際際滷

際際滷Share a Scribd company logo
RATs

By:Jay
What is a RAT
 A RAT is a type a virus
 It stands for Remote Administration Tool
 It allows you to control someones computer
  from yours
Why would someone do this
 Stealing credit cards
 Stealing gaming accounts
  (Minecraft, Runescape, World of Warcraft)
 Just for fun
Is this illegal
 The programs there selves arent illegal just
  putting it on someone else's computer
  without permission is.
 There are legal situations like a parent could
  put it on there childs computer to see what
  they are doing on it
Where do you get one
 There are plenty of places to get one on the
  internet
 There are lots of forums that will help you
  setup and install one (Hackforums.net)
What does look like




You can see all the people this guy has infected. It can tell you
almost anything about their computer. It can tell you if they have
a webcam or a mic, the antivirus software they have, and all the
programs running.
What can you do with one
 You can do anything the person on the
  computer does plus more.
 You can turn on their webcam and
  mic, shutdown what their doing, make
  websites pop up (That`s a fun one),log their
  keystrokes (Key logging) and much much
  more.
How does someone get infected
 You can get infected by downloading an
  unknown file from someone, running java on a
  website (Java drive by), or downloading things
  on the internet.
 A popular method of sending someone a virus
  or spreading is back dooring or binding a
  virus with an anti virus program
Won`t my antivirus protect me
 Some antiviruses may protect you but most
  people crypt their viruses so they are
  FUD, your best bet is just not to download
  anything unless you know what it is.
How to protect yourself
 Don`t download anything unless you know
  what it is
 If you are unsure about something sandbox it
 Check the processes running if you see
  anything unusual end it
 Go to msconfig.exe>startup>disable anything
  that looks suspicious

More Related Content

What's hot (20)

The Computer Virus-Interactive
The Computer Virus-InteractiveThe Computer Virus-Interactive
The Computer Virus-Interactive
GronHatchat
The Nasty of Computers
The Nasty of ComputersThe Nasty of Computers
The Nasty of Computers
GronHatchat
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
Camille Hazellie
Internet security
Internet securityInternet security
Internet security
rfukunaga
Internet Security
Internet SecurityInternet Security
Internet Security
mjelson
Internet security
Internet securityInternet security
Internet security
Carmen Gorda
Computer security
Computer securityComputer security
Computer security
Robin E. Beavers
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
Kevin Fream
Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
ConnectSafely
Computer safety
Computer safetyComputer safety
Computer safety
acarrizales531
Safe Computing
Safe ComputingSafe Computing
Safe Computing
Dr. Dheeraj Mehrotra (National Awardee)
Worms and viruses
Worms and virusesWorms and viruses
Worms and viruses
Connor Kerns
Internet security
Internet securityInternet security
Internet security
Mohammed Adam
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
DOFJLCCDD
Remote administration tools
Remote administration toolsRemote administration tools
Remote administration tools
london b o r d a
App Privacy
App PrivacyApp Privacy
App Privacy
ConnectSafely
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
Michel Bitter
Protect your family
Protect your familyProtect your family
Protect your family
neodad1
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
university of mumbai
Awesome Tips for Data Security
Awesome Tips for Data SecurityAwesome Tips for Data Security
Awesome Tips for Data Security
Millennium Systems International
The Computer Virus-Interactive
The Computer Virus-InteractiveThe Computer Virus-Interactive
The Computer Virus-Interactive
GronHatchat
The Nasty of Computers
The Nasty of ComputersThe Nasty of Computers
The Nasty of Computers
GronHatchat
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
Camille Hazellie
Internet security
Internet securityInternet security
Internet security
rfukunaga
Internet Security
Internet SecurityInternet Security
Internet Security
mjelson
Internet security
Internet securityInternet security
Internet security
Carmen Gorda
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
Kevin Fream
Worms and viruses
Worms and virusesWorms and viruses
Worms and viruses
Connor Kerns
Internet security
Internet securityInternet security
Internet security
Mohammed Adam
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
DOFJLCCDD
Remote administration tools
Remote administration toolsRemote administration tools
Remote administration tools
london b o r d a
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
Michel Bitter
Protect your family
Protect your familyProtect your family
Protect your family
neodad1

Viewers also liked (6)

The history of xbox
The history of xboxThe history of xbox
The history of xbox
Jay Fiddler
The history of xbox
The history of xboxThe history of xbox
The history of xbox
Jay Fiddler
Xbox technology
Xbox technologyXbox technology
Xbox technology
Ishtdeep Hora
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with Data
Seth Familian
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
Drift
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
Leslie Samuel
The history of xbox
The history of xboxThe history of xbox
The history of xbox
Jay Fiddler
The history of xbox
The history of xboxThe history of xbox
The history of xbox
Jay Fiddler
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with Data
Seth Familian
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
Drift
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
Leslie Samuel

Similar to RATs (20)

Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
JenMorri
Cyber security
Cyber securityCyber security
Cyber security
SaurabhKaushik57
Safe_IT
Safe_ITSafe_IT
Safe_IT
Trish Bourke
Computer Security threat
Computer Security threatComputer Security threat
Computer Security threat
Azri Abdin
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
Azri Abdin
Internet Threats (Living in the Information Technology Era)
Internet Threats (Living in the Information Technology Era)Internet Threats (Living in the Information Technology Era)
Internet Threats (Living in the Information Technology Era)
manahaonregine
Spyware
SpywareSpyware
Spyware
Avani Patel
Overview of information security
Overview of information securityOverview of information security
Overview of information security
Askao Ahmed Saad
Computer-vIRUS-malicious software and worm.pptx
Computer-vIRUS-malicious software and worm.pptxComputer-vIRUS-malicious software and worm.pptx
Computer-vIRUS-malicious software and worm.pptx
KennethMorales26
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptx
Froilan Cantillo
Trojan horse
Trojan horseTrojan horse
Trojan horse
Kaushik Paul
Malicious
MaliciousMalicious
Malicious
Khyati Rajput
Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Computer Viruses & Management Strategies
Computer Viruses & Management Strategies
Dasun Hegoda
spyware
spyware spyware
spyware
maaza mohammed
Thou shalt not
Thou shalt notThou shalt not
Thou shalt not
taftosterone
How safe is your computer?
How safe is your computer?How safe is your computer?
How safe is your computer?
Sunjoonah Kambbs
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
Mohsin Riaz
Computer based crime
Computer based crimeComputer based crime
Computer based crime
Taylor_Marie
Computer based crime
Computer based crimeComputer based crime
Computer based crime
Taylor_Marie
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
JenMorri
Computer Security threat
Computer Security threatComputer Security threat
Computer Security threat
Azri Abdin
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
Azri Abdin
Internet Threats (Living in the Information Technology Era)
Internet Threats (Living in the Information Technology Era)Internet Threats (Living in the Information Technology Era)
Internet Threats (Living in the Information Technology Era)
manahaonregine
Overview of information security
Overview of information securityOverview of information security
Overview of information security
Askao Ahmed Saad
Computer-vIRUS-malicious software and worm.pptx
Computer-vIRUS-malicious software and worm.pptxComputer-vIRUS-malicious software and worm.pptx
Computer-vIRUS-malicious software and worm.pptx
KennethMorales26
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptx
Froilan Cantillo
Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Computer Viruses & Management Strategies
Computer Viruses & Management Strategies
Dasun Hegoda
How safe is your computer?
How safe is your computer?How safe is your computer?
How safe is your computer?
Sunjoonah Kambbs
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
Mohsin Riaz
Computer based crime
Computer based crimeComputer based crime
Computer based crime
Taylor_Marie
Computer based crime
Computer based crimeComputer based crime
Computer based crime
Taylor_Marie

Recently uploaded (20)

Meeting the needs of modern students?, Selina McCoy
Meeting the needs of modern students?, Selina McCoyMeeting the needs of modern students?, Selina McCoy
Meeting the needs of modern students?, Selina McCoy
Economic and Social Research Institute
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
Comprehensive Guide to Antibiotics & Beta-Lactam Antibiotics.pptx
Comprehensive Guide to Antibiotics & Beta-Lactam Antibiotics.pptxComprehensive Guide to Antibiotics & Beta-Lactam Antibiotics.pptx
Comprehensive Guide to Antibiotics & Beta-Lactam Antibiotics.pptx
Samruddhi Khonde
Cyrus_Kelisha_SMM_PB1_2024-November.pptx
Cyrus_Kelisha_SMM_PB1_2024-November.pptxCyrus_Kelisha_SMM_PB1_2024-November.pptx
Cyrus_Kelisha_SMM_PB1_2024-November.pptx
KelishaCyrus
Administrative bodies( D and C Act, 1940
Administrative bodies( D and C Act, 1940Administrative bodies( D and C Act, 1940
Administrative bodies( D and C Act, 1940
P.N.DESHMUKH
Interim Guidelines for PMES-DM-17-2025-PPT.pptx
Interim Guidelines for PMES-DM-17-2025-PPT.pptxInterim Guidelines for PMES-DM-17-2025-PPT.pptx
Interim Guidelines for PMES-DM-17-2025-PPT.pptx
sirjeromemanansala
lklklklklklklklklklklklklklklklklklklklklklklklklklklklk
lklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklk
lklklklklklklklklklklklklklklklklklklklklklklklklklklklk
preetheshparmar
Unit 1 Computer Hardware for Educational Computing.pptx
Unit 1 Computer Hardware for Educational Computing.pptxUnit 1 Computer Hardware for Educational Computing.pptx
Unit 1 Computer Hardware for Educational Computing.pptx
RomaSmart1
One Click RFQ Cancellation in Odoo 18 - Odoo 際際滷s
One Click RFQ Cancellation in Odoo 18 - Odoo 際際滷sOne Click RFQ Cancellation in Odoo 18 - Odoo 際際滷s
One Click RFQ Cancellation in Odoo 18 - Odoo 際際滷s
Celine George
2025 MSKMUN NEWS 1.pdf 2025 MSKMUN NEWS 1.pdf
2025 MSKMUN NEWS 1.pdf 2025 MSKMUN NEWS 1.pdf2025 MSKMUN NEWS 1.pdf 2025 MSKMUN NEWS 1.pdf
2025 MSKMUN NEWS 1.pdf 2025 MSKMUN NEWS 1.pdf
1mksmunathens
ASP.NET Interview Questions PDF By ScholarHat
ASP.NET  Interview Questions PDF By ScholarHatASP.NET  Interview Questions PDF By ScholarHat
ASP.NET Interview Questions PDF By ScholarHat
Scholarhat
BISNIS BERKAH BERANGKAT KE MEKKAH ISTIKMAL SYARIAH
BISNIS BERKAH BERANGKAT KE MEKKAH ISTIKMAL SYARIAHBISNIS BERKAH BERANGKAT KE MEKKAH ISTIKMAL SYARIAH
BISNIS BERKAH BERANGKAT KE MEKKAH ISTIKMAL SYARIAH
coacharyasetiyaki
Intellectual Honesty & Research Integrity.pptx
Intellectual Honesty & Research Integrity.pptxIntellectual Honesty & Research Integrity.pptx
Intellectual Honesty & Research Integrity.pptx
NidhiSharma495177
Effective Product Variant Management in Odoo 18
Effective Product Variant Management in Odoo 18Effective Product Variant Management in Odoo 18
Effective Product Variant Management in Odoo 18
Celine George
Annex-A_PMES-Tool-for-Proficient-Teachers-SY-2024-2025.ppt
Annex-A_PMES-Tool-for-Proficient-Teachers-SY-2024-2025.pptAnnex-A_PMES-Tool-for-Proficient-Teachers-SY-2024-2025.ppt
Annex-A_PMES-Tool-for-Proficient-Teachers-SY-2024-2025.ppt
joan dalilis
RRB ALP CBT 2 RAC Question Paper MCQ (Railway Assistant Loco Pilot)
RRB ALP CBT 2 RAC Question Paper MCQ (Railway Assistant Loco Pilot)RRB ALP CBT 2 RAC Question Paper MCQ (Railway Assistant Loco Pilot)
RRB ALP CBT 2 RAC Question Paper MCQ (Railway Assistant Loco Pilot)
SONU HEETSON
How to create security group category in Odoo 17
How to create security group category in Odoo 17How to create security group category in Odoo 17
How to create security group category in Odoo 17
Celine George
AI and Academic Writing, Short Term Course in Academic Writing and Publicatio...
AI and Academic Writing, Short Term Course in Academic Writing and Publicatio...AI and Academic Writing, Short Term Course in Academic Writing and Publicatio...
AI and Academic Writing, Short Term Course in Academic Writing and Publicatio...
Prof. (Dr.) Vinod Kumar Kanvaria
ASP.NET Web API Interview Questions By Scholarhat
ASP.NET Web API Interview Questions By ScholarhatASP.NET Web API Interview Questions By Scholarhat
ASP.NET Web API Interview Questions By Scholarhat
Scholarhat
Chapter 2. Strategic Management: Corporate Governance.pdf
Chapter 2. Strategic Management: Corporate Governance.pdfChapter 2. Strategic Management: Corporate Governance.pdf
Chapter 2. Strategic Management: Corporate Governance.pdf
Rommel Regala
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
Comprehensive Guide to Antibiotics & Beta-Lactam Antibiotics.pptx
Comprehensive Guide to Antibiotics & Beta-Lactam Antibiotics.pptxComprehensive Guide to Antibiotics & Beta-Lactam Antibiotics.pptx
Comprehensive Guide to Antibiotics & Beta-Lactam Antibiotics.pptx
Samruddhi Khonde
Cyrus_Kelisha_SMM_PB1_2024-November.pptx
Cyrus_Kelisha_SMM_PB1_2024-November.pptxCyrus_Kelisha_SMM_PB1_2024-November.pptx
Cyrus_Kelisha_SMM_PB1_2024-November.pptx
KelishaCyrus
Administrative bodies( D and C Act, 1940
Administrative bodies( D and C Act, 1940Administrative bodies( D and C Act, 1940
Administrative bodies( D and C Act, 1940
P.N.DESHMUKH
Interim Guidelines for PMES-DM-17-2025-PPT.pptx
Interim Guidelines for PMES-DM-17-2025-PPT.pptxInterim Guidelines for PMES-DM-17-2025-PPT.pptx
Interim Guidelines for PMES-DM-17-2025-PPT.pptx
sirjeromemanansala
lklklklklklklklklklklklklklklklklklklklklklklklklklklklk
lklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklk
lklklklklklklklklklklklklklklklklklklklklklklklklklklklk
preetheshparmar
Unit 1 Computer Hardware for Educational Computing.pptx
Unit 1 Computer Hardware for Educational Computing.pptxUnit 1 Computer Hardware for Educational Computing.pptx
Unit 1 Computer Hardware for Educational Computing.pptx
RomaSmart1
One Click RFQ Cancellation in Odoo 18 - Odoo 際際滷s
One Click RFQ Cancellation in Odoo 18 - Odoo 際際滷sOne Click RFQ Cancellation in Odoo 18 - Odoo 際際滷s
One Click RFQ Cancellation in Odoo 18 - Odoo 際際滷s
Celine George
2025 MSKMUN NEWS 1.pdf 2025 MSKMUN NEWS 1.pdf
2025 MSKMUN NEWS 1.pdf 2025 MSKMUN NEWS 1.pdf2025 MSKMUN NEWS 1.pdf 2025 MSKMUN NEWS 1.pdf
2025 MSKMUN NEWS 1.pdf 2025 MSKMUN NEWS 1.pdf
1mksmunathens
ASP.NET Interview Questions PDF By ScholarHat
ASP.NET  Interview Questions PDF By ScholarHatASP.NET  Interview Questions PDF By ScholarHat
ASP.NET Interview Questions PDF By ScholarHat
Scholarhat
BISNIS BERKAH BERANGKAT KE MEKKAH ISTIKMAL SYARIAH
BISNIS BERKAH BERANGKAT KE MEKKAH ISTIKMAL SYARIAHBISNIS BERKAH BERANGKAT KE MEKKAH ISTIKMAL SYARIAH
BISNIS BERKAH BERANGKAT KE MEKKAH ISTIKMAL SYARIAH
coacharyasetiyaki
Intellectual Honesty & Research Integrity.pptx
Intellectual Honesty & Research Integrity.pptxIntellectual Honesty & Research Integrity.pptx
Intellectual Honesty & Research Integrity.pptx
NidhiSharma495177
Effective Product Variant Management in Odoo 18
Effective Product Variant Management in Odoo 18Effective Product Variant Management in Odoo 18
Effective Product Variant Management in Odoo 18
Celine George
Annex-A_PMES-Tool-for-Proficient-Teachers-SY-2024-2025.ppt
Annex-A_PMES-Tool-for-Proficient-Teachers-SY-2024-2025.pptAnnex-A_PMES-Tool-for-Proficient-Teachers-SY-2024-2025.ppt
Annex-A_PMES-Tool-for-Proficient-Teachers-SY-2024-2025.ppt
joan dalilis
RRB ALP CBT 2 RAC Question Paper MCQ (Railway Assistant Loco Pilot)
RRB ALP CBT 2 RAC Question Paper MCQ (Railway Assistant Loco Pilot)RRB ALP CBT 2 RAC Question Paper MCQ (Railway Assistant Loco Pilot)
RRB ALP CBT 2 RAC Question Paper MCQ (Railway Assistant Loco Pilot)
SONU HEETSON
How to create security group category in Odoo 17
How to create security group category in Odoo 17How to create security group category in Odoo 17
How to create security group category in Odoo 17
Celine George
AI and Academic Writing, Short Term Course in Academic Writing and Publicatio...
AI and Academic Writing, Short Term Course in Academic Writing and Publicatio...AI and Academic Writing, Short Term Course in Academic Writing and Publicatio...
AI and Academic Writing, Short Term Course in Academic Writing and Publicatio...
Prof. (Dr.) Vinod Kumar Kanvaria
ASP.NET Web API Interview Questions By Scholarhat
ASP.NET Web API Interview Questions By ScholarhatASP.NET Web API Interview Questions By Scholarhat
ASP.NET Web API Interview Questions By Scholarhat
Scholarhat
Chapter 2. Strategic Management: Corporate Governance.pdf
Chapter 2. Strategic Management: Corporate Governance.pdfChapter 2. Strategic Management: Corporate Governance.pdf
Chapter 2. Strategic Management: Corporate Governance.pdf
Rommel Regala

RATs

  • 2. What is a RAT A RAT is a type a virus It stands for Remote Administration Tool It allows you to control someones computer from yours
  • 3. Why would someone do this Stealing credit cards Stealing gaming accounts (Minecraft, Runescape, World of Warcraft) Just for fun
  • 4. Is this illegal The programs there selves arent illegal just putting it on someone else's computer without permission is. There are legal situations like a parent could put it on there childs computer to see what they are doing on it
  • 5. Where do you get one There are plenty of places to get one on the internet There are lots of forums that will help you setup and install one (Hackforums.net)
  • 6. What does look like You can see all the people this guy has infected. It can tell you almost anything about their computer. It can tell you if they have a webcam or a mic, the antivirus software they have, and all the programs running.
  • 7. What can you do with one You can do anything the person on the computer does plus more. You can turn on their webcam and mic, shutdown what their doing, make websites pop up (That`s a fun one),log their keystrokes (Key logging) and much much more.
  • 8. How does someone get infected You can get infected by downloading an unknown file from someone, running java on a website (Java drive by), or downloading things on the internet. A popular method of sending someone a virus or spreading is back dooring or binding a virus with an anti virus program
  • 9. Won`t my antivirus protect me Some antiviruses may protect you but most people crypt their viruses so they are FUD, your best bet is just not to download anything unless you know what it is.
  • 10. How to protect yourself Don`t download anything unless you know what it is If you are unsure about something sandbox it Check the processes running if you see anything unusual end it Go to msconfig.exe>startup>disable anything that looks suspicious