Apart from social engineering tricks, methods of preparing such files so that they are undetectable by antivirus programs, methods of planting them and other more complex actions, today we will focus on the programs themselves to take control of our victim’s computer.Ī group of programs used to control a computer from a distance is called Remote Administration Software, the program that we do it without the user’s knowledge is RAT (Remote Administration Tool or Remote Access Trojan or Remote Access Tool).Ī remote access trojan ( RAT, sometimes called creepware) is a type of malware that controls a system through a remote network connection. Anyone wishing to gain access to someone’s computer has to tempt their victim to install malicious software. My last article was about preparing Test environment.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |