Hello everyone. I'm Calypsus and i've been around for a while learning from various tutorials, expanding my knowledge and this is one of the best platforms for newbies to sharpen the skills. Today i decided to register myself and contribute to this wonderful community. Since this is my first post, any kind of feedback is appreciated.
A botnet is a collection of compromised machines for the use of (Distributed) Denial of Service (DoS/DDoS). Consider this as an army of compromised systems used to create havoc.
The botnets are usually controlled by IRC channels and HTTP protocols. The systems are compromised and then used for massive DDOS on websites or trigger a 0day exploit.
RAT - Remote administration tool. A RAT is malicious malware software that runs on your computer. It gives access to a hacker when he wants to steal information from you or install other malicious software. Basically, if a RAT is installed in the system, the hacker has complete power over it. He can either keylog the passwords or steal confidential information.
The RATs are usually detected by antivirus unless its crypted or binded with other files. There are some legal RATs like Teamviewer which help in numerous ways and then there are several illegal RATs which help in all kind of malicious activities, some notable ones are ZeuS, Spynet.
I'll be doing tutorials on howto create RATs, host them and infect the systems with it. I'd like to end this tutorial with a quote of Edward Snowden - "I would rather be without a state than without a voice"
Want to help support Null Byte and start making your own money as a white hat hacker? Jump start your White-Hat Hacking career with our 2020 Premium Ethical Hacking Certification Training Bundle from the new Null Byte Shop and get over 60 hours of training from Ethical Hacking Professionals.