RAT or ‘Remote Administration Tool’ is one of the most dangerous type of malware. It is very similar to a Trojan. Once a RAT is installed in a computer, the attacker can do almost anything on the remote computer, such as installing a keylogger, sutting down the computer, infecting files, uploading & downloading files, etc. If this is successful, the Trojan can operate with increased priviledges, and go about installing other malicious codes. If the user has administrative access to the operating system, the Trojan can do anything that an administrator can.
Also Read : Keyloggers
A compromise on any system on a network may have consequences for other systems on the network. Particularly vulnerable are the systems that transmit authentication material, such as passwords, overshared network in clear text or in a trivially encrypted form, which is very common. If a system on such a network is compromised via trojan (or another method), the intruder may be able to record usernames and passwords or other sensitive information as it navigates through the network.
Some common types of RATS are:
- Lost Door
We will tell how to use these RAT software in next Article.