41
Hacking with Remote Admin Tools (RATs) Zoltan Balazs CTO @MRG Effitas Budapest IT Security Meetup January 2014

Hacking with Remote Admin Tools (RAT)

  • Upload
    bz98

  • View
    23.184

  • Download
    3

Embed Size (px)

DESCRIPTION

This presentation is a fun introduction to the tools used by script kiddies, namely the Remote Admin Tools (or Remote Access Trojans). These GUI based hacking tools include a lot of funny and scary features.

Citation preview

Page 1: Hacking with Remote Admin Tools (RAT)

Hacking with Remote Admin Tools (RATs)

Zoltan BalazsCTO @MRG Effitas

Budapest IT Security MeetupJanuary 2014

Page 2: Hacking with Remote Admin Tools (RAT)

Remote admin tools

Could be legitimateUsually it is not

All the features for remote administrationUpload/download filesRegistry editorShell commandsRemote desktop

Using RAT might be illegal, and might be considered as a crime!Don’t try this at home!

Page 3: Hacking with Remote Admin Tools (RAT)

Why are these skiddie toolz important?

Only pentesters use meterpreterScript kiddies use RATsNot just "1337 |-|4x0r5” use RATs!

Know your enemy!Malware incident responseForensic investigation

Page 4: Hacking with Remote Admin Tools (RAT)

Typical RAT scenario

Page 5: Hacking with Remote Admin Tools (RAT)

1998

Page 6: Hacking with Remote Admin Tools (RAT)

DEF CON 6 on August 1, 1998

Page 7: Hacking with Remote Admin Tools (RAT)
Page 8: Hacking with Remote Admin Tools (RAT)

Dictionary to skiddie language

Skiddie worldserver clientFUD

cryptorprivate/elite/gold version

Average worldclient malware on victim

server code @skiddieFully UnDetectablesome lame packer

full version (not demo)

Page 10: Hacking with Remote Admin Tools (RAT)

#opsecfail

Page 11: Hacking with Remote Admin Tools (RAT)

#opsecfail

Page 12: Hacking with Remote Admin Tools (RAT)

#opsecfail

Page 13: Hacking with Remote Admin Tools (RAT)

#opsecfail

Page 14: Hacking with Remote Admin Tools (RAT)

#opsecfail

Page 15: Hacking with Remote Admin Tools (RAT)
Page 16: Hacking with Remote Admin Tools (RAT)

The skiddie’s youtube list on Cyber Threat Task Force (google cache only)

Page 17: Hacking with Remote Admin Tools (RAT)
Page 18: Hacking with Remote Admin Tools (RAT)
Page 19: Hacking with Remote Admin Tools (RAT)

But a script kitty’s life is not just about work

But FUN as well!

Page 20: Hacking with Remote Admin Tools (RAT)

Fun manager - Fun menu

Page 21: Hacking with Remote Admin Tools (RAT)

Extra fun

Page 22: Hacking with Remote Admin Tools (RAT)

Fun feature 3

Page 23: Hacking with Remote Admin Tools (RAT)

Fun feature 4 – Matrix chat

Page 24: Hacking with Remote Admin Tools (RAT)

Fun feature 5

Page 25: Hacking with Remote Admin Tools (RAT)

Ultimate fun …

Page 26: Hacking with Remote Admin Tools (RAT)

Ultimate fun feature 6 - Piano

Page 27: Hacking with Remote Admin Tools (RAT)

Hacking Internet Explorer

Page 28: Hacking with Remote Admin Tools (RAT)

Scary features

Page 29: Hacking with Remote Admin Tools (RAT)

Scary feature 1

DLL inject into iexplore.exeProxy awareTransparent proxy authenticationLocal software firewall bypassNo new process running

Page 30: Hacking with Remote Admin Tools (RAT)

Scary feature 2 – Melt/uninstall

Melt server deletes the dropper

No wipeForensics restoration possible

Uninstall server deletes the persistence file

No wipeForensics restoration possible

Page 31: Hacking with Remote Admin Tools (RAT)

Scary feature - Alternate data stream

Page 32: Hacking with Remote Admin Tools (RAT)

Scary feature 3 - Anti AV

Page 33: Hacking with Remote Admin Tools (RAT)

Scary feature 4 – Anti VM, Anti sandbox

Page 34: Hacking with Remote Admin Tools (RAT)

Private/elite version

Downloading and running binaries from people like this is a bad idea!hxxp://www.theatregelap.com/2012/06/xtremerat-v-36-private.html

Page 35: Hacking with Remote Admin Tools (RAT)

JRATMultiplatformEvade some software firewalls (java.exe allowed)Easier to obfuscateScreenshots ©Symantec

Page 36: Hacking with Remote Admin Tools (RAT)

AndroRAT

© VRT Snort blog

Page 37: Hacking with Remote Admin Tools (RAT)

Cryptor

Page 38: Hacking with Remote Admin Tools (RAT)

High profile attacks

Page 39: Hacking with Remote Admin Tools (RAT)

High profile attacks

Page 40: Hacking with Remote Admin Tools (RAT)
Page 41: Hacking with Remote Admin Tools (RAT)