• We just launched and are currently in beta. Join us as we build and grow the community.

WH-RAT – Remote Access Trojan Application

Lapucelle

Cloud Architect
L Rep
0
0
0
Rep
0
L Vouches
0
0
0
Vouches
0
Posts
55
Likes
121
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 400 XP
Black-and-White-Dark-Tech-Lines-Online-Game-Streaming-Creative-Presentation-2.png


Hey Folks, today we have come up with an excited application that helps to build (RAT) for both windows and android operating systems. As we know that remote access trojan (RAT, sometimes called creepware) is a type of malware that controls a system through a remote network connection. Similarly, the “WH-RAT” application is designed to gain control of the target machine by installing malicious trojans.

Let’s take a look 😛 !!

Download and Install

This application is very easy to operate but first you have to download it through the given URL. Once downloaded, unzip the file and boot the application.


1.png


Click on the “next” button and proceed.

2.png


Select installation folder, click on “everyone” and go ahead.

3.png


Done 😛 !! The final interface of this tool has arrived and now first we will setup the server side connection by clicking on the “Start” button.

4.png

Build RAT

Click “Builder” and choose the one for which you want to create the payload.

5.png


In our case we want to take control of the Windows machine. Do not forget to provide your IP address.

6.png


Done 😛 !! The malicious “Remote Access Trojan” has become and now you need to transfer it to the victim machine.

7.png


If you have made any changes to the port, you can change it again from here.

8.png


Good 😛 !! As you can see in the image below, the session of the victim machine has finally come to this application. Now just place your mouse on the session and right click on it.

9.png

File Manager

Here you can see that we can see all the important documents available on the target machine through the GUI interface.

10.png

Execute Script

We can execute any script by writing or uploading it to the target system.

11.png

Remote Desktop

Through this option you can monitor every activity of the target.

12.png

Remote Shell

This gives us the cmd shell of the target machine from where we can execute the command directly on the target machine.

13.png

Registry

The Windows Registry is a database that stores low-level settings for the microsoft windows operating system. We can also change all settings.

14.png


That’s all 😛 !! We cannot show you all the features of this application, so you can try it yourself and take advantage of the target machine.

15.png
About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
 

428,738

311,347

311,356

Top