How to Install FatRat Tool in Kali Linux?
The FatRat is a free and open-source tool used as an exploiting tool. The FatRat tool adds malware with a payload and after that, the malware that you have developed can be executed on different types of operating systems such as android, windows, mac, Linux. The FatRat is a powerful tool that can bypass most of the Antivirus easily and can maintain the connection between attacker and victim. Fatrat Tool can help in generating backdoors, system exploitation, post-exploitation attacks, browser attacks, DLL files, FUD payloads against Linux, Mac OS X, Windows, and Android. We can create malware in different formats using FatRat so that it can be executed easily on the target operating system.
Uses of FatRat Tool In Kali Linux:
- FatRat is used for exploitation.
- FatRat is used to create malware
- Fatrat is used to combine payload with malware.
- Fatrat is used for creating Backdoors for Post Exploitation.
- FatRat is used for browser attacks.
- FatRat is used to get DDL files from Linux.
- FatRat can create malware in different extensions.
Features of FatRat Tool:
- FatRat is Free and Open Source
- FatRat create payloads
- FatRat can bypass most the antivirus.
- FatRat can work with MSFvenom and Metasploit
- FatRat can Generate payloads in Various formats.
- FatRat generates Local or remote listener Generation.
- FatRat can easily make Backdoor by category Operating System such as Linux, android etc.
Installation of FatRat Tool:
Step 1: Open Your Kali Linux and move to the Desktop directory.
Step 2: Now on desktop create a new Directory named fatrat.
Step 3: Now move to fatrat directory.
Step 4: Now you have to download the fatrat tool from GitHub to do that you have to clone it from GitHub. Just clone the tool using the following command.
git clone https://github.com/Screetsec/TheFatRat.git
Step 5: The TheFatRat tool has been downloaded into your Kali Linux now move to the directory where you have downloaded the tool and list out the content.
cd TheFatRat ls
Step 6: Now you have to give the permission of execution to the setup.sh using the following command.
chmod +x setup.sh
Step 7: Now run the tool using the following command.
Working with TheFatRat Tool :
Example 1: Create Backdoor with msfvenom.
We are Creating a Backdoor using msfvenom utility. So we have chosen Option 1.
2. Backdoors can be of various extensions like .elf,.bat,.php,.asp etc. So in this example, we are selection option 5 which is .php Backdoor.
In the below screenshot, you can see that our payload.php is ready and saved in a specific path. Now to perform an attack you can send this payload to the victim and ask him to execute it.
In the below Screenshot, you can see that we have displayed the contents or the coding of payload.php, in which LHOST and Port Number is specified.
Example 2: Create Fud 100% Backdoor with Fudwin 1.0.
We will Create Fud Backdoor using Fudwin 1.0. So we have selected Option 2 from the menu.
In the below Screenshot, you can see that there are 2 primary options.
Slow but Powerful
So we have selected option 1 which seems to be NEW.
In the below Screenshot, we have to specify the name of our payload and the Architecture of our Target System, so in this example we have selected 64Bit (XP64,Vista,7,8,10).
Now, we have to select the icon name in which payload will hide. So we have selected excel.ico.
Example 3: Create Fud Backdoor with Avoid v1.2
We will be Creating a backdoor with Avoid Utility.
We are specifying backdoor name which is backdoor.exe
We have to select the strength or the size of the payload so in this example we have selected Normal payload stealth.
In the below Screenshot , you can see that our Payload is successfully created with the name backdoor.exe in the specified path.
Example 4: Create Fud Backdoor 1000% with PwnWinds [Excellent]
We will create backdoor using PwnWinds Utility which is more powerful among others.
You can see that there is the various option of backdoor type, so in this example, we are creating a .bat extension payload which is a batch script in Windows Target.
Now, we are specifying the name for the payload and selecting the purpose of the payload. So in this case the payload is designed to give reverse tcp connection to the attacker.
You can see that, our payload is created and saved in the specified path.
Example 5: Trojan Debian Package For Remote Access [Trodebi]
We are Creating Trojan Package for Remote Access.
In the below Screenshot, we have specified the name of the Trojan and the path of the Debian package in which Trojan will be merged or hide. So in this case we have selected the google_chrome Debian package.
In the below Screenshot, we are specifying the purpose of the Trojan, so in this example, we have selected shell_reverse_tcp connection.
In the below Screenshot, you can see that our Trojan have integrated with the .deb package and stored in the specified path.
Example 6: Searchsploit
We will be using the SearchSploit option which consists of a list of databases of various payloads and backdoors for every type of target.
In the below Screenshot, Tool is asking us about our Target. So we have given Windows 10 as our target.
You can see that TheFatRat tool has returned us a number of payloads and backdoors for our Windows 10 Target.
Example 7: File Pumper [Increase Your Files Size]
We will be increasing the size of our payload to make it more stealth.
In the below Screenshot, we have selected the backdoor for which we need to increase the size. Also we need to select the size in mb or kb. So we have selected size in mb.
In the below Screenshot, we have selected the size in mb.
You can see that our backdoor.exe file size has been increased.
In the below Screenshot, we are checking the properties of backdoor.exe file for which we have increased size into mb.
Please Login to comment...