In this post, I am going to show you, how you can hack
windows system using RAT (Trojan). Before explaining it, you must know what the
Trojan is, and what it's function?
What is RAT (Trojan)? - A remote
access tool (a RAT) is a piece of software that allows a remote
"operator" to control a system as if he has physical access to that
system. While desktop sharing and remote administration have many legal uses,
"RAT" software is usually associated with criminal or malicious
activity. Malicious RAT software is typically installed without the victim’s
knowledge, often as payload of a Trojan horse, and will try to hide its
operation from the victim and from security software.
What it’s Function? - Its primary
function is for one computer operator to gain access to remote PCs. The
operator controls the RAT via network connection. Such tools provide an
operator the following capabilities:
- We can capture Screen/camera.
- We can do all File management such as: download/upload/execute etc.
- We can control Shell from command prompt.
- We can control Computer’s control such as: power off/on/log off etc.
- We can manage the entire Registry such as: query/add/delete/modify Registry.
- Other software specific functions.
For Example - Guide of Using Poison IVY RAT -
Step 1 - You can download it from here.
Step 2 - After downloading it, extract all files to the one
folder.
Step 3 - Then Execute Poison Ivy 2.3.2.exe.
Step 4 - Configure Server - by clicking on New Server under File
menu.
Step 6 - Under Connection tab –
Step 8 – Then Click New Client under File menu and set same
port and password as you set in Server.