SlideShare a Scribd company logo
Hacking with Remote Admin
Tools (RATs)
Zoltan Balazs
CTO @MRG Effitas
Budapest IT Security Meetup
January 2014
Remote admin tools
Could be legitimate
Usually it is not

All the features for remote administration
Upload/download files
Registry editor
Shell commands
Remote desktop

Using RAT might be illegal, and might be
considered as a crime!
Don’t try this at home!
Why are these skiddie toolz
important?
Only pentesters use meterpreter
Script kiddies use RATs
Not just "1337 |-|4x0r5” use RATs!

Know your enemy!
Malware incident response
Forensic investigation
Typical RAT scenario
1998
DEF CON 6 on August 1, 1998
 Hacking with Remote Admin Tools (RAT)
Dictionary to skiddie language
Skiddie world
server
client
FUD
cryptor
private/elite/gold version

Average world
client malware on victim
server code @skiddie
Fully UnDetectable
some lame packer
full version (not demo)
Tutorialz for script bunniez
How to fail at OPSEC?
https://www.youtube.com/results?
search_query=setup+rat+tutorial
http://www.youtube.com/watch?v
=NkkqPLVscC4
#opsecfail
#opsecfail
#opsecfail
#opsecfail
#opsecfail
 Hacking with Remote Admin Tools (RAT)
The skiddie’s youtube list on Cyber Threat Task Force (google cache only)
 Hacking with Remote Admin Tools (RAT)
 Hacking with Remote Admin Tools (RAT)
But a script kitty’s life is not just about
work
But FUN as well!
Fun manager - Fun menu
Extra fun
Fun feature 3
Fun feature 4 – Matrix chat
Fun feature 5
Ultimate fun …
Ultimate fun feature 6 - Piano
Hacking Internet Explorer
Scary features
Scary feature 1
DLL inject into iexplore.exe
Proxy aware
Transparent proxy authentication
Local software firewall bypass
No new process running
Scary feature 2 – Melt/uninstall
Melt server deletes the
dropper
No wipe
Forensics restoration
possible

Uninstall server deletes
the persistence file
No wipe
Forensics restoration
possible
Scary feature - Alternate data stream
Scary feature 3 - Anti AV
Scary feature 4 – Anti VM, Anti
sandbox
Private/elite version
Downloading and running binaries from people
like this is a bad idea!
hxxp://www.theatregelap.com/2012/06/xtreme
rat-v-36-private.html
JRAT
Multiplatform
Evade some software firewalls
(java.exe allowed)
Easier to obfuscate
Screenshots ©Symantec
AndroRAT

© VRT Snort blog
Cryptor
High profile attacks
High profile
attacks
 Hacking with Remote Admin Tools (RAT)
 Hacking with Remote Admin Tools (RAT)

More Related Content

What's hot (20)

PPTX
Adversary Emulation using CALDERA
Erik Van Buggenhout
 
PDF
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE - ATT&CKcon
 
PPTX
Intrusion detection system
AAKASH S
 
PPTX
MITRE ATT&CK framework
Bhushan Gurav
 
PDF
MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...
MITRE - ATT&CKcon
 
PDF
OWASP Top 10 Web Application Vulnerabilities
Software Guru
 
PDF
No Easy Breach DerbyCon 2016
Matthew Dunwoody
 
PDF
100 Security Operation Center Tools.pdf
MAHESHUMANATHGOPALAK
 
PDF
Secure coding presentation Oct 3 2020
Moataz Kamel
 
PDF
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
PPTX
Misp(malware information sharing platform)
Nadim Kadiwala
 
PPTX
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
Adam Pennington
 
PPTX
Adversary Emulation using CALDERA
Erik Van Buggenhout
 
PDF
Threat Hunting with Splunk Hands-on
Splunk
 
PDF
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE - ATT&CKcon
 
PPTX
OpenTelemetry For Architects
Kevin Brockhoff
 
PDF
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
CloudVillage
 
PDF
Demystifying observability
Abigail Bangser
 
PPTX
Leveraging MITRE ATT&CK - Speaking the Common Language
Erik Van Buggenhout
 
Adversary Emulation using CALDERA
Erik Van Buggenhout
 
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE - ATT&CKcon
 
Intrusion detection system
AAKASH S
 
MITRE ATT&CK framework
Bhushan Gurav
 
MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...
MITRE - ATT&CKcon
 
OWASP Top 10 Web Application Vulnerabilities
Software Guru
 
No Easy Breach DerbyCon 2016
Matthew Dunwoody
 
100 Security Operation Center Tools.pdf
MAHESHUMANATHGOPALAK
 
Secure coding presentation Oct 3 2020
Moataz Kamel
 
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
Misp(malware information sharing platform)
Nadim Kadiwala
 
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
Adam Pennington
 
Adversary Emulation using CALDERA
Erik Van Buggenhout
 
Threat Hunting with Splunk Hands-on
Splunk
 
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE - ATT&CKcon
 
OpenTelemetry For Architects
Kevin Brockhoff
 
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
CloudVillage
 
Demystifying observability
Abigail Bangser
 
Leveraging MITRE ATT&CK - Speaking the Common Language
Erik Van Buggenhout
 

Similar to Hacking with Remote Admin Tools (RAT) (6)

PDF
What is Remote Administration Tools (RAT).pdf
uzair
 
PPTX
ShadyRAT: Anatomy of targeted attack
Vladyslav Radetsky
 
PDF
Talk28oct14
mjos
 
PPTX
Magic of RATs(Remote Access Torgens)
Open Knowledge Nepal
 
PDF
DMA - Stupid Cyber Criminal Tricks
ThreatReel Podcast
 
PDF
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
Chris Gates
 
What is Remote Administration Tools (RAT).pdf
uzair
 
ShadyRAT: Anatomy of targeted attack
Vladyslav Radetsky
 
Talk28oct14
mjos
 
Magic of RATs(Remote Access Torgens)
Open Knowledge Nepal
 
DMA - Stupid Cyber Criminal Tricks
ThreatReel Podcast
 
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
Chris Gates
 

More from Zoltan Balazs (20)

PPTX
[ Hackersuli ] Privacy on the blockchain
Zoltan Balazs
 
PPTX
MLSEC 2020
Zoltan Balazs
 
PDF
Web3 + scams = It's a match
Zoltan Balazs
 
PDF
MIPS-X
Zoltan Balazs
 
PPTX
How to hide your browser 0-day @ Disobey
Zoltan Balazs
 
PPTX
Explain Ethereum smart contract hacking like i am a five
Zoltan Balazs
 
PDF
How to hide your browser 0-days
Zoltan Balazs
 
PPTX
Test & Tea : ITSEC testing, manual vs automated
Zoltan Balazs
 
PDF
Hacking Windows 95 #33c3
Zoltan Balazs
 
PPTX
Ransomware - what is it, how to protect against it
Zoltan Balazs
 
PDF
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Zoltan Balazs
 
PDF
IoT security is a nightmare. But what is the real risk?
Zoltan Balazs
 
PPTX
Sandboxes
Zoltan Balazs
 
PPTX
Sandbox detection: leak, abuse, test - Hacktivity 2015
Zoltan Balazs
 
PDF
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
Zoltan Balazs
 
PDF
[ENG] Hacktivity 2013 - Alice in eXploitland
Zoltan Balazs
 
PPTX
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
Zoltan Balazs
 
PPTX
[HUN] Védtelen böngészők - Ethical Hacking
Zoltan Balazs
 
PDF
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
Zoltan Balazs
 
PDF
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
Zoltan Balazs
 
[ Hackersuli ] Privacy on the blockchain
Zoltan Balazs
 
MLSEC 2020
Zoltan Balazs
 
Web3 + scams = It's a match
Zoltan Balazs
 
How to hide your browser 0-day @ Disobey
Zoltan Balazs
 
Explain Ethereum smart contract hacking like i am a five
Zoltan Balazs
 
How to hide your browser 0-days
Zoltan Balazs
 
Test & Tea : ITSEC testing, manual vs automated
Zoltan Balazs
 
Hacking Windows 95 #33c3
Zoltan Balazs
 
Ransomware - what is it, how to protect against it
Zoltan Balazs
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Zoltan Balazs
 
IoT security is a nightmare. But what is the real risk?
Zoltan Balazs
 
Sandboxes
Zoltan Balazs
 
Sandbox detection: leak, abuse, test - Hacktivity 2015
Zoltan Balazs
 
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
Zoltan Balazs
 
[ENG] Hacktivity 2013 - Alice in eXploitland
Zoltan Balazs
 
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
Zoltan Balazs
 
[HUN] Védtelen böngészők - Ethical Hacking
Zoltan Balazs
 
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
Zoltan Balazs
 
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
Zoltan Balazs
 

Recently uploaded (20)

PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PDF
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
PPTX
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
PDF
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PDF
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PDF
July Patch Tuesday
Ivanti
 
PDF
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
July Patch Tuesday
Ivanti
 
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 

Hacking with Remote Admin Tools (RAT)