4.10 RAT

A RAT acts as a remote control, as the name suggests. It can be used as both good and bad. RATs can be used by system administrators to solve the issues of their clients by accessing the client's machine remotely. But since RATS usually give full access to the person sitting remotely, they can be misused by hackers. RATs have been used in sophisticated hacks lots of times.

RATS have been misused for multiple purposes, such as the following:

  • Monitoring keystrokes using keyloggers
  • Stealing credentials and data from the victim machine
  • Wiping out all data from a remote machine
  • Creating a backdoor so that a hacker can log in

Gh0st Rat, Poison Ivy, Back Orifice, Prorat, and NjRat are well-known RATs.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.115.195