Ethical Experts
Ethical Experts

A Community Dedicated to Helping and Learning . Here You Will Get Hacking Tutorials and Monetizing Methods . We Hope You Have a Pleasant Stay
 
HomeHome  SearchSearch  FAQFAQ  RegisterRegister  Log in  
Still Currently working on the forum design, until I find a perfect design that can sit there for the whole life :p .. Please Bare with us if you see the design change while / after you refresh a page or return ! Sorry for the Inconvenience ~!
Search
 
 

Display results as :
 
Rechercher Advanced Search
Latest topics
» Hack Pack : Largest Hacking Tools Collection
Hide RAT in Victim PC EmptyTue Apr 28, 2015 9:35 am by THE-OUTSIDER

» Hi everyone!
Hide RAT in Victim PC EmptyFri Nov 07, 2014 11:24 pm by zekrum

» Hacking Email ID's
Hide RAT in Victim PC EmptyThu Sep 25, 2014 7:22 pm by NAVEEN KUMAR . S

» entering in a computer binary
Hide RAT in Victim PC EmptySat Sep 20, 2014 1:29 pm by erosh23

» hi hackers
Hide RAT in Victim PC EmptySat Sep 20, 2014 1:26 pm by erosh23

» Introduce Yourself !
Hide RAT in Victim PC EmptySat Sep 20, 2014 1:23 pm by erosh23

» Hello guys
Hide RAT in Victim PC EmptyWed Jul 30, 2014 10:52 pm by RZero67

» need botnet like zues Betabot or any good botnet files please admin help me
Hide RAT in Victim PC EmptyFri Jul 25, 2014 9:44 pm by sire_roktiv

» Extension Spoofer v0.1 [Beta Release]
Hide RAT in Victim PC EmptyFri Jul 11, 2014 9:33 am by The Joker

Most Viewed Topics
Hack Pack : Largest Hacking Tools Collection
HACK WIFI PASSWORD USING CMD WHEN YOU ARE CONNECTED WITH WIFI
Hack Your BroadBand !! RISK FREE !!
How to Hack the Windows Admin Password Using OphCrack in Backtrack tutorial
Hacking With Keyloggers Prorat
How to Get Unlimited time in an Internet Cafe ... :D
How to Hack Websites & Servers - Tutorial
Cracking a WPA/WPA-2 Password.. ;)
Backtrack and Facebook
Credit Card Generating Sequence
Keywords
netcat hack wifi LARGEST
Facebook Like
Similar topics

    Share
     

     Hide RAT in Victim PC

    Go down 
    AuthorMessage
    The Joker
    Admin
    Admin
    The Joker

    Posts : 182
    Join date : 2012-06-11
    Age : 28

    Hide RAT in Victim PC Empty
    PostSubject: Hide RAT in Victim PC   Hide RAT in Victim PC EmptySun Jan 06, 2013 10:11 pm

    In this section we will learn how an attacker manages to hide a RAT in victim's computer, if you are new visitor or you haven't read the first part I urge you to please go through previous post on The RAT before you read this.

    Before we proceed I want to tell you there's no RAT tool available whose server can not get detected by an Anti-Virus program. At practical level every Anti-Virus program can detect RAT developed by all possible free as well as commercially available RAT developing tools. Then how an attacker manages to implement an attack on you. Following may be the reasons, why you may become victim to his/his attack,

    Your Anti-Virus Sucks
    The attacker has created his/her own RAT client
    He had got a custom RAT client from RAT client vendor
    Applied Hex-editing on his RAT server EXE
    Attacker has used crypt or

    As I always tell you hacking evolves by fractions of minutes to fractions of seconds, RAT clients also gets updated and hence your Anti-Virus too needs to be updated. If you don't update it means you are inviting more and more troubles than just RAT, always update your Anti-Virus programs or let its auto-update option enabled. In any other case than this if your Anti-Virus fails to detect RAT it means it is total crap UN-install it and use some another Anti-Virus program.

    The second case is the attacker is master programmer and he/she has used his/her master programmer skill to develop a new custom RAT client. Since the code is new, no Anti-Virus will have its definition ultimately making it Fully UN-Detectable (FUD). It is really very hard to keep yourself safe from such kinda RAT since it is hard to detect before damage is done.

    Some vendors also offer custom RAT clients for special price, again due to its code being new any Anti-Virus program will hardly have its definition and hence even this works. Next is hex-editing, it is one of the most difficult thing to do for changing signature of the RAT server(our virus) file. So far as I know it is really very difficult and attacker must be having powerful hand over understanding different number systems and machine level codes, also it is very time consuming process.

    Last is one of the most easiest methods and due to which a VIRUS code becomes Fully Undetectable. The use of crypt-or software avoids the job of recoding and hex-editing and mutates the signature of virus file in such a way that it works fine but its code generates different signature which is not anyhow matches the previous signature, thus making is undetectable.

    Other factor that leads to hide RAT in your system is process space sharing. In this the RAT server file shares process space of system processes or well known process like,

    explorer.exe
    svchost.exe
    services.exe

    And the last factor that let them do their job is port number. Many RAT clients will use regularly used port numbers to establish connections like HTTP port 80, HTTP proxy port 8080, FTP port 21 and uses any kinda connection may it be TCP or UDP.

    ___________________________________________________
    Do NOT PM me until you are DONATING or Your Upgrade  hasn't been completed even after you have purchased it .
    If is one of the above, you can either choose to PM or mail me ..
    Back to top Go down
    View user profile http://teamiha.tumblr.com
    zayan3
    n00b
    avatar

    Posts : 1
    Join date : 2013-03-20

    Hide RAT in Victim PC Empty
    PostSubject: Thank you my brother   Hide RAT in Victim PC EmptyWed Mar 20, 2013 7:38 am

    Thank you my brother cheers
    Back to top Go down
    View user profile
     
    Hide RAT in Victim PC
    Back to top 
    Page 1 of 1
     Similar topics
    -
    » Another Victim of Win32/Nuqel.E

    Permissions in this forum:You cannot reply to topics in this forum
    Ethical Experts :: Hacking Section :: Hacking Tutorials-
    Jump to: