What Is RAT Or Remote Access Trojan

A Remote Administration Tool (RAT) is a piece of software that allows a remote “operator” to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses, “RAT” software is usually associated with criminal or malicious activity. Malicious RAT software is typically installed without the victim’s knowledge, often as payload of a Trojan horse, and will try to hide its operation from the victim and from security software.

The operator controls the RAT through a network connection. Such tools provide an operator the following capabilities:

  •     Screen/camera capture or image control
  •     File management (download/upload/execute/etc.)
  •     Shell control (from command prompt)
  •     Computer control (power off/on/log off if remote feature is supported)
  •     Registry management (query/add/delete/modify)
  •     Hardware Destroyer (overclocker)
  •     Other software product-specific functions

Its primary function is for one computer operator to gain access to remote PCs. One computer will run the “client” software application, while the other computer(s) operate as the “host(s)”.

What You Can Do With Rat?
  •     Block mouses and keyboards
  •     Change the desktop wallpapers
  •     Downloads, uploads, deletes, and rename files
  •     Destroys hardware by overclocking
  •     Drop viruses and worms
  •     Edit Registry
  •     Use your internet connection to perform denial of service attacks (DoS)
  •     Format drives
  •     Steal passwords, credit card numbers
  •     Alter your web browser’s homepage
  •     Hide desktop icons, task bar and files
  •     Silently install applications
  •     Log keystrokes, keystroke capture software
  •     Open CD-ROM tray
  •     Overload the RAM/ROM drive
  •     Send message boxes
  •     Play sounds
  •     Control mouse or keyboard
  •     Record sound with a connected microphone
  •     Record video with a connected webcam
  •     Show fake errors
  •     Shutdown, restart, log-off, shut down monitor
  •     Record and control victim’s screen remotely
  •     View, kill, and start tasks in task manager

List Of RAT software and Trojans
  •     Poison Ivy
  •     Njw0rm
  •     Spy-Net
  •     Back Orifice
  •     NetBus
  •     iControl
  •     Sub Seven
  •     Xi rat 2.1
  •     Beast Trojan
  •     Bifrost
  •     Blackshades
  •     DarkComet
  •     LANfiltrator
  •     Optix Pro
  •     Trojan horse
  •     VNC
SHARE

About Unknown

    Blogger Comment
    Facebook Comment

0 comments:

Post a Comment