Hi friends in this tutorial I am going to tell you about the rat software
What does rat stands for?
Rat stands for
Remote administrationsoftware
What is rat software?
A remote access Trojan (RAT) is a malware
program that gives an intruder administrative
control over a target computer. RATs are
usually downloaded invisibly
program that gives an intruder administrative
control over a target computer. RATs are
usually downloaded invisibly
A remote administration tool ( RAT) is a piece of
software that allows a remote "operator" to
control a system as if he has physical access to
that system. While desktop sharing and remote
administration have many legal uses, "RAT"
software is usually associated with criminal or
malicious activity. Malicious RAT software is
typically installed without the victim's
knowledge, often as payload of a Trojan horse,
and will try to hide its operation from the victim
and from security software .
software that allows a remote "operator" to
control a system as if he has physical access to
that system. While desktop sharing and remote
administration have many legal uses, "RAT"
software is usually associated with criminal or
malicious activity. Malicious RAT software is
typically installed without the victim's
knowledge, often as payload of a Trojan horse,
and will try to hide its operation from the victim
and from security software .
What can a rat do?
operator controls the RAT through a network
connection. Such tools provide an operator the
following capabilities:
connection. Such tools provide an operator the
following capabilities:
1)
Screen/camera capture or image control
Screen/camera capture or image control
2)
File management (download/upload/execute/
etc
etc
3)
Shell control (from command prompt)
4)
Computer control (power off/on/log off if
remote feature is supported)
remote feature is supported)
5)
Registry management (query/add/delete/
modify)
modify)
List of all tasks that can be done by a rat software.
Block mouses and keyboards
Change the desktop wallpapers
Downloads, uploads, deletes, and rename files
Destroys hardware by overclocking
Drop viruses and worms
Edit Registry
Use your internet connection to perform denial
of service attacks (DoS)
Format drives
Steal passwords, credit card numbers
Alter your web browser's homepage
Hide desktop icons, task bar and files
Silently install applications
Log keystrokes, keystroke capture software
Open CD-ROM tray
Overload the RAM/ROM drive
Send message boxes
Play sounds
Control mouse or keyboard
Record sound with a connected microphone
Record video with a connected webcam
Show fake errors
Shutdown, restart, log-off, shut down monitor
Record and control victim's screen remotely
View, kill, and start tasks in task manager
Change the desktop wallpapers
Downloads, uploads, deletes, and rename files
Destroys hardware by overclocking
Drop viruses and worms
Edit Registry
Use your internet connection to perform denial
of service attacks (DoS)
Format drives
Steal passwords, credit card numbers
Alter your web browser's homepage
Hide desktop icons, task bar and files
Silently install applications
Log keystrokes, keystroke capture software
Open CD-ROM tray
Overload the RAM/ROM drive
Send message boxes
Play sounds
Control mouse or keyboard
Record sound with a connected microphone
Record video with a connected webcam
Show fake errors
Shutdown, restart, log-off, shut down monitor
Record and control victim's screen remotely
View, kill, and start tasks in task manager
Post a Comment