SlideShare a Scribd company logo
Karan Bansal
According to legend, the
ancient Greeks used a giant
horse to defeat the Trojans. It
was received as a gift, but
inside the horse was the enemy.
 What is a RAT?
 Characteristics of Trojan
 Types of Connection
 Common Tools for Remote Access
 Case Study of a RAT
 RAT (Remote Access Trojan) is a remote control software that allows an attacker
to remote control a system.
 Typically consists of a serve listening on specific TCP/UDP ports on victim’s
machine.
 Hidden behind a façade of an appealing and harmless nature.
 A simple example of a Trojan horse would be a program named waterfalls.scr
claiming to be a free waterfall screensaver which when run instead would allow
access to a user’s computer remotely.
 A simple example of a Trojan horse would be a program named waterfalls.scr
claiming to be a free waterfall screensaver which when run instead would allow
access to a user’s computer remotely.
 AIDS (Trojan Horse) : Also known as Aids Info Disk or PC Cyborg Trojan, is a
Trojan horse that replaces the AUTOEXEC.BAT file, which would then be used by
AIDS to count the number of times the computer has booted. Once this boot count
reaches 90, AIDS hides directories and encrypts the names of all files on the drive
rendering the system unusable.
 Once installed, RATs perform their unexpected or even unauthorized operations
and use an array of techniques to hide their traces to remain invisible and stay on
victim systems for the long haul.
 Once installed, RATs perform their unexpected or even unauthorized operations
and use an array of techniques to hide their traces to remain invisible and stay on
victim systems for the long haul.
 Monitor the victim machine using various techniques –
 Screen/Camera Capture and Control
 File Management
 Computer Control
 Registry Management
 Shell Control
 Logging Keystrokes
 Direct Connection: In such RATs client connects to a single or multiple servers
directly. Stable servers are multi-threaded, allowing for multiple connections with
increased reliability.
 Direct Connection: In such RATs client connects to a single or multiple servers
directly. Stable servers are multi-threaded, allowing for multiple connections with
increased reliability.
 Reverse Connection: The client opens the port that the server connects to. It is
generally used to bypass firewall restrictions on open ports.
 No problems with routers blocking incoming data, because the connection is started
outgoing for a server.
 Allows for mass-updating of servers by broadcasting commands, because many servers
can easily connect to a single client.
 Needed if victim is behind a NAT.
 If the Internet connection is closed down and an application still tries to connect to
remote hosts it may be infected with malware in case of Direct Connection.
 For someone to get a Trojan, they must download a file in most cases.
 The trap may be very easy to fall into if the file looks good into surface.
 You can be infected by visiting a rogue website.
 Emails –
 If you are using Microsoft Outlook, you are vulnerable to many problems which internet
explorer has even if you don’t use IE directly.
 Open Ports –
 Computers running their own servers (HTTP, SMTP, FTP etc.) may be having various
vulnerabilities which can be exploited.
 These services open a network port (TCP/UDP) giving attackers a means for interacting
with these programs anywhere on the internet.
RAT - Kill or Get Killed! by Karan Bansal
 Remote Access
 Email Sending
 Data Destructive
 Downloader
 Server Trojan (Proxy, FTP, HTTP etc.)
 DOS Attacks
 Security Software Disabler
 BackOrifice : It enables a user to control a computer running the Microsoft
Windows operating system from a remote location. The name is a pun on
Microsoft BackOffice Server software.
 NetBus : Netbus is a software program for remotely controlling a Microsoft
Windows computer system over a network. It was created in 1998 and has been
very controversial for its potential of being used as a backdoor.
 SubSeven : A popular Trojan mainly used by script kiddies for causing mischief,
such as hiding the computer cursor, changing system settings or loading up
pornographic websites. Although, it can be used for more serious criminal
applications such as stealing credit card details with a keylogger.
 Dark Comet :
 Provides comprehensive administration capabilities over the infected machine.
 It was first identified in 2011 and still infects thousands of computers without being
detected.
 Allows the user to control the system with GUI.
 Dark Comet uses Crypters to hide it existence from antivirus tools.
 It performs several malicious administrative tasks such as: disabling Task Manager,
Windows Firewall, and Windows UAC.
 Uses Reverse-Connection Architecture.
 When executing, the server connects to the client and allows client to control and monitor the
server.
 Most commonly distributed via drive-by attacks and social networking sites.
 In Drive-by attacks a malicious script embedded on a webpage executes and tries to
exploit some vulnerability in a system.
Any Questions?

More Related Content

PPTX
Magic of RATs(Remote Access Torgens)
Open Knowledge Nepal
 
PDF
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
CrowdStrike
 
PPTX
DerbyCon 7 - Hacking VDI, Recon and Attack Methods
Patrick Coble
 
PDF
Sharpening your Threat-Hunting Program with ATTACK Framework
MITRE - ATT&CKcon
 
PDF
PHDays 2018 Threat Hunting Hands-On Lab
Teymur Kheirkhabarov
 
PPTX
Introduction to Incident Response Management
Don Caeiro
 
PPTX
Bsides 2019 - Intelligent Threat Hunting
Dhruv Majumdar
 
PDF
Introduction to MITRE ATT&CK
Arpan Raval
 
Magic of RATs(Remote Access Torgens)
Open Knowledge Nepal
 
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
CrowdStrike
 
DerbyCon 7 - Hacking VDI, Recon and Attack Methods
Patrick Coble
 
Sharpening your Threat-Hunting Program with ATTACK Framework
MITRE - ATT&CKcon
 
PHDays 2018 Threat Hunting Hands-On Lab
Teymur Kheirkhabarov
 
Introduction to Incident Response Management
Don Caeiro
 
Bsides 2019 - Intelligent Threat Hunting
Dhruv Majumdar
 
Introduction to MITRE ATT&CK
Arpan Raval
 

What's hot (7)

PDF
Metaploit
Ajinkya Pathak
 
PDF
The Accidental Insider Threat
Murray Security Services
 
PPTX
Seminar On Trojan Horse
Nikhil Chabukswar
 
PDF
Addressing the cyber kill chain
Symantec Brasil
 
PDF
Threat Hunting Techniques.pdf
infosecTrain
 
PPTX
Cyber Threat Hunting Workshop
Digit Oktavianto
 
PPTX
Antivirus, Presentacion
pabloyory
 
Metaploit
Ajinkya Pathak
 
The Accidental Insider Threat
Murray Security Services
 
Seminar On Trojan Horse
Nikhil Chabukswar
 
Addressing the cyber kill chain
Symantec Brasil
 
Threat Hunting Techniques.pdf
infosecTrain
 
Cyber Threat Hunting Workshop
Digit Oktavianto
 
Antivirus, Presentacion
pabloyory
 
Ad

Viewers also liked (19)

PPTX
Hacking & Securing of iOS Apps by Saurabh Mishra
OWASP Delhi
 
PDF
DFIR using Docker Containers by Deep Shankar Yadav
OWASP Delhi
 
PPTX
Quantum Computing by Rajeev Chauhan
OWASP Delhi
 
PPTX
IoT Security Risks and Challenges
OWASP Delhi
 
ODP
Hostile Subdomain Takeover by Ankit Prateek
OWASP Delhi
 
PDF
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
OWASP Delhi
 
PPT
Module 9 Dos
leminhvuong
 
PPT
The change.asia - results not reports
pck100
 
PDF
Italian shopping
Jack740
 
PPT
Campamento Sapucay Julio 2014 Scouts Mayores
Maria Mongelos
 
PDF
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
OWASP Delhi
 
PPTX
Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...
OWASP Delhi
 
PPTX
Must see sights in Puerto Plata, Dominican Republic shared by Lifestyle Holid...
Lifestyle Holidays Vacation Club
 
PPTX
Telecommuting 101 - Tips and Tricks for working from home
Seth Fendley
 
DOC
досвід людської особи
biblioteka_c
 
PDF
Speak! How to talk in public and not wreck your voice (Ignite OSCON 2014)
Florian Haas
 
PDF
Ormiston education
Jack740
 
PPT
νεο λυκειο
elpitheo
 
PDF
Better football
Jack740
 
Hacking & Securing of iOS Apps by Saurabh Mishra
OWASP Delhi
 
DFIR using Docker Containers by Deep Shankar Yadav
OWASP Delhi
 
Quantum Computing by Rajeev Chauhan
OWASP Delhi
 
IoT Security Risks and Challenges
OWASP Delhi
 
Hostile Subdomain Takeover by Ankit Prateek
OWASP Delhi
 
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
OWASP Delhi
 
Module 9 Dos
leminhvuong
 
The change.asia - results not reports
pck100
 
Italian shopping
Jack740
 
Campamento Sapucay Julio 2014 Scouts Mayores
Maria Mongelos
 
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
OWASP Delhi
 
Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...
OWASP Delhi
 
Must see sights in Puerto Plata, Dominican Republic shared by Lifestyle Holid...
Lifestyle Holidays Vacation Club
 
Telecommuting 101 - Tips and Tricks for working from home
Seth Fendley
 
досвід людської особи
biblioteka_c
 
Speak! How to talk in public and not wreck your voice (Ignite OSCON 2014)
Florian Haas
 
Ormiston education
Jack740
 
νεο λυκειο
elpitheo
 
Better football
Jack740
 
Ad

Similar to RAT - Kill or Get Killed! by Karan Bansal (20)

PPT
Trojan Backdoors
JauwadSyed
 
PPT
Trojan backdoors
seth edmond
 
PPTX
Trojan virus & backdoors
Shrey Vyas
 
PPTX
Computing safety
Brulius
 
DOCX
Introduction to trojans and backdoors
jibinmanjooran
 
PDF
Information security
JAMEEL AHMED KHOSO
 
PPTX
It act seminar
Akshay Sharma
 
PPTX
Ethical Hacking4
dodontn
 
PPTX
Information security & EthicalHacking
Ave Nawsh
 
PPTX
Cyber security & ethical hacking 10
Shekh Md Mehedi Hasan
 
PPTX
Internet security
gOhElprashanT
 
PPTX
Internet security
gohel
 
PPTX
Computer Security
Satyajit Das
 
PPTX
virus
增福 蔡增福
 
PPT
Software security
jes_d
 
PPT
Ethical Hacking
aashish2cool4u
 
PPTX
Cyber Security Seminar Day 2
Apurv Singh Gautam
 
PPTX
Security threats
Qamar Farooq
 
PDF
about botnets
Alain Bindele
 
PPTX
Mitppt
Aarti Prakash
 
Trojan Backdoors
JauwadSyed
 
Trojan backdoors
seth edmond
 
Trojan virus & backdoors
Shrey Vyas
 
Computing safety
Brulius
 
Introduction to trojans and backdoors
jibinmanjooran
 
Information security
JAMEEL AHMED KHOSO
 
It act seminar
Akshay Sharma
 
Ethical Hacking4
dodontn
 
Information security & EthicalHacking
Ave Nawsh
 
Cyber security & ethical hacking 10
Shekh Md Mehedi Hasan
 
Internet security
gOhElprashanT
 
Internet security
gohel
 
Computer Security
Satyajit Das
 
Software security
jes_d
 
Ethical Hacking
aashish2cool4u
 
Cyber Security Seminar Day 2
Apurv Singh Gautam
 
Security threats
Qamar Farooq
 
about botnets
Alain Bindele
 

More from OWASP Delhi (20)

PDF
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
OWASP Delhi
 
PDF
Securing dns records from subdomain takeover
OWASP Delhi
 
PDF
Effective Cyber Security Report Writing
OWASP Delhi
 
PPTX
Data sniffing over Air Gap
OWASP Delhi
 
PPTX
UDP Hunter
OWASP Delhi
 
PDF
Demystifying Container Escapes
OWASP Delhi
 
PPTX
Automating WAF using Terraform
OWASP Delhi
 
PPTX
Actionable Threat Intelligence
OWASP Delhi
 
PDF
Threat hunting 101 by Sandeep Singh
OWASP Delhi
 
PPTX
Owasp top 10 vulnerabilities
OWASP Delhi
 
PPTX
Recon with Nmap
OWASP Delhi
 
PPTX
Securing AWS environments by Ankit Giri
OWASP Delhi
 
PDF
DMARC Overview
OWASP Delhi
 
PDF
Cloud assessments by :- Aakash Goel
OWASP Delhi
 
PDF
Pentesting Rest API's by :- Gaurang Bhatnagar
OWASP Delhi
 
ODP
Wireless security beyond password cracking by Mohit Ranjan
OWASP Delhi
 
PDF
IETF's Role and Mandate in Internet Governance by Mohit Batra
OWASP Delhi
 
PDF
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
OWASP Delhi
 
PPTX
ICS Security 101 by Sandeep Singh
OWASP Delhi
 
PPT
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
OWASP Delhi
 
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
OWASP Delhi
 
Securing dns records from subdomain takeover
OWASP Delhi
 
Effective Cyber Security Report Writing
OWASP Delhi
 
Data sniffing over Air Gap
OWASP Delhi
 
UDP Hunter
OWASP Delhi
 
Demystifying Container Escapes
OWASP Delhi
 
Automating WAF using Terraform
OWASP Delhi
 
Actionable Threat Intelligence
OWASP Delhi
 
Threat hunting 101 by Sandeep Singh
OWASP Delhi
 
Owasp top 10 vulnerabilities
OWASP Delhi
 
Recon with Nmap
OWASP Delhi
 
Securing AWS environments by Ankit Giri
OWASP Delhi
 
DMARC Overview
OWASP Delhi
 
Cloud assessments by :- Aakash Goel
OWASP Delhi
 
Pentesting Rest API's by :- Gaurang Bhatnagar
OWASP Delhi
 
Wireless security beyond password cracking by Mohit Ranjan
OWASP Delhi
 
IETF's Role and Mandate in Internet Governance by Mohit Batra
OWASP Delhi
 
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
OWASP Delhi
 
ICS Security 101 by Sandeep Singh
OWASP Delhi
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
OWASP Delhi
 

Recently uploaded (20)

PPT
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
PDF
PDF document: World Game (s) Great Redesign.pdf
Steven McGee
 
PDF
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC
 
PPTX
How tech helps people in the modern era.
upadhyayaryan154
 
PDF
Project English Paja Jara Alejandro.jpdf
AlejandroAlonsoPajaJ
 
PPTX
Black Yellow Modern Minimalist Elegant Presentation.pptx
nothisispatrickduhh
 
PPTX
ppt lighfrsefsefesfesfsefsefsefsefserrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrt.pptx
atharvawafgaonkar
 
PPTX
Google SGE SEO: 5 Critical Changes That Could Wreck Your Rankings in 2025
Reversed Out Creative
 
PPTX
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PDF
DNSSEC Made Easy, presented at PHNOG 2025
APNIC
 
PDF
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 
PDF
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PDF
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 
PPT
Transformaciones de las funciones elementales.ppt
rirosel211
 
PPTX
Generics jehfkhkshfhskjghkshhhhlshluhueheuhuhhlhkhk.pptx
yashpavasiya892
 
PPTX
Perkembangan Perangkat jaringan komputer dan telekomunikasi 3.pptx
Prayudha3
 
PPTX
Different Generation Of Computers .pptx
divcoder9507
 
PPT
1965 INDO PAK WAR which Pak will never forget.ppt
sanjaychief112
 
PDF
Data Protection & Resilience in Focus.pdf
AmyPoblete3
 
PPTX
Crypto Recovery California Services.pptx
lionsgate network
 
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
PDF document: World Game (s) Great Redesign.pdf
Steven McGee
 
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC
 
How tech helps people in the modern era.
upadhyayaryan154
 
Project English Paja Jara Alejandro.jpdf
AlejandroAlonsoPajaJ
 
Black Yellow Modern Minimalist Elegant Presentation.pptx
nothisispatrickduhh
 
ppt lighfrsefsefesfesfsefsefsefsefserrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrt.pptx
atharvawafgaonkar
 
Google SGE SEO: 5 Critical Changes That Could Wreck Your Rankings in 2025
Reversed Out Creative
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
DNSSEC Made Easy, presented at PHNOG 2025
APNIC
 
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 
Transformaciones de las funciones elementales.ppt
rirosel211
 
Generics jehfkhkshfhskjghkshhhhlshluhueheuhuhhlhkhk.pptx
yashpavasiya892
 
Perkembangan Perangkat jaringan komputer dan telekomunikasi 3.pptx
Prayudha3
 
Different Generation Of Computers .pptx
divcoder9507
 
1965 INDO PAK WAR which Pak will never forget.ppt
sanjaychief112
 
Data Protection & Resilience in Focus.pdf
AmyPoblete3
 
Crypto Recovery California Services.pptx
lionsgate network
 

RAT - Kill or Get Killed! by Karan Bansal

  • 2. According to legend, the ancient Greeks used a giant horse to defeat the Trojans. It was received as a gift, but inside the horse was the enemy.
  • 3.  What is a RAT?  Characteristics of Trojan  Types of Connection  Common Tools for Remote Access  Case Study of a RAT
  • 4.  RAT (Remote Access Trojan) is a remote control software that allows an attacker to remote control a system.  Typically consists of a serve listening on specific TCP/UDP ports on victim’s machine.  Hidden behind a façade of an appealing and harmless nature.
  • 5.  A simple example of a Trojan horse would be a program named waterfalls.scr claiming to be a free waterfall screensaver which when run instead would allow access to a user’s computer remotely.
  • 6.  A simple example of a Trojan horse would be a program named waterfalls.scr claiming to be a free waterfall screensaver which when run instead would allow access to a user’s computer remotely.  AIDS (Trojan Horse) : Also known as Aids Info Disk or PC Cyborg Trojan, is a Trojan horse that replaces the AUTOEXEC.BAT file, which would then be used by AIDS to count the number of times the computer has booted. Once this boot count reaches 90, AIDS hides directories and encrypts the names of all files on the drive rendering the system unusable.
  • 7.  Once installed, RATs perform their unexpected or even unauthorized operations and use an array of techniques to hide their traces to remain invisible and stay on victim systems for the long haul.
  • 8.  Once installed, RATs perform their unexpected or even unauthorized operations and use an array of techniques to hide their traces to remain invisible and stay on victim systems for the long haul.  Monitor the victim machine using various techniques –  Screen/Camera Capture and Control  File Management  Computer Control  Registry Management  Shell Control  Logging Keystrokes
  • 9.  Direct Connection: In such RATs client connects to a single or multiple servers directly. Stable servers are multi-threaded, allowing for multiple connections with increased reliability.
  • 10.  Direct Connection: In such RATs client connects to a single or multiple servers directly. Stable servers are multi-threaded, allowing for multiple connections with increased reliability.  Reverse Connection: The client opens the port that the server connects to. It is generally used to bypass firewall restrictions on open ports.  No problems with routers blocking incoming data, because the connection is started outgoing for a server.  Allows for mass-updating of servers by broadcasting commands, because many servers can easily connect to a single client.  Needed if victim is behind a NAT.  If the Internet connection is closed down and an application still tries to connect to remote hosts it may be infected with malware in case of Direct Connection.
  • 11.  For someone to get a Trojan, they must download a file in most cases.  The trap may be very easy to fall into if the file looks good into surface.  You can be infected by visiting a rogue website.  Emails –  If you are using Microsoft Outlook, you are vulnerable to many problems which internet explorer has even if you don’t use IE directly.  Open Ports –  Computers running their own servers (HTTP, SMTP, FTP etc.) may be having various vulnerabilities which can be exploited.  These services open a network port (TCP/UDP) giving attackers a means for interacting with these programs anywhere on the internet.
  • 13.  Remote Access  Email Sending  Data Destructive  Downloader  Server Trojan (Proxy, FTP, HTTP etc.)  DOS Attacks  Security Software Disabler
  • 14.  BackOrifice : It enables a user to control a computer running the Microsoft Windows operating system from a remote location. The name is a pun on Microsoft BackOffice Server software.  NetBus : Netbus is a software program for remotely controlling a Microsoft Windows computer system over a network. It was created in 1998 and has been very controversial for its potential of being used as a backdoor.  SubSeven : A popular Trojan mainly used by script kiddies for causing mischief, such as hiding the computer cursor, changing system settings or loading up pornographic websites. Although, it can be used for more serious criminal applications such as stealing credit card details with a keylogger.
  • 15.  Dark Comet :  Provides comprehensive administration capabilities over the infected machine.  It was first identified in 2011 and still infects thousands of computers without being detected.  Allows the user to control the system with GUI.  Dark Comet uses Crypters to hide it existence from antivirus tools.  It performs several malicious administrative tasks such as: disabling Task Manager, Windows Firewall, and Windows UAC.  Uses Reverse-Connection Architecture.  When executing, the server connects to the client and allows client to control and monitor the server.  Most commonly distributed via drive-by attacks and social networking sites.  In Drive-by attacks a malicious script embedded on a webpage executes and tries to exploit some vulnerability in a system.