Oops! It appears that you have disabled your Javascript. In order for you to see this page as it is meant to appear, we ask that you please re-enable your Javascript!

What is Remote Administration Tool?

What Is Remote Administration Tool (RAT)?
A Remote Administration Tool (RAT) is a piece of software that allows a remote “operator” to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses, “RAT” software is usually associated with criminal or malicious activity. Malicious RAT software is typically installed without the victim’s knowledge, often as payload of a Trojan horse, and will try to hide its operation from the victim and from security software.
The operator controls the RAT through a network connection. Such tools provide an operator the following capabilities:
Screen/camera capture or image control
File management (download/upload/execute/etc.)
Shell control (from command prompt)
Computer control (power off/on/log off if remote feature is supported)
Registry management (query/add/delete/modify)
Hardware Destroyer (overclocker)
Other software product-specific functions
Its primary function is for one computer operator to gain access to remote PCs. One computer will run the “client” software application, while the other computer(s) operate as the “host(s)”.

What You Can Do With Rat?

Block mouses and keyboards
Change the desktop wallpapers
Downloads, uploads, deletes, and rename files
Destroys hardware by overclocking
Drop viruses and worms
Edit Registry
Use your internet connection to perform denial of service attacks (DoS)
Format drives
Steal passwords, credit card numbers
Alter your web browser’s homepage
Hide desktop icons, task bar and files
Silently install applications
Log keystrokes, keystroke capture software
Open CD-ROM tray
Overload the RAM/ROM drive
Send message boxes
Play sounds
Control mouse or keyboard
Record sound with a connected microphone
Record video with a connected webcam
Show fake errors
Shutdown, restart, log-off, shut down monitor
Record and control victim’s screen remotely
View, kill, and start tasks in task manager

List Of RAT software and Trojans

Poison Ivy
Njw0rm
Spy-Net
Back Orifice
NetBus
iControl
Sub Seven
Xi rat 2.1
Beast Trojan
Bifrost
Blackshades
DarkComet
LANfiltrator
Optix Pro
Trojan horse
VNC

This is for educational purpose only .We are not responsible for any harm caused

.

The following two tabs change content below.
Abishiekh Jain is a 16-year-old programmer and blogger born and brought up in Chennai. He is the founder of Hackers Den 🙂
Click Here to Leave a Comment Below 0 comments