Anda di halaman 1dari 22

Working With Dark Comet Rat

RAT: So basically Rat is known as a Remote administrator tool. Used to
hack remote PC without any authentication. There are so many tools. Rat
allows a Remote attacker to use PC according to his own wish like he is the
admin of the PC. Remote administrator tool like dark comment is installed
on victims pc without victims knowledge

According to Wikipedia: - A remote access tool (a RAT) is a piece of

software that allows a remote "operator" to control a system as if he has
physical access to that system. While desktop sharing and remote
administration have many legal uses, "RAT" software is usually associated
with criminal or malicious activity. Malicious RAT software is typically
installed without the victim's knowledge, often as payload of a Trojan horse,
and will try to hide its operation from the victim and from security software.

In RAT we just create a server from the attackers Pc and gives it to Victim
so when the victim executes the server or the file created by the attacker
and then the attacker got the access to victims Pc.

What We Can Do With the Rat


1. Gather screen shots

2. Key logging
3. Webcam images
4. Firewall on/off
5. Tricks
6. Let us execute virus in victims pc
7. Download files from victims pc

8. Let us ddos from victims pc

The different types of RAT Softwares are:

DarkComet RAT
Blackshades RAT
Xtreme RAT
Cybergate RAT
Sub Seven
Pain RAT
Net Devil
Apocalypse RAT
Shark RAT
Back Orifice
Bandook RAT
Optix Pro

Step 1: Setting up Dns

1. Go to
2. It is a free Domain registering website that allows us to register a domain, so
as to link it to our account.
3. After you go to no-ip youll need to register an account, after you do
this you should be able to login.

and at down you will see update host and you are done you have successfully
created a DNS for your rat

Now that we have created a Domain, we need some intermedium

connectivity with the
Domain, so we use special software which acts as an interface between
our machine and
The domain registered.
In this case, we are going to use the software by the name DUC Client.

After Successfully Login, Please click on Select Hosts and Select your
all hosts.

After selecting your host click on refresh button and it will be


Port Forwarding

Port forwarding is the process that your router or firewall uses

to sort the right kind of network data to the right port.
Computers and routers use ports as a way to organize
network data. Different types of data, such as web sites, file
downloads, and online games, are each assigned a port
Now you want to find default gateway
Open or forward the port, you need to go to router setting
page, now First of all you need to know your ip address it may
or may not be asked by the router. To check your ip open your
command prompt (cmd) through RUN Command and type

Go to your default gateway Example: -

When you open it in your browser it will show pop up like

By default the username and password is

Username: - Admin
Password: - Admin

The entries made should be of both TCP and UDP

protocol, make sure the settings are saved before exiting.

Now Open Dark Comet That You Have Downloaded From the Link

To Check If Port Is Open/In Forward Mode Or Not

We first add the entry into our Dark
Comet client,
That is, we simulate our Remote access tool to start listening for
activities on the specific
This can be done by , opening your DARK COMET Client,
from the tabs given click on
Socket/Net, from there in the list right click and click on add
To new port

and enter your port number, or if there are more than one port
repeat the process and add
All your port number step by step.

To check if you have successfully open your port

then go to


Now Setting up Rat/Trojan/Server that you give to

Victim to Hack His Pc

Open your Dark Comet client, click on DARK COMET RAT /Server
Module / Full Editor (Expert mode).

Now We Will Start Making the Virus

First of all in main settings you will see process mutex

Click button next to that box Random three to four times

Now in Network setting window, in IP/DNS column enter

domain name which you create on your no-ip account,
and in Port column add the
Unique port number which you have set in port forward


Now moving onwards


Next tab is Module Startup click on it

After that click on start the stub with windows

After that you will see drop file in this means where you want to save
the virus after victim executes it in his pc always select system32#/
There are other options too like melt the file after executing means
hide the file you can also change the creating date and other things too
a lot things


Now Moving Forward

Next tab is a message tab click on it select icon from the default defined
icons and type message to show to your victim when he execute it .


Moving Onwards

Next tab is Module Shield

In this just select two options disable windows firewall
And disable windows UAC

After that there is a tab keylogger which you can use it if you have
any ftp account and if you have then just fill the details and enjoy

After that comes the file binder click on it and click on add file and
select any file with which you want to bind your server or virus

After that go to choose icon to choose your desired icon there are by
default icons present in there and if you want to use some different
icon then you can download from Google.

Now Moving Forward After that there is a tab stub finalization click on
it and dont change any setting and click on build the stub when you
click it will ask you the location where you want to save it select
location and then click on create and your stub is created now spread
this server / Trojan / virus or give to your victims or friends and hack
their PC and Enjoy It

For More Info Contact on My Email Address
Follow Me On twitter
Coded Indisoul
Add Me on Skype
Manjot 511

Special Thanks To

Navdeep Sethi for Helping Me Too Finish This Topic and Special Thanks
To Chetan Soni, Gurender Singh and Rishal Dwivedi