A RAT is also a shortcut called Remote Administrator Tool. It is mostly used for malicious purposes, such as controlling PC’s, stealing victims data, deleting or editing some files. You can only infect someone by sending him file called Server and they need to click it.
What can RAT do?
With a RAT, you can make the party download files, view their desktop/webcam, and more. Here is a list of basic features of a popular RAT:
* Manage files
* Control web browser (Change homepage, open site etc.)
* Get system information (OS Version, AV name, Ram Memory, Computer name etc.)
* Get passwords, credit card numbers or private data etc.
* View and remote control desktop
* Record camera & sound
* Control mouse
* Delete, rename, download, upload or move files
Are RATs Illegal?
Some RATs are legal, and some are not. Legal are the one without backdoor left, and they have ability to close connection anytime. Illegal are used for hacking and they can steal data (Credit Cards, Passwords, private data etc.).
Here is a list of some Legal and Illegal RATs:
Legal:
* TeamViewer – Access any remote computer via Internet just like sitting in front of it – even through firewalls.
* UltraVNC – Remote support software for on demand remote computer support. VNC.Specializing in Remote Computer Support, goto my pc, goto assist, Remote Maintenance
* Ammyy Admin – Ammyy Admin is a highly reliable and very friendly tool for remote computer access. You can provide remote assistance, remote administration or remote
* Mikogo – Mikogo is an Online Meeting, Web Conferencing & Remote Support tool where you can share your screen with 10 participants in real-time over the Web.
Illegal:
* Spy-Net
* Cerberus Rat
* CyberGate Rat
* SubSeven
* Turkojan
* ProRat
Darkcomet
How do I use these RATs?
For the legal RATs, for example, TeamViewer, give the other party your ID and password (the one who is getting viewed gives the other the information). The other connection then puts the ID. You then have many options to choose from, which are self explanatory (once connected).
For the illegal Rats, you need to portforward it to listen onto a port. You then need to build a server, spread it to others, they run your program, and they’re infected.
How do I port forward?
Port forwarding is easy and important for an illegal RAT. You need open port because RAT connects through open port and bypass firewall. Open your web browser and write your IP and connect to your rooter (write Username: Admin & Password: Admin), open port forward page and write port you want and your IP. Well that’s all you need to do and now you got open port.
How do I control server?
Once installed, RAT server can be controlled via RAT client. From IP list box you choose PC and connect.
Where and how do I spread?
There are few different ways to spread your server. You can spread on warez websites, P2P file sharing websites (uTorrent, Pirate bay etc.), YouTube, etc. Some people use custom made Auto-Spreaders programs to spread their server.
What’s reverse Connection?
A reverse connection is usually used to bypass firewall restrictions on open ports. The most common way a reverse connection is used is to bypass firewall and Router security restrictions.
Whats Direct Connection?
A direct-connect RAT is a simple setup where the client connects to a single or multiple servers directly. Stable servers are multi-threaded, allowing for multiple clients to be connected, along with increased reliability.
FAQs (Frequently Asked Questions) about RATs
Q – Why my RAT server is detected by the most anti-virus software?
A – If you want to make your server FUD (Fully UnDetectable), you will need crypter. Also, you can hex edit your server, but be careful some servers can crash after hex editing.
Q – Can I get infected by using a RAT?
A – If the programmer that gives a download link to the RAT backdoors it (very possible), then yes. By simply downloading a file, you can be infected and vulnerable to many things. By using a legal rat, chances are you won’t be infected.
Q – How do I remove server if I infect myself?
A – When you infect yourself, first what you going to do is to connect to your PC. Some RATs have function to uninstall servers, well you click that and you uninstall it. There is another way, download MalwareBytes’ Anti-Malware and scan whole computer for trojans.
Q – Can I get traced when I rat somebody?
A – Yes and no. Depends on victim, it is really hard to remove infection or even trace a hacker. There are tools like WireShark, but it’s really hard to trace, because PC usually got over 300 connections. So don’t worry.
What can RAT do?
With a RAT, you can make the party download files, view their desktop/webcam, and more. Here is a list of basic features of a popular RAT:
* Manage files
* Control web browser (Change homepage, open site etc.)
* Get system information (OS Version, AV name, Ram Memory, Computer name etc.)
* Get passwords, credit card numbers or private data etc.
* View and remote control desktop
* Record camera & sound
* Control mouse
* Delete, rename, download, upload or move files
Are RATs Illegal?
Some RATs are legal, and some are not. Legal are the one without backdoor left, and they have ability to close connection anytime. Illegal are used for hacking and they can steal data (Credit Cards, Passwords, private data etc.).
Here is a list of some Legal and Illegal RATs:
Legal:
* TeamViewer – Access any remote computer via Internet just like sitting in front of it – even through firewalls.
* UltraVNC – Remote support software for on demand remote computer support. VNC.Specializing in Remote Computer Support, goto my pc, goto assist, Remote Maintenance
* Ammyy Admin – Ammyy Admin is a highly reliable and very friendly tool for remote computer access. You can provide remote assistance, remote administration or remote
* Mikogo – Mikogo is an Online Meeting, Web Conferencing & Remote Support tool where you can share your screen with 10 participants in real-time over the Web.
Illegal:
* Spy-Net
* Cerberus Rat
* CyberGate Rat
* SubSeven
* Turkojan
* ProRat
Darkcomet
How do I use these RATs?
For the legal RATs, for example, TeamViewer, give the other party your ID and password (the one who is getting viewed gives the other the information). The other connection then puts the ID. You then have many options to choose from, which are self explanatory (once connected).
For the illegal Rats, you need to portforward it to listen onto a port. You then need to build a server, spread it to others, they run your program, and they’re infected.
How do I port forward?
Port forwarding is easy and important for an illegal RAT. You need open port because RAT connects through open port and bypass firewall. Open your web browser and write your IP and connect to your rooter (write Username: Admin & Password: Admin), open port forward page and write port you want and your IP. Well that’s all you need to do and now you got open port.
How do I control server?
Once installed, RAT server can be controlled via RAT client. From IP list box you choose PC and connect.
Where and how do I spread?
There are few different ways to spread your server. You can spread on warez websites, P2P file sharing websites (uTorrent, Pirate bay etc.), YouTube, etc. Some people use custom made Auto-Spreaders programs to spread their server.
What’s reverse Connection?
A reverse connection is usually used to bypass firewall restrictions on open ports. The most common way a reverse connection is used is to bypass firewall and Router security restrictions.
Whats Direct Connection?
A direct-connect RAT is a simple setup where the client connects to a single or multiple servers directly. Stable servers are multi-threaded, allowing for multiple clients to be connected, along with increased reliability.
FAQs (Frequently Asked Questions) about RATs
Q – Why my RAT server is detected by the most anti-virus software?
A – If you want to make your server FUD (Fully UnDetectable), you will need crypter. Also, you can hex edit your server, but be careful some servers can crash after hex editing.
Q – Can I get infected by using a RAT?
A – If the programmer that gives a download link to the RAT backdoors it (very possible), then yes. By simply downloading a file, you can be infected and vulnerable to many things. By using a legal rat, chances are you won’t be infected.
Q – How do I remove server if I infect myself?
A – When you infect yourself, first what you going to do is to connect to your PC. Some RATs have function to uninstall servers, well you click that and you uninstall it. There is another way, download MalwareBytes’ Anti-Malware and scan whole computer for trojans.
Q – Can I get traced when I rat somebody?
A – Yes and no. Depends on victim, it is really hard to remove infection or even trace a hacker. There are tools like WireShark, but it’s really hard to trace, because PC usually got over 300 connections. So don’t worry.
honest hackerz
video
Labels
- antivirus an internet security
- BACKUP AND RECOVERY TOOLS
- BASIC TRICKS OF PC HACKING
- Best Spywares
- BLACK BERRY
- BLOGGER TIPS
- Change Your Ip adress
- Check Online that how many Sims are against your CNIC.
- COLLAGE SERVER HACKING
- COMPUTER HACKING
- COMPUTER PLAYERS
- COMPUTER SOFTWARES
- COOKIES STEALING
- COOL TIPS
- Cracking Kit 2012
- crypters and binders
- E BOOK TUTORIALS
- E MAIL AND SMS BOMBER
- FACEBOOK HACKING
- FACEBOOK SKINS
- File Sonic premium account
- Get someones ISP password
- GRAPHICS
- HACK PASSWARDS
- HACK ADMIN PASSWARD
- Hack Any Facebook Account
- Hack Computer using ip Adress
- HACK PC BY DORK
- HACK PREMIUM ACCOUNTS
- HACKED EMAIL RECOVERY
- HACKING
- HOT FILE PREMIUM ACCOUNTS
- How To Recover Deleted File
- IP TRACING
- IPHONE SOFTARES
- JAZZ
- LATEST
- LATEST I PHONES
- LEARN BASIC HTML
- Make Mozilla 10x Times Faster
- MOBILE AT
- MOBILE PRICES
- MOBILE SOFTWARES
- NOKIA
- Nokia Secret Code's
- NOKIA SOFTARES
- Operate Firefox faster
- ORKUT HACKING
- PACKAGES
- PC HACK
- PC PROTECTION
- Q MOBILES
- Remove Bios Password
- Reset Windows Password
- Restore Firefox Passwords
- SAMSUNG
- See passwords behind stars
- Speed Up Your Bandwidth By 30%
- Stealth Crypter V3 Private
- SUPER FAST BROWSING
- Transfer your Photos to pencil sketch
- VIDEO EDITING
- VIRUSES
- WEBSITE HACKING
- WINDOWS 7 HACK
- Windows XP Secrets
- wireless hacking
sponsers
Blog Archive
-
▼
2011
-
▼
April
-
▼
Apr 21
- How you can see invisible and online peoples
- Lock your folder without software
- Make Virus
- Send Fake Email
- Convert Your Computer into phone
- orac
- Keyboard Shortcuts
- Hack Rapidshare and megaupload
- Facebook Album Downloader
- Multiple login in yahoo messenger..
- Hack Administrator Password In Windows 7,Xp And Vista
- Activate GodMode In Windows 7 And Vista
- Why Use a Mobile Proxy on the Desktop Web Browser
- Fix Window problems after Virus Attack
- Send free sms in world anywhere
- How To Send Bold & Underline Text In Facebook Chat
- Mobile tracker in India Only
- Skype Commands
- Hack Admin Password From User Mode
- How To Speedup Windows XP & Vista Boot
- How To: Change Your Ip In Less Then 1 Minute
- Speed up internet by 20%
- Get Serial No. Of Any Software By Using Google Easily
- Make All Images On Facebook To Revolve, Facebook Tips
- How to permanently delete your facebook account
- The Language of SQL 2011 RETAiL eBOOk-rebOOk
- All in one messenger, yahoo facebook msn live chat...
- Cool 3 codes for facebook. See hidden content with...
- Create online PowerPoint presentation from Faceboo...
- Convert your Window 7 into Xp Mode, (its not theme...
- Hide Your files into a photo
- SPEED UP FOLDER BROWSING
- How to permanently delete your facebook account
- The Language of SQL 2011 RETAiL eBOOk-rebOOk
- Backup and restore bookmarks on Chrome, Firefox, I...
- How to Create a Bootable Windows 7 USB Drive from ...
- Trace Email Address Source
- 10 Useful Code Tricks for Business or beautiful Fa...
- How you can see invisible and online peoples
- Lock your folder without software
- How to Manually Bypass Trial Period of Softwares
- Facebook Powertools: 150+ Apps, Scripts and Add-on...
- How To Send Anonymous (unknown) Email (6 ways to S...
- How to Get Someone's IP Through AIM/MSN/Chat
- Hide EXE File Into JPG Image
- [TUT] How To Create A Stealer [VB.net] [FTP]
- See The Passwords Behind Asterisk
- Destroy yur friends computer with Virus Cool Tips
- How to make deadly computer virus / How to make Vi...
- Hide your Text into Image jpeg Software
- Facebook Flooder (Post unlimited any text on your ...
- Best way to select all friends in facebook + Video...
- How to Save file as .bat or Autorun.inf
- Hide your virus file into image jpg 2nd Tutorial
- see password in your browser
- Web Site God Mode, Edit any website with a java Sc...
- Image ReVolving Video Tutorial MAke fool your frie...
- Formate HardDisk using Notepad or destroy your fri...
- How to send small/large files securely online with...
- How to Disable your Victims Antivirus
- wifi cookie sniffing - firesheep (How to setup and...
- Yahoo Account Hacking / Hack yahoo Account by Cook...
- DarkComet-Rat v3.0 (Professional 2010)
- Hack Computer/pc using ip Adress
- Spynet 2.7 Download - Ghost Edition
- Difference Between a DoS and a DDoS Attack
- How to Hack a computer using Metasploit
- How to hack a computer with Nmap and Metasploit
- Cybergate RAT - Download (Hack Computer)
- What is a RAT (Remote Administrator Tool)
- 100 HAcking Tools....Hotmail,Yahoo, hacking Fake P...
- USB Password Stealer Hack your friends account wit...
- Hack your friends and colgs/school computer with U...
- Time Stoper bypass software trail period and run s...
- How To Hack Remote of a Computer Hack Computer pc ...
- Darkcomet Rat Tutorial HAck any Computer/pc with R...
- How to index your site on google or how to google ...
- Publish the Same Blog Post to Multiple Blogging Si...
- Backup Gmail Account
- Facebook Password Decryptor
- AVG ANTI VIRUS
- ANTI SPYWARE
- Avast Interne Security 5.0 with key
- Speed Up Your Internet
- KEYSCRAMBLER
- Anti Keylogger
- Anti Keylogger (and Keyscambler addons) Protect yo...
- CREATE INVISIBLE PASSWORD PROTECTED DRIVE
- kaspersky internet security 2011
-
▼
Apr 21
-
▼
April