"BASICS OF ETHICAL HACKING:SERIES #4.3"

in #untalented7 years ago

Hi friends,I am extremely very sorry for not posting these days because my laptop was not working and I was busy at some other work also.But finally I fix my laptop and ready to go.

I am continuing my previous post of Malware Research -Trojans and Keyloggers.

RAT (TROJANS)

rat trojan.jpg

RAT or "Remote Administration Tool" is one of the most dangerous types of malware.It is very similar to a Trojan.Once a RAT is installed in a computer,the attacker can do almost anything on the remote computer,such as installing a keylogger,shutting down the computer,infecting files,uploading and downloading files,etc.If this is successful,the Trojan can operate with increased privileges and go about installing other malicious codes.If the user has administrative access to the operating system,the Trojan can do anything that an administrator can.

A compromise on any system on a network may have consequences for other systems on the network.Particularly vulnerable are the systems that transmit authentication material,such as passwords,overshared networks in clear text or in a trivially encrypted form,which is very common.If a system on such a network is compromised via a Trojan(or another method),the intruder may be able to record usernames and passwords or other sensitive information as it navigates through the network.

Some common types of Rats are:

  1. ProRat

  2. Lost Door

Function:

Trojans work similar to the client-server model.Trojans come in two parts,Client and server part.The attacker deploys the Client to connect to the server,Which runs on the remote machine when the remote user(unknowingly)executes the Trojans on the machine.The typical protocol used by most Trojans is the Tcp/Ip protocol,however,some functions of the Trojans may take use of the UDP protocol as well.

when the server is activated on the remote computer,It will try to remain in a stealth mode or simply stay hidden.It is usual for the Trojans to also modify the registry and /or use some other auto-starting methods.

To exploit a Trojan,it is essential for attackers to ascertain the remote IP address to connect to the machine.Most Trojans use auto-starting methods so that the servers are restarted every time the remote machine reboots/starts,which in turn also notifies the attacker.

PRORAT

prorat trojan virus.jpg

ProRat is a powerful remote administrator tool (RAT) based on backdoor Trojan.It opens a port on the infected system,which allows the client to perform various operations on the infected computer.ProRat cannot connect to users over the WAN(wide area networks).It can connect only over Lans(Local area network).However,once ProRat is installed,it is almost impossible to remove it without up-to-date antivirus software.

Features:

  • Stealing password.
  • Full control over files.
  • Drive formatting.
  • writing on screen.
  • Movement of cursor.
  • Take Screenshots.
  • View system information.
  • view webcam
  • Logging Keystrokes.

LOST DOOR.

lost door.jpg

Lost Door is a backdoor Trojan horse family of more than 10 variants,which can infect windows operating system from 95 to XP.It was created by OussamiO and built using Visual basic.It uses the typical server,server builder and client backdoor program configuration to allow remote user,who uses client,to execute arbitrary code on the compromised machine.

Features:

  1. Invisible in searching files.
  2. Chat with server.
  3. Encrypt settings.
  4. Connection logs.
  5. Infect all USB.
  6. Server downloader.
  7. Send fake messages.
  8. Screenshots.
  9. Pc Control.

If you are interested to read my all previous series,please follow the link below:-

https://steemit.com/hacking/@danishali22786/basics-of-ethical-hacking-series-1
https://steemit.com/hacking/@danishali22786/basics-of-ethical-hacking-series-2
https://steemit.com/hacking/@danishali22786/basics-of-ethical-hacking-series-3
https://steemit.com/hacking/@danishali22786/basics-of-ethical-hacking-series-3.1
https://steemit.com/hacking/@danishali22786/basics-of-ethical-hacking-series-3.2
https://steemit.com/hacking/@danishali22786/basics-of-ethical-hacking-series-3.3
https://steemit.com/untalented/@danishali22786/basics-of-ethical-hacking-series-4
https://steemit.com/untalented/@danishali22786/basics-of-ethical-hacking-series-4-1
https://steemit.com/technology/@danishali22786/basics-of-ethical-hacking-series-4-2

Thank you friends. If you like my post Please support me..

Sort:  

Congratulations! This post has been upvoted from the communal account, @minnowsupport, by DANISHSTEEMIT from the Minnow Support Project. It's a witness project run by aggroed, ausbitbank, teamsteem, theprophet0, someguy123, neoxian, followbtcnews, and netuoso. The goal is to help Steemit grow by supporting Minnows. Please find us at the Peace, Abundance, and Liberty Network (PALnet) Discord Channel. It's a completely public and open space to all members of the Steemit community who voluntarily choose to be there.

If you would like to delegate to the Minnow Support Project you can do so by clicking on the following links: 50SP, 100SP, 250SP, 500SP, 1000SP, 5000SP.
Be sure to leave at least 50SP undelegated on your account.