Remote Access Tool 2 (RAT2) : Desktop Capture and Keyloggers
Learn how to add keylogger, remote desktop capture and advanced remote command executions to RATs
Description
Remote Access Tools also known as RATs are used to remotely control another PC over the Internet or the Local Area Network. RATs are used in network management, remote surveillance, system administration, classroom teaching systems, and so on. It is also commonly misused as a malware known as Remote Access Trojans where hackers can spy on the victim's desktop, capture keystrokes and run commands remotely.
This course is a follow-up to the first course entitled Fundamentals of Building a Remote Access Tool (RAT1) in C# where we covered C# programming, Networking and Basic RAT development. In this course, you will learn how to:
add keylogging and remote desktop capture functionalities to your RAT projects
create any remote command execution functions that you like
design a scalable multi-tab user interface for the command and control server that allows for unlimited functionalities.
Desktop capture, keylogging and remote command execution are three of the most basic functionalities found in almost all RATs and that is why we need to understand how they work. What better way to learn, than to code them yourself. Learning from existing open-source RATs is frustrating because they are too complex and the authors do not have courses or tutorials to explain them to beginners.
Features of this course:
Designed with beginners in mind.
We will study in detail, how desktop capture, keylogging and remote command execution works.
We start with very simple, bare-bones desktop and keystroke capture
Then, gradually add more functionality to them as the lessons progress.
In that way, you will be able to easily follow along in bite-sized chunks
Use .NET remoting framework for rapid application development*
*Traditionally, RATs are written using socket programming, that makes the code very complex and error-prone. In this course, I will show you an alternative way where you do not have to write low-level code. Instead you can focus on the logic and functionality of your app. We can achieve this using a powerful Microsoft technology called .NET remoting framework.
Everything in this course is highly practical. No boring theory or lectures. More like walk-throughs which you can replicate and follow along. By the end of this course, you will have the basic knowledge to design and build any RAT containing remote desktop and keystroke capture and run any remote commands that you like. This knowledge and skills are suitable for those aspiring to be Red Teamers. Even if you have no intention of creating malware, the insider knowledge and skills you gain from this course will make you a better security professional. Also, having practical knowledge of RAT development will give you a better understanding of how to perform malware analysis on RATs.
Suitable for:
Reverse Engineering and Malware Analysis Students
Programmers who want to know how Malware is created
Students planning on entering Malware Analysis and Reverse Engineering, or Penetration Testers as a Career Path
Penetration Testers and Ethical Hackers
Prerequisite:
Windows PC
Basic programming knowledge is helpful but not mandatory
Completed Fundamentals of Building a Remote Access Tool (RAT) in C#
What You Will Learn!
- Client server designs for RATs
- Local desktop capture techniques
- Direct desktop capture via the network
- Using .NET remoting framework for RATs
- Reverse connection techniques for bypassing firewalls
- Advanced remote command execution
- How keyloggers work
- How to capture keystrokes that is undetectable by windows defender
- Testing RATs using virtual machines
- Automatically emailing captured keystrokes
- RAT keyloggers
- RAT Lab Projects
- and more...
Who Should Attend!
- C# Programmers wanting to learn how to create an Advanced RAT
- Malware analysts, reverse engineers and developers
- Ethical hackers, pen testers and red teamers
- Students who like to get started on the career path to become malware analysts or penetration testers