HackingSpace.org
Now go to your email and click on the confirmation link.
Go Download the client app from this link or on their website.
Install it in your OS. After the installation you will see this windows popup. Type in
your username and password.

HackingSpace.org
After you’ve successfully login, you should see something like this.

Do not freak out, click on EDIT HOSTS. Login to your noip.com type in your
username and password and click on Manage Host

HackingSpace.org
Now back to your DUC or NoIp app. Click on Edit Host

HackingSpace.org
Check on the host that you’ve just created and click on Save.

If you’ve done it correctly, you should see something like this.

That’s it. All that you need to do with it after is keep it running, and it will perform its
duty of redirecting your slaves to your real IP. Enjoy.

HackingSpace.org
How to Set up Darkcomet?
This is where I see a lot of things go wrong, this is where the false information gets
spread, propagated, and A LOT of things can go wrong. Let’s begin. Start by
extracting and opening Darkcomet. If you recently downloaded it from the link I
mentioned earlier, you have to extract it from the .ZIP before you can use it.
What the @#$% happened to Darkcomet?!
If your Darkcomet.exe does not have a blue asteroid icon, or just doesn’t show at all,
your Antivirus has likely quarantined and/or corrupted Darkcomet. Turn it off. If you
don’t have an AV and it still does this, Windows Defender is likely the cause.
How to disable windows defender?
Click the Start Button -> (Enter into the Search Box) -> Windows Defender > Open -> Tools -> Options -> Administrator -> Use this program? -> Uncheck > Apply -> You’re awesome! Once Darkcomet is open, an EULA should come up,
just hit the checkbox, “Do not again display the EULA” and press Accept after 10
seconds. After Darkcomet is open (and it is your first time), another box should come
up giving you general tips about Darkcomet. If you wish to read through it, that’s fine.
Just hit “Do not show on restart” and then “Fine” after you are done.

Once it is open, go to the Socket/net Tab at the top middle-right and right click in the
general area, and click “Add port to listen.”
HackingSpace.org
This box should come up.

What should I put for the port?
The port, like the No-ip, does not matter. The only two restrictions are it HAS to be a
number between 1-65535 and another program must not be using it. Other than that,
go free. 1337 or 1604 or 101 are all popular, it’s really your own preference, though.
Once you click Listen, a Windows Firewall diologue box should pop up (If you have
it enabled) and if it does, just click “Allow access”. This is Darkcomet trying to add
itself as an exception to the firewall, this is fine.

What is upnp.exe in %temp% for?
Darkcodersc (Coder of Darkcomet) added Universal Plug and Play to Darkcomet.
This is not a RAT or a keylogger, it is simply trying to portforward for you
automatically. I’d say this is a good thing, especially since most routers support it and
it would eliminate the hassle for you trying to portforward. Once it is added, navigate
to Canyouseeme.org and check if it’s open. If UpNP worked successfully, your port
should be open and working.

HackingSpace.org
Hurray! Good for you. If it’s not, do the following.
1. Completely Disable Windows Firewall/Any other Firewalls you may have. (These
often block the ping from canyouseeme.org)
2. Completely disable your antivirus (Some block the connection as well.)
3. Make sure Darkcomet is open AND listening to the port. (I cannot stress this
enough, it will be a false negative, your port MUST be listened to before it can
show as open.)
If it still not open, I will have a mini tutorial soon for portforwarding near the bottom
of the post. Alright. My port is open, Darkcomet is open, what do I do now? Make a
stub.

HackingSpace.org
There are two different options for making a stub: Minimalist and Expert. I will sum
up the options here:
 Minimalist: Little options, very hard to screw up but still possible.
 Expert: A plethora of options, any screw up will leave you with a corrupted server
after crypting.


Settings for Minimalist:

Stub ID is a variable which can set to your liking, though it could be used for
organization of your slaves. IE: From Youtube, From Ewhoring, From Torrents, From
X Crypter, etc. IP/DNS: No-ip address. Port: The port you chose earlier in the thread.
1604 is the default port. Generate the stub as “Normal”. Why? It has a chance to
corrupt if you crypt a small server. (As it’s compressed with UPX)
Why did you turn off startup?
It ensures the maximum amount of compatibility for your crypter. It is much more
stable to use your crypter startup. In my own experiences, it has also corrupted the
stub after it was crypted, though not all the time. It’s essential to leave it off for this
HackingSpace.org
reason. Settings for Expert: Expert only has one advantage in my opinion to
Minimalist, otherwise it’s the exact same. Mutex. Mutex ensures that only one copy of
that specific stub runs on one slave. It is useful for making sure that your slave count
is accurate, and to avoid duplicates.

For Advanced Users

(Note that the Client Password is not required, if you don’t want to use it, that’s fine.
Just uncheck it, but I will be covering it as it does increase security for you by a good
amount.) Click “Network Settings,” the settings for such can be found here:

HackingSpace.org
(Once again, 1604 was the default port for Darkcomet. Obviously replace it with the
one you are using.) Skip “Module Startup”, “Install Message”, and “Module
Shield”, “Keylogger”, “Hosts File”, “Add Plugins”, “File Binder”, “Choose
Icon”, skip down to “Stub Finalization”.

Why??
This is to ensure the maximum amount of compatability for the crypter you are using.
If you want any options on any of those pages, it should be enabled on your crypter
only. (Especially startup.) Now, make sure to build it according to my settings
following:

HackingSpace.org
Click Build the stub, give a name to it and hit enter. Congrats, you are ready to test
your stub. What about the password we set earlier? Oh right, let’s cover that!
Navigate to Client Settings.

Enter the password you entered earlier in Expert build (If you used it. If you did not,
do not bother with this step.)

HackingSpace.org
Now, we are ready to test it.
Still doesn’t work no matter what I do
This is due to your router not supporting NAT Loopback, most do not. Therefore, you
testing it on yourself will give you a false negative in terms of whether or not your
server works.
How do I test my stub, then?
Use Anubis. (Uncrypted servers ONLY, Anubis distributes samples + Crypted ones
do not work.) You may also be able to test it if some very helpful person were to give
you a test install, otherwise running it on one of their slaves to see if your server
works. (I do not do this as I have little slaves.)

HackingSpace.org
Mini Portforwarding Tutorial
I understand that most routers do not have the exact same options, but the majority of
them support port forwarding in the exact same way. It may be called as a different
name, “Virtual Server” or “Port Opening” or “Pin holes” or just “Port Forwarding”.
These are the exact same thing. Navigate to the start Menu -> Enter into search
box -> Cmd -> Hit Enter.
When that black box comes up, type “Ipconfig” and hit Enter. The following text
should come up.

Find the “Ipv4 address” and copy it down. This is the IP you’ll be forwarding too.
There are multiple Ipv4 addresses, which one do I know is right?
There is two ways. It is the first one to display this information (It’s not at the bottom,
it’s at the very top after you type the command.)
The second way is if it has “default gateway”. This is a surefire way to tell that it is
correct.

HackingSpace.org
Copy the “Default Gateway” into the address bar of your browser. Then hit enter. If
your router has a password, it should prompt you for a password.A quick google
search of your router model + default password will probably reveal it.
That’s on you. Once you’re at your router page, it can be tricky to locate the “Port
forwarding” option. It is, in most cases, located under the Security
section/Firewall/Advanced Settings/Advanced Setup.
It’s different for every router, so there is no way to encompass them all. Mine was
under Advanced Setup.

Yours should look similar to mine (but not in GUI, but in options.)

HackingSpace.org
Starting Port: The port you’re going to use on your RAT.
Ending port: The port you’re going to use on your RAT. (Note that Starting port and
Ending port should be the same number. As it only requires one port to RAT for
Darkcomet.)
Protocol: TCP (It’s what Darkcomet uses.)
If your router only has “Both” and you want to be doubly sure, go ahead.
It doesn’t matter, as long as it encompasses TCP at one point or another. IP address:
That IPv4 address from CMD, enter that in that box. Since the other settings are
marked as optional by my router, the only thing you need to do now is hit the
equivalent of “Apply” on your router.
It may be save settings, it may be apply settings, whatever. Your router may restart to
apply them, and it may not. It depends on what you have.
Darkcomet is open (and listening to the port). Windows Firewall is off. Antivirus
is off. I followed the mini portforwarding guide. My port is still not open. What
do?
In this, there is only one more option on your router that could be of assistance. In my
case DynDNS: (Dynamic DNS) This will allow ANY traffic from any port on your

HackingSpace.org
router. This is a major security concern. If you wish to allow it, find “Dynamic DNS”
on your router, enable it and enter your IPv4 address and hit Apply.

That’s All! I hope you enjoyed the tutorial. If I did ANYTHING wrong at all, I gave
the false info, I had a spelling mistake, my image was not relevant. PLEASE leave the
comment or shoot me an email. I really love to hear your feedback on this post.
Download Links:
Darkcomet v5.4.1 Legacy
Mirror Links:
Mirror Link 1
Mirror Link 2
Mirror Link 3

HackingSpace.org

Más contenido relacionado

La actualidad más candente

Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
Network security main
Network security mainNetwork security main
Network security mainYogeshDhamke2
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filtersMOHIT AGARWAL
 
Matrix factorization
Matrix factorizationMatrix factorization
Matrix factorizationLuis Serrano
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationTayabaZahid
 
Unified modeling language diagrams
Unified modeling language diagramsUnified modeling language diagrams
Unified modeling language diagramsAlaa Ahmed
 
Overview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptxOverview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptxAjayKumar73315
 
client server protocol
client server protocolclient server protocol
client server protocolbmuhire
 
Chapter 5 Presentation
Chapter 5 PresentationChapter 5 Presentation
Chapter 5 PresentationAmy McMullin
 
trojan horse- malware(virus)
trojan horse- malware(virus)trojan horse- malware(virus)
trojan horse- malware(virus)NamanKikani
 
Crud tutorial en
Crud tutorial enCrud tutorial en
Crud tutorial enforkgrown
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and AnalysisPrashant Chopra
 
Metasploit
MetasploitMetasploit
Metasploithenelpj
 

La actualidad más candente (20)

Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Applet programming
Applet programming Applet programming
Applet programming
 
Network security main
Network security mainNetwork security main
Network security main
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Matrix factorization
Matrix factorizationMatrix factorization
Matrix factorization
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Unified modeling language diagrams
Unified modeling language diagramsUnified modeling language diagrams
Unified modeling language diagrams
 
Java Notes
Java NotesJava Notes
Java Notes
 
Overview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptxOverview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptx
 
client server protocol
client server protocolclient server protocol
client server protocol
 
Metasploit framwork
Metasploit framworkMetasploit framwork
Metasploit framwork
 
Chapter 5 Presentation
Chapter 5 PresentationChapter 5 Presentation
Chapter 5 Presentation
 
Metaploit
MetaploitMetaploit
Metaploit
 
This and Static Keyword
This and Static KeywordThis and Static Keyword
This and Static Keyword
 
Computer security
Computer securityComputer security
Computer security
 
trojan horse- malware(virus)
trojan horse- malware(virus)trojan horse- malware(virus)
trojan horse- malware(virus)
 
Crud tutorial en
Crud tutorial enCrud tutorial en
Crud tutorial en
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and Analysis
 
Metasploit
MetasploitMetasploit
Metasploit
 

Destacado

Cmmaao pmi-design blueprint v1b
Cmmaao pmi-design blueprint v1bCmmaao pmi-design blueprint v1b
Cmmaao pmi-design blueprint v1bmission_vishvas
 
Pmi pmbok-resume template-10
Pmi pmbok-resume template-10Pmi pmbok-resume template-10
Pmi pmbok-resume template-10mission_vishvas
 
Cmmaao communication-plan-pmi-pmp
Cmmaao communication-plan-pmi-pmpCmmaao communication-plan-pmi-pmp
Cmmaao communication-plan-pmi-pmpmission_vishvas
 
Resume template 18-cmmaao-pmi
Resume template 18-cmmaao-pmiResume template 18-cmmaao-pmi
Resume template 18-cmmaao-pmimission_vishvas
 
Vishvas resume template-7
Vishvas resume template-7Vishvas resume template-7
Vishvas resume template-7mission_vishvas
 
Pmi pmp-resume template-12
Pmi pmp-resume template-12Pmi pmp-resume template-12
Pmi pmp-resume template-12mission_vishvas
 
Cmmaao pmi-resume template-9
Cmmaao pmi-resume template-9Cmmaao pmi-resume template-9
Cmmaao pmi-resume template-9mission_vishvas
 
Cmmaao pmi-resume template-19
Cmmaao pmi-resume template-19Cmmaao pmi-resume template-19
Cmmaao pmi-resume template-19mission_vishvas
 
Cmmaao pmi-lessons learned v1b
Cmmaao pmi-lessons learned v1bCmmaao pmi-lessons learned v1b
Cmmaao pmi-lessons learned v1bmission_vishvas
 
Vishvas resume template-15
Vishvas resume template-15Vishvas resume template-15
Vishvas resume template-15mission_vishvas
 
High common factor (HCF)
High common factor (HCF)High common factor (HCF)
High common factor (HCF)Likkle Bonita
 
Pmi pmbok-resume template-19
Pmi pmbok-resume template-19Pmi pmbok-resume template-19
Pmi pmbok-resume template-19mission_vishvas
 
Pmi pmbok-resume template-9
Pmi pmbok-resume template-9Pmi pmbok-resume template-9
Pmi pmbok-resume template-9mission_vishvas
 
Vishvas resume template-3
Vishvas resume template-3Vishvas resume template-3
Vishvas resume template-3mission_vishvas
 

Destacado (20)

Resume template 15
Resume template 15Resume template 15
Resume template 15
 
Cmmaao pmi-design blueprint v1b
Cmmaao pmi-design blueprint v1bCmmaao pmi-design blueprint v1b
Cmmaao pmi-design blueprint v1b
 
Resume template 1
Resume template 1Resume template 1
Resume template 1
 
Pmi pmbok-resume template-10
Pmi pmbok-resume template-10Pmi pmbok-resume template-10
Pmi pmbok-resume template-10
 
Cmmaao communication-plan-pmi-pmp
Cmmaao communication-plan-pmi-pmpCmmaao communication-plan-pmi-pmp
Cmmaao communication-plan-pmi-pmp
 
Resume template 18-cmmaao-pmi
Resume template 18-cmmaao-pmiResume template 18-cmmaao-pmi
Resume template 18-cmmaao-pmi
 
Vishvas resume template-7
Vishvas resume template-7Vishvas resume template-7
Vishvas resume template-7
 
Resume template 11
Resume template 11Resume template 11
Resume template 11
 
Present perfect
Present perfectPresent perfect
Present perfect
 
Pmi pmp-resume template-12
Pmi pmp-resume template-12Pmi pmp-resume template-12
Pmi pmp-resume template-12
 
Animation
AnimationAnimation
Animation
 
Cmmaao pmi-resume template-9
Cmmaao pmi-resume template-9Cmmaao pmi-resume template-9
Cmmaao pmi-resume template-9
 
Cmmaao pmi-resume template-19
Cmmaao pmi-resume template-19Cmmaao pmi-resume template-19
Cmmaao pmi-resume template-19
 
Cmmaao pmi-lessons learned v1b
Cmmaao pmi-lessons learned v1bCmmaao pmi-lessons learned v1b
Cmmaao pmi-lessons learned v1b
 
Vishvas resume template-15
Vishvas resume template-15Vishvas resume template-15
Vishvas resume template-15
 
Cmmaao pmi
Cmmaao pmiCmmaao pmi
Cmmaao pmi
 
High common factor (HCF)
High common factor (HCF)High common factor (HCF)
High common factor (HCF)
 
Pmi pmbok-resume template-19
Pmi pmbok-resume template-19Pmi pmbok-resume template-19
Pmi pmbok-resume template-19
 
Pmi pmbok-resume template-9
Pmi pmbok-resume template-9Pmi pmbok-resume template-9
Pmi pmbok-resume template-9
 
Vishvas resume template-3
Vishvas resume template-3Vishvas resume template-3
Vishvas resume template-3
 

Similar a Step by Step on How to Setup DarkComet

Rob "Mubix" Fuller: Attacker Ghost Stories
Rob "Mubix" Fuller: Attacker Ghost StoriesRob "Mubix" Fuller: Attacker Ghost Stories
Rob "Mubix" Fuller: Attacker Ghost StoriesArea41
 
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)Rob Fuller
 
44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus
44CON 2014 - Switches Get Stitches,  Eireann Leverett & Matt Erasmus44CON 2014 - Switches Get Stitches,  Eireann Leverett & Matt Erasmus
44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus44CON
 
Hack the book Mini
Hack the book MiniHack the book Mini
Hack the book MiniKhairi Aiman
 
Security & ethical hacking p2
Security & ethical hacking p2Security & ethical hacking p2
Security & ethical hacking p2ratnalajaggu
 
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting ClassThe Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting ClassRob Fuller
 
Project: Intrusion Detection
Project: Intrusion DetectionProject: Intrusion Detection
Project: Intrusion DetectionJay Schulman
 
#Data vault, irc warez (ty 4 moving x)
#Data vault, irc warez (ty 4 moving x)#Data vault, irc warez (ty 4 moving x)
#Data vault, irc warez (ty 4 moving x)Vishal Gurujuwada
 
Securing Rails
Securing RailsSecuring Rails
Securing RailsAlex Payne
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for EveryoneNikhil Mittal
 
Test & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automatedTest & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automatedZoltan Balazs
 
Hackers The Anarchists Of Our Time
Hackers The Anarchists Of Our TimeHackers The Anarchists Of Our Time
Hackers The Anarchists Of Our TimeUtkarsh Sengar
 
Teach Your Sites to Call for Help: Automated Problem Reporting for Online Ser...
Teach Your Sites to Call for Help: Automated Problem Reporting for Online Ser...Teach Your Sites to Call for Help: Automated Problem Reporting for Online Ser...
Teach Your Sites to Call for Help: Automated Problem Reporting for Online Ser...Caktus Group
 
Joxean Koret - Database Security Paradise [Rooted CON 2011]
Joxean Koret - Database Security Paradise [Rooted CON 2011]Joxean Koret - Database Security Paradise [Rooted CON 2011]
Joxean Koret - Database Security Paradise [Rooted CON 2011]RootedCON
 
Information gathering
Information gatheringInformation gathering
Information gatheringMoTechInc
 
bettercap.pdf
bettercap.pdfbettercap.pdf
bettercap.pdfshehbaz15
 

Similar a Step by Step on How to Setup DarkComet (20)

Rob "Mubix" Fuller: Attacker Ghost Stories
Rob "Mubix" Fuller: Attacker Ghost StoriesRob "Mubix" Fuller: Attacker Ghost Stories
Rob "Mubix" Fuller: Attacker Ghost Stories
 
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
 
44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus
44CON 2014 - Switches Get Stitches,  Eireann Leverett & Matt Erasmus44CON 2014 - Switches Get Stitches,  Eireann Leverett & Matt Erasmus
44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus
 
Backtrack Manual Part9
Backtrack Manual Part9Backtrack Manual Part9
Backtrack Manual Part9
 
Hack the book Mini
Hack the book MiniHack the book Mini
Hack the book Mini
 
Old Linux Security Talk
Old Linux Security TalkOld Linux Security Talk
Old Linux Security Talk
 
Security & ethical hacking p2
Security & ethical hacking p2Security & ethical hacking p2
Security & ethical hacking p2
 
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting ClassThe Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
 
Project: Intrusion Detection
Project: Intrusion DetectionProject: Intrusion Detection
Project: Intrusion Detection
 
Thou shalt not
Thou shalt notThou shalt not
Thou shalt not
 
#Data vault, irc warez (ty 4 moving x)
#Data vault, irc warez (ty 4 moving x)#Data vault, irc warez (ty 4 moving x)
#Data vault, irc warez (ty 4 moving x)
 
Securing Rails
Securing RailsSecuring Rails
Securing Rails
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for Everyone
 
Test & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automatedTest & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automated
 
Hackers The Anarchists Of Our Time
Hackers The Anarchists Of Our TimeHackers The Anarchists Of Our Time
Hackers The Anarchists Of Our Time
 
Bettercap
BettercapBettercap
Bettercap
 
Teach Your Sites to Call for Help: Automated Problem Reporting for Online Ser...
Teach Your Sites to Call for Help: Automated Problem Reporting for Online Ser...Teach Your Sites to Call for Help: Automated Problem Reporting for Online Ser...
Teach Your Sites to Call for Help: Automated Problem Reporting for Online Ser...
 
Joxean Koret - Database Security Paradise [Rooted CON 2011]
Joxean Koret - Database Security Paradise [Rooted CON 2011]Joxean Koret - Database Security Paradise [Rooted CON 2011]
Joxean Koret - Database Security Paradise [Rooted CON 2011]
 
Information gathering
Information gatheringInformation gathering
Information gathering
 
bettercap.pdf
bettercap.pdfbettercap.pdf
bettercap.pdf
 

Último

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Último (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Step by Step on How to Setup DarkComet

  • 1. Ultimate Guide to Setup DarkComet RAT with NoIP What is Darkcomet? DarkComet RAT is a free and popular Remote Administration Tool. This software is an efficient type of software, especially created to remote control any Microsoft Windows machine. It is famous for being one of if not the most stable and most complete RAT’s available. Just like VNC and other similar types of software, DarkComet gives you the ability to connect to and control your systems, wherever you are. You can keep a close eye on your computers to supervise the online activity of your employees or children. Furthermore DatkComer RAT can be used to monitor your system, remotely assist your clients or family members to recover lost data or repair a computer. The main functions of DarkComet RAT are System Monitor (Process, Registry, Startup, DNS Manager, etc.), File manager (which is even more complete than an FTP-server), Surveillance (Micro-capture, Keylogger, Screen capture, Webcam capture, etc.), Network functions (Scan for local computers, monitor network activity, WIFI viewer, download files from web, etc.) and much more. Both the DarkComet RAT Controller and its Controlled module can be detected by some antivirus-programs but that constitutes a false positive due of the abilities of the program in the system. The package doesn’t and will not ever contain any viruses or other types of malware. Its why DarkComet RAT got such a very good reputation. HackingSpace.org
  • 2. Requirement before Setup 1. Latest Darkcomet RAT Legacy v5.4.1. Link to download will be provided at the end of this post. 2. A No-IP account (Click to visit site) What is No-IP? No-ip is a DNS redirectional service. You may have used it before if you managed a RSPS. For RSPS, it was easier than remembering a specific IP like 83.111.911.83 for an example. Rather RSPSserver.zapto.org or something. For your RAT, it simply covers your ass if your IP changes. The problem with direct linking to your IP is if your IP changes and you’re NOT using No-ip, you lose every single one of your slaves. This is where No-ip comes to rescue, making sure that as long as you used it, slaves are redirected to your real IP and you keep all of your slaves. It’s why it’s so crucial. HackingSpace.org
  • 3. How to create and setup No-IP account? Go to http://www.no-ip.com/ and hover over “Sign in” and click “Sign up for an account”. HackingSpace.org
  • 4. Now go to your email and click on the confirmation link. Go Download the client app from this link or on their website. Install it in your OS. After the installation you will see this windows popup. Type in your username and password. HackingSpace.org
  • 5. After you’ve successfully login, you should see something like this. Do not freak out, click on EDIT HOSTS. Login to your noip.com type in your username and password and click on Manage Host HackingSpace.org
  • 6. Now back to your DUC or NoIp app. Click on Edit Host HackingSpace.org
  • 7. Check on the host that you’ve just created and click on Save. If you’ve done it correctly, you should see something like this. That’s it. All that you need to do with it after is keep it running, and it will perform its duty of redirecting your slaves to your real IP. Enjoy. HackingSpace.org
  • 8. How to Set up Darkcomet? This is where I see a lot of things go wrong, this is where the false information gets spread, propagated, and A LOT of things can go wrong. Let’s begin. Start by extracting and opening Darkcomet. If you recently downloaded it from the link I mentioned earlier, you have to extract it from the .ZIP before you can use it. What the @#$% happened to Darkcomet?! If your Darkcomet.exe does not have a blue asteroid icon, or just doesn’t show at all, your Antivirus has likely quarantined and/or corrupted Darkcomet. Turn it off. If you don’t have an AV and it still does this, Windows Defender is likely the cause. How to disable windows defender? Click the Start Button -> (Enter into the Search Box) -> Windows Defender > Open -> Tools -> Options -> Administrator -> Use this program? -> Uncheck > Apply -> You’re awesome! Once Darkcomet is open, an EULA should come up, just hit the checkbox, “Do not again display the EULA” and press Accept after 10 seconds. After Darkcomet is open (and it is your first time), another box should come up giving you general tips about Darkcomet. If you wish to read through it, that’s fine. Just hit “Do not show on restart” and then “Fine” after you are done. Once it is open, go to the Socket/net Tab at the top middle-right and right click in the general area, and click “Add port to listen.” HackingSpace.org
  • 9. This box should come up. What should I put for the port? The port, like the No-ip, does not matter. The only two restrictions are it HAS to be a number between 1-65535 and another program must not be using it. Other than that, go free. 1337 or 1604 or 101 are all popular, it’s really your own preference, though. Once you click Listen, a Windows Firewall diologue box should pop up (If you have it enabled) and if it does, just click “Allow access”. This is Darkcomet trying to add itself as an exception to the firewall, this is fine. What is upnp.exe in %temp% for? Darkcodersc (Coder of Darkcomet) added Universal Plug and Play to Darkcomet. This is not a RAT or a keylogger, it is simply trying to portforward for you automatically. I’d say this is a good thing, especially since most routers support it and it would eliminate the hassle for you trying to portforward. Once it is added, navigate to Canyouseeme.org and check if it’s open. If UpNP worked successfully, your port should be open and working. HackingSpace.org
  • 10. Hurray! Good for you. If it’s not, do the following. 1. Completely Disable Windows Firewall/Any other Firewalls you may have. (These often block the ping from canyouseeme.org) 2. Completely disable your antivirus (Some block the connection as well.) 3. Make sure Darkcomet is open AND listening to the port. (I cannot stress this enough, it will be a false negative, your port MUST be listened to before it can show as open.) If it still not open, I will have a mini tutorial soon for portforwarding near the bottom of the post. Alright. My port is open, Darkcomet is open, what do I do now? Make a stub. HackingSpace.org
  • 11. There are two different options for making a stub: Minimalist and Expert. I will sum up the options here:  Minimalist: Little options, very hard to screw up but still possible.  Expert: A plethora of options, any screw up will leave you with a corrupted server after crypting.  Settings for Minimalist: Stub ID is a variable which can set to your liking, though it could be used for organization of your slaves. IE: From Youtube, From Ewhoring, From Torrents, From X Crypter, etc. IP/DNS: No-ip address. Port: The port you chose earlier in the thread. 1604 is the default port. Generate the stub as “Normal”. Why? It has a chance to corrupt if you crypt a small server. (As it’s compressed with UPX) Why did you turn off startup? It ensures the maximum amount of compatibility for your crypter. It is much more stable to use your crypter startup. In my own experiences, it has also corrupted the stub after it was crypted, though not all the time. It’s essential to leave it off for this HackingSpace.org
  • 12. reason. Settings for Expert: Expert only has one advantage in my opinion to Minimalist, otherwise it’s the exact same. Mutex. Mutex ensures that only one copy of that specific stub runs on one slave. It is useful for making sure that your slave count is accurate, and to avoid duplicates. For Advanced Users (Note that the Client Password is not required, if you don’t want to use it, that’s fine. Just uncheck it, but I will be covering it as it does increase security for you by a good amount.) Click “Network Settings,” the settings for such can be found here: HackingSpace.org
  • 13. (Once again, 1604 was the default port for Darkcomet. Obviously replace it with the one you are using.) Skip “Module Startup”, “Install Message”, and “Module Shield”, “Keylogger”, “Hosts File”, “Add Plugins”, “File Binder”, “Choose Icon”, skip down to “Stub Finalization”. Why?? This is to ensure the maximum amount of compatability for the crypter you are using. If you want any options on any of those pages, it should be enabled on your crypter only. (Especially startup.) Now, make sure to build it according to my settings following: HackingSpace.org
  • 14. Click Build the stub, give a name to it and hit enter. Congrats, you are ready to test your stub. What about the password we set earlier? Oh right, let’s cover that! Navigate to Client Settings. Enter the password you entered earlier in Expert build (If you used it. If you did not, do not bother with this step.) HackingSpace.org
  • 15. Now, we are ready to test it. Still doesn’t work no matter what I do This is due to your router not supporting NAT Loopback, most do not. Therefore, you testing it on yourself will give you a false negative in terms of whether or not your server works. How do I test my stub, then? Use Anubis. (Uncrypted servers ONLY, Anubis distributes samples + Crypted ones do not work.) You may also be able to test it if some very helpful person were to give you a test install, otherwise running it on one of their slaves to see if your server works. (I do not do this as I have little slaves.) HackingSpace.org
  • 16. Mini Portforwarding Tutorial I understand that most routers do not have the exact same options, but the majority of them support port forwarding in the exact same way. It may be called as a different name, “Virtual Server” or “Port Opening” or “Pin holes” or just “Port Forwarding”. These are the exact same thing. Navigate to the start Menu -> Enter into search box -> Cmd -> Hit Enter. When that black box comes up, type “Ipconfig” and hit Enter. The following text should come up. Find the “Ipv4 address” and copy it down. This is the IP you’ll be forwarding too. There are multiple Ipv4 addresses, which one do I know is right? There is two ways. It is the first one to display this information (It’s not at the bottom, it’s at the very top after you type the command.) The second way is if it has “default gateway”. This is a surefire way to tell that it is correct. HackingSpace.org
  • 17. Copy the “Default Gateway” into the address bar of your browser. Then hit enter. If your router has a password, it should prompt you for a password.A quick google search of your router model + default password will probably reveal it. That’s on you. Once you’re at your router page, it can be tricky to locate the “Port forwarding” option. It is, in most cases, located under the Security section/Firewall/Advanced Settings/Advanced Setup. It’s different for every router, so there is no way to encompass them all. Mine was under Advanced Setup. Yours should look similar to mine (but not in GUI, but in options.) HackingSpace.org
  • 18. Starting Port: The port you’re going to use on your RAT. Ending port: The port you’re going to use on your RAT. (Note that Starting port and Ending port should be the same number. As it only requires one port to RAT for Darkcomet.) Protocol: TCP (It’s what Darkcomet uses.) If your router only has “Both” and you want to be doubly sure, go ahead. It doesn’t matter, as long as it encompasses TCP at one point or another. IP address: That IPv4 address from CMD, enter that in that box. Since the other settings are marked as optional by my router, the only thing you need to do now is hit the equivalent of “Apply” on your router. It may be save settings, it may be apply settings, whatever. Your router may restart to apply them, and it may not. It depends on what you have. Darkcomet is open (and listening to the port). Windows Firewall is off. Antivirus is off. I followed the mini portforwarding guide. My port is still not open. What do? In this, there is only one more option on your router that could be of assistance. In my case DynDNS: (Dynamic DNS) This will allow ANY traffic from any port on your HackingSpace.org
  • 19. router. This is a major security concern. If you wish to allow it, find “Dynamic DNS” on your router, enable it and enter your IPv4 address and hit Apply. That’s All! I hope you enjoyed the tutorial. If I did ANYTHING wrong at all, I gave the false info, I had a spelling mistake, my image was not relevant. PLEASE leave the comment or shoot me an email. I really love to hear your feedback on this post. Download Links: Darkcomet v5.4.1 Legacy Mirror Links: Mirror Link 1 Mirror Link 2 Mirror Link 3 HackingSpace.org