Skip to main content

What is RAT (Remote Access Trojan) ?

RAT stands for Remote Access Trojan or Remote Administration Tool. It is one of the most dangerous virus out their over the internet. Hacker can use RAT to get complete control to your computer. He can do basicly anything with your computer. Using RAT hacker can install keyloggers and other malicious viruses remotely to your computer, infect files on your system and more. In this post i will tell you about what hacker can do with your computer using RAT and tell you about some commonly use RAT by hackers.

                                 remote access trojan or rat

 What is RAT ?

As i have told you in my introduction paragraph RAT is Remote Access trojan. It is a peace of software or program which hacker uses to get complete control of your computer. It can be send to you in form of images, videos or any other files. Their are some RAT that even your antivirus software can not detect.  So always be sure about what you are downloading from the internet and never save or download files that anonymous user send you  over the mail or in chat room.

 What You can do with RAT ?
Once a RAT is installed on any computer hacker can do almost anything with that computer. Some malicious task that you can do with RAT are listed below:

Infecting Files
Installing Keyloggers
Controlling Computer
Remotely start webcam, sounds, movies etc
Using your PC to attack Website (DDOS)
View Screen
 Harmless RAT or Good RAT

As you have seen how harmfull RAT are for your computer, but their are some good RAT which some of you might be using daily. You might have heard of TeamViewer, it is a software which you use to control some one's computer with his permission for file transfer, sharing your screen and more.

 Some Commonly Used RAT

ProRAT
CyberGate RAT
DarkComet RAT

Comments

Popular posts from this blog

List of google dorks for sql injection!!!!!

                                       List Of Google Dorks For Sql Injection Google Dork for sql injection I had previously share with you guys List of  good proxy sites to surf anonymously on the internet and today i am sharing with you a list of google dorks for sql injection which is one of most used method to hack a website. List Of Google Dorks inurl:index.php?id= inurl:trainers.php?id= inurl:buy.php?category= inurl:article.php?ID= inurllay_old.php?id= inurl:declaration_more.php?decl_id= inurlageid= inurl:games.php?id= inurlage.php?file= inurl:newsDetail.php?id= inurl:gallery.php?id=d= inurl:event.php?id= inurlroduct-item.php?id= inurl:sql.php?id= inurl:news_view.php?id= inurl:select_biblio.php?id= inurl:humor.php?id= inurl:aboutbook.php?id= inurl:fiche_spectacle.php?id= inurl:article.php?id= inurl:show.php?id= inurl:staff_id= inurl:newsitem.php?num= inurl:readnews.php?id= inurl:top10.php?cat= inurl:historialeer.php?num= inurl:reagir.php?num= in

Some of my Latest edits for several Societies and Organisations

TRYING A TOTALLY NEW TRACK!!!

Heyy Guyss i am back again after few months,in those days i was busy in sem exams as well was doing some activities so totally had no time for my blog. But in those days i enhanced my skill by trying my hands on Photoshop so goyss see and say How are they!!! These are some of the pics edited by me in a span of 1 mnth form beginner to intermediate state of my photoshop so these may not be good,some of  these include: Assasin's creed wallpaper Miley Cyrus wallpaper My own pic edited Angelina jolie in diffrent style Poster for Collg event  Id card of organizers for my University fest universumm with its logo!!!! .