SlideShare uma empresa Scribd logo
1 de 11
Magic Of Rat
Presented By : Nikesh Balami
What Is Remote Access
Trojan(RAT)?
Remote access Trojans (RATs) are typically
client-server programs.
They are doing a similar job like official remote
control and management tools.
The big difference is that a RAT installs itself
hidden and runs invisible for the user.
 It gives an attacker full control over the infected
machine as if he was sitting right in front of it.
 RATs are often used to upload and implant other
malware.
What We Are Going To Used?
NO-IP account on (www.no-ip.com)
NO-IP DUC
Darkcomet RAT
What Does NO-IP DUC Means?
No-IP DUC allows you to apply a fixed IP to your
domains hosted under servers with dynamic IPs.
You will be able to host a site in your own computer,
even if your IP address changes every time you
connect to the Internet
DUC stands for Dynamic Update Client. This means
that the program will keep track of any changes in your
IP, and will automatically update the DNS stored in the
NO-IP servers. Thus, the people visiting your website
will never know the they've been redirected to another
IP.
What Does Darkcomet RATs
Means?
DarkComet is one of the most popular RATs in use
today, gaining recent notoriety after its use by the
Syrian government.
The encryption method used in DarkComet has
already been extensively analyzed by various
researchers.
The DarkComet client stores information about
servers in a SQLite database, which is kept in the
directory from which the client runs.
Types Of RATs Tools OR
Software
Dark Comet RAT
Back Orifice
Bandook RAT
Bifrost
LANfiltrator
Optix Pro
ProRat
What Really Can We Do?
Block mouse and keyboard
Change your desktop wallpaper
Download, upload, delete, and rename files
Drop viruses and worms
Edit Registry
Use your Internet to perform distributed denial of
service attacks (DDOS)
Format drives
Grab passwords, credit card numbers
Hijack homepage
What Really Can We Do? Cont..
Hide desktop icons, taskbar and files
Log keystrokes, keystroke capture software
Open CD-ROM tray
Overload the RAM/ROM drive
Print text
Play sounds
Control mouse or keyboard
Record sound with a connected microphone
Record video with a connected web cam
Shutdown, restart, log-off, shut down monitor
Steal passwords
View screen
View, kill, and start tasks in task manager
At Last
Using RATs on remote systems
without their permission is illegal. This
article is for educational purpose only.
Don't do anything illegal. I will not be
held responsible for that.
Thank You

Mais conteúdo relacionado

Mais procurados

Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many otherSpoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many otherPankaj Dubey
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
Threat Actors - Vietnam (OceansLotus).pptx
Threat Actors - Vietnam (OceansLotus).pptxThreat Actors - Vietnam (OceansLotus).pptx
Threat Actors - Vietnam (OceansLotus).pptxMALCOMNORONHA1
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking PresentationAmbikaMalgatti
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingRaghav Bisht
 
The Proactive Approach to Cyber Security
The Proactive Approach to Cyber SecurityThe Proactive Approach to Cyber Security
The Proactive Approach to Cyber SecurityNathan Desfontaines
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virussumitra22
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION Yash Shukla
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020SecPod Technologies
 
Cehv8 - Module 02: footprinting and reconnaissance.
Cehv8 - Module 02: footprinting and reconnaissance.Cehv8 - Module 02: footprinting and reconnaissance.
Cehv8 - Module 02: footprinting and reconnaissance.Vuz Dở Hơi
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer SystemFaruk_Hossen
 
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?ITpreneurs
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityBharath Rao
 

Mais procurados (20)

Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
 
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many otherSpoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Threat Actors - Vietnam (OceansLotus).pptx
Threat Actors - Vietnam (OceansLotus).pptxThreat Actors - Vietnam (OceansLotus).pptx
Threat Actors - Vietnam (OceansLotus).pptx
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
The Proactive Approach to Cyber Security
The Proactive Approach to Cyber SecurityThe Proactive Approach to Cyber Security
The Proactive Approach to Cyber Security
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
What is malware
What is malwareWhat is malware
What is malware
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cia security model
Cia security modelCia security model
Cia security model
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
 
Cehv8 - Module 02: footprinting and reconnaissance.
Cehv8 - Module 02: footprinting and reconnaissance.Cehv8 - Module 02: footprinting and reconnaissance.
Cehv8 - Module 02: footprinting and reconnaissance.
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
 

Semelhante a Magic of RATs(Remote Access Torgens)

Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHackingAve Nawsh
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoorsseth edmond
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan BackdoorsJauwadSyed
 
Meeting02_RoT.pptx
Meeting02_RoT.pptxMeeting02_RoT.pptx
Meeting02_RoT.pptxothmanomar13
 
Remote access trojan
Remote access trojanRemote access trojan
Remote access trojanssuser1eca7d
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control AddressAngie Lee
 
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote AccessHacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote AccessEC-Council
 
RSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System HackRSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System HackDan Gunter
 
Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7Jesse Burke
 
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan BalazsHacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan BalazsShakacon
 

Semelhante a Magic of RATs(Remote Access Torgens) (20)

Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
about botnets
about botnetsabout botnets
about botnets
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Meeting02_RoT.pptx
Meeting02_RoT.pptxMeeting02_RoT.pptx
Meeting02_RoT.pptx
 
Remote Access For Desktop With Encryption System (
Remote  Access For Desktop With Encryption System (Remote  Access For Desktop With Encryption System (
Remote Access For Desktop With Encryption System (
 
It act seminar
It act seminarIt act seminar
It act seminar
 
Nanu
NanuNanu
Nanu
 
Remote access trojan
Remote access trojanRemote access trojan
Remote access trojan
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote AccessHacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
 
Hackers dictionary
Hackers dictionaryHackers dictionary
Hackers dictionary
 
RSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System HackRSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System Hack
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
 
Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7
 
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan BalazsHacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
 

Mais de Open Knowledge Nepal

Grassroots awareness and the impact of Civic Tech in Nepal
Grassroots awareness and the impact of Civic Tech in NepalGrassroots awareness and the impact of Civic Tech in Nepal
Grassroots awareness and the impact of Civic Tech in NepalOpen Knowledge Nepal
 
Open Data and Artificial Intelligence
Open Data and Artificial IntelligenceOpen Data and Artificial Intelligence
Open Data and Artificial IntelligenceOpen Knowledge Nepal
 
Open Access Publishing: Developing Countries
Open Access Publishing: Developing CountriesOpen Access Publishing: Developing Countries
Open Access Publishing: Developing CountriesOpen Knowledge Nepal
 
Information and Technology, not an Hard Subject
Information and Technology, not an Hard SubjectInformation and Technology, not an Hard Subject
Information and Technology, not an Hard SubjectOpen Knowledge Nepal
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngOpen Knowledge Nepal
 
AOSC Orentation for 1st Year student
AOSC Orentation for 1st Year studentAOSC Orentation for 1st Year student
AOSC Orentation for 1st Year studentOpen Knowledge Nepal
 

Mais de Open Knowledge Nepal (20)

Grassroots awareness and the impact of Civic Tech in Nepal
Grassroots awareness and the impact of Civic Tech in NepalGrassroots awareness and the impact of Civic Tech in Nepal
Grassroots awareness and the impact of Civic Tech in Nepal
 
Open Data and Artificial Intelligence
Open Data and Artificial IntelligenceOpen Data and Artificial Intelligence
Open Data and Artificial Intelligence
 
Code for Nepal and Open Data
Code for Nepal and Open DataCode for Nepal and Open Data
Code for Nepal and Open Data
 
Open Knowledge Network
Open Knowledge NetworkOpen Knowledge Network
Open Knowledge Network
 
Open Knowledge & PublicBodies Nepal
Open Knowledge & PublicBodies NepalOpen Knowledge & PublicBodies Nepal
Open Knowledge & PublicBodies Nepal
 
Open Data and Nepal Open Data Index
Open Data and Nepal Open Data IndexOpen Data and Nepal Open Data Index
Open Data and Nepal Open Data Index
 
Open Data - What and How??
Open Data - What and How??Open Data - What and How??
Open Data - What and How??
 
Open Access Publishing: Developing Countries
Open Access Publishing: Developing CountriesOpen Access Publishing: Developing Countries
Open Access Publishing: Developing Countries
 
Global - Local Open Data Index
Global - Local Open Data Index Global - Local Open Data Index
Global - Local Open Data Index
 
Information and Technology, not an Hard Subject
Information and Technology, not an Hard SubjectInformation and Technology, not an Hard Subject
Information and Technology, not an Hard Subject
 
Ball Eater
Ball EaterBall Eater
Ball Eater
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
 
Intro to Data visualization
Intro to Data visualization Intro to Data visualization
Intro to Data visualization
 
Firefox Student Ambassador
Firefox Student Ambassador Firefox Student Ambassador
Firefox Student Ambassador
 
Firefox Student Ambassador (FSA)
Firefox Student Ambassador (FSA)Firefox Student Ambassador (FSA)
Firefox Student Ambassador (FSA)
 
Machine Learning and Robotic Vision
Machine Learning and Robotic VisionMachine Learning and Robotic Vision
Machine Learning and Robotic Vision
 
Nepal
Nepal Nepal
Nepal
 
AOSC Orentation for 1st Year student
AOSC Orentation for 1st Year studentAOSC Orentation for 1st Year student
AOSC Orentation for 1st Year student
 
Acme Firefox Presentation
Acme Firefox PresentationAcme Firefox Presentation
Acme Firefox Presentation
 
Day 3-Important stuff
Day 3-Important stuffDay 3-Important stuff
Day 3-Important stuff
 

Último

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 

Último (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Magic of RATs(Remote Access Torgens)

  • 1. Magic Of Rat Presented By : Nikesh Balami
  • 2.
  • 3. What Is Remote Access Trojan(RAT)? Remote access Trojans (RATs) are typically client-server programs. They are doing a similar job like official remote control and management tools. The big difference is that a RAT installs itself hidden and runs invisible for the user.  It gives an attacker full control over the infected machine as if he was sitting right in front of it.  RATs are often used to upload and implant other malware.
  • 4. What We Are Going To Used? NO-IP account on (www.no-ip.com) NO-IP DUC Darkcomet RAT
  • 5. What Does NO-IP DUC Means? No-IP DUC allows you to apply a fixed IP to your domains hosted under servers with dynamic IPs. You will be able to host a site in your own computer, even if your IP address changes every time you connect to the Internet DUC stands for Dynamic Update Client. This means that the program will keep track of any changes in your IP, and will automatically update the DNS stored in the NO-IP servers. Thus, the people visiting your website will never know the they've been redirected to another IP.
  • 6. What Does Darkcomet RATs Means? DarkComet is one of the most popular RATs in use today, gaining recent notoriety after its use by the Syrian government. The encryption method used in DarkComet has already been extensively analyzed by various researchers. The DarkComet client stores information about servers in a SQLite database, which is kept in the directory from which the client runs.
  • 7. Types Of RATs Tools OR Software Dark Comet RAT Back Orifice Bandook RAT Bifrost LANfiltrator Optix Pro ProRat
  • 8. What Really Can We Do? Block mouse and keyboard Change your desktop wallpaper Download, upload, delete, and rename files Drop viruses and worms Edit Registry Use your Internet to perform distributed denial of service attacks (DDOS) Format drives Grab passwords, credit card numbers Hijack homepage
  • 9. What Really Can We Do? Cont.. Hide desktop icons, taskbar and files Log keystrokes, keystroke capture software Open CD-ROM tray Overload the RAM/ROM drive Print text Play sounds Control mouse or keyboard Record sound with a connected microphone Record video with a connected web cam Shutdown, restart, log-off, shut down monitor Steal passwords View screen View, kill, and start tasks in task manager
  • 10. At Last Using RATs on remote systems without their permission is illegal. This article is for educational purpose only. Don't do anything illegal. I will not be held responsible for that.