Questions tagged [rat]

A remote access tool (RAT) is a protram used to administer a computer remotely. These programs can also be used as malware, e.g. to spy upon a victim.

24 questions
9
votes
3 answers

Why is the victim a server instead of a client?

I just finished creating my own remote administration tool "a server to multiple client one" using System.Net.Socket, - "Watch Dogs fan :P" then I try to search on google how they make or design their remote administration tool process and I found…
7
votes
2 answers

Any Alternative to Ngrok for constant Connection?

Im trying to build RAT to test on my computer. I use ngrok for hacking on WAN. But ngrok has a problem of changing its subdomain once the connection is reset. So, I cant use ngrok for hacking over WAN. I tried using ngrok sub-domain, but now it has…
Adithyan AK
  • 79
  • 1
  • 1
  • 2
3
votes
1 answer

How do hackers use RATs without their server/IP being revealed?

When hackers put trojan horses on someones PC, those programs (which are, by definition, just stealthy RATs with some... extra features) need to communicate with them somehow. A direct peer-to-peer connection to their own PC is obviously impossible…
DLCom
  • 133
  • 4
3
votes
3 answers

How does Remote Access Trojan / Backdoor Software work?

How does a RAT works? I understand it as once we visit the infected website, the browser might download the Trojan to our PC automatically. Will it be executed and auto-installed in our computer? I can't see how JavaScript can run the malicious…
cww
  • 187
  • 1
  • 1
  • 7
2
votes
0 answers

Defination of RAT?

I've just noticed that different sites define RAT differently. Which one should be used? Remote Access Tool https://www.cybersecurity-review.com/tag/rat/ Remote Access…
Wolf
  • 347
  • 2
  • 3
  • 15
2
votes
1 answer

How to "break" remote access on Windows and rooted Android?

Let's say you want to "break" all remote access capabilities on your rooted Android phone and your Windows PC. What do you do or delete so remote access is truly broken and can't be used (by a hacker)?
kit
  • 29
  • 1
2
votes
2 answers

Concerned About 'Rerouting' due to RAT

If someone uses a RAT or something of the sort to gain access to your computer and network, is it possible for them to reroute their internet access through your I.P.? This question is kinda concerning the larger majority of people who have these…
2
votes
2 answers

Hide RAT in a picture link in a document?

Is this possible? A friend tried to install a rat by sending me a file that looked like 049.jpg.exe but i didnt click on it cuz of the .exe in the end. This was just for fun but it made me Wonder, can you hide a rat completely so The victim…
J.nosna
  • 21
  • 1
  • 2
1
vote
0 answers

Detecting web visitors controlled via RDP or compromised by RAT/RAT-in-the-Browser (RitB)

Is there a way to detect whether visitors to a website are using Remote Desktop Connection (RDP) or have been compromised via a type of Remote Access Trojan(Tool)/RAT-in-the-Browser (RitB)? So a 3rd party has gained access to a PC and is using those…
Praemon
  • 111
  • 1
1
vote
2 answers

Attacking admin and non-admin User accounts on the same PC

Imagine the following scenario; A hacker want to attack a remote PC and take control of it using RAT. This PC has three user accounts. - A (administrator account. - B (non- administrator account) - C (administrator account) The attacker sends…
PMD
  • 199
  • 1
  • 12
0
votes
0 answers

Looking for some advice/knowledge regarding malcious infection in Win10

I'll start by saying I'm a complete noob when it comes to anything computer forensics, malware analysis or anything similar. Let's just say i hypothetically in the past had downloaded some not so nice software that contained say a RAT, rootkit or…
0
votes
0 answers

Has anyone successfully set-up the original Sub7?

When I first entered the information security sector in 2007 I remember reading about a dated trojan called Sub7, released in 1999. Focusing on the legacy version, not the new release, has anybody been able to successfully use it for testing…
user5623335
  • 381
  • 1
  • 4
  • 12
0
votes
1 answer

Difference between a RAT and a hVNC

What is the difference between a Remote Access Trojan and a hidden Virtual Network Computing? It seems that both software allows a hacker to access a victim's computer and to spy on activity.
0
votes
2 answers

Does a hacker know which IP they hacked?

Suppose someone hacks my computer (by any means, say a virus or trojan like RAT), will they be able to know my IP address in real time? This is about dynamic IP addresses.
0
votes
1 answer

Remote Access Trojan (RAT) -- How to detect, how to remove

Is there a guaranteed way to: Know there is a Remote Access Trojan in my PC? Remove it completely and successfully from my PC? Note: Assume that the hacker doesn't leave any hint of their activity (like moving the cursor). If there is no way to…
Jay Shah
  • 339
  • 2
  • 4
  • 10
1
2