***This is for educational purpose only, don’t try it on
unauthorized computers. Do it at your own risk.
DarkComet is a Remote Access Trojan (RAT), developed by an
independent programmer and security coder from France Jean –Pierre Lesueur.
DarkComet use a reverse-connecting architecture like other RAT’s. Basically,
all RAT has two program client and server. Server program runs on the victim
system (infected system) whereas the client runs on the hacker computer. Using
client the hacker control the server which in turns control the victim
computer. Usually the client program is a GUI(Graphical User Interface) and server doesn’t contain a GUI.
Darkcomet have many features to gain control over victim
computer and also one could get the files from the victim computer easily.
Let’s see how to use it.
- · Download DarkComet from http://sourceforge.net/projects/darkcomet/ .
- · Unpack it and open DarkComet.exe. When you open it, the windows will looks like the below one.
- · Go to DarkComet-RAT at the left top corner --> Server module (657.50KB) --> Minimalist (Quick) --> click
- · It will pop-up a window
Stub ID : Any name to your
victim (say “Victim1”)
IP/DNS
: Enter your IP address
Port
: 1604 (Default port for DarkComet,
sometimes it may not work if the port
number is changed)
All
other options can be default, drag and drop an icon if you want. Then, click
Normal in the right bottom corner and save the file. The file thus generated is the server file
which should be installed on the victim computer.
- · Take the generated file and execute it on victim computer. If all the above process is over, then half of the process is completed.
- · Next step is to listen to the port. The client program(GUI) will listen to the server in the victim computer through the port 1604.
- · Click DarkComet-RAT --> Listen to new port(+Listen) --> a windows will pop-up --> Listen port: 1604 (don’t change this until you change the port number in the previous server creating step) --> Click “Listen”.
- · The client will listen to the port and when the victim is online then it will show in the client GUI. It will show you connected victim and basic info’s.
·
That’s it. Now you can do whatever you want.
Like monitor the victim, install keylogger, activate webcame, etc, etc.,
No comments:
Post a Comment