how hackers create remote access trojans (RATs)?!

Summary: The video discusses a hacking tutorial using a tool called Shelter to inject malicious code into a target file, enabling remote access to a Windows computer. The presenter emphasizes the importance of legal and ethical considerations in hacking and demonstrates the installation and execution processes step by step.

Keypoints:

  • Introduction to hacking with Shelter, emphasizing ethical considerations.
  • Downloading Shelter and preparing the Windows environment.
  • Targeting a specific executable file (nc.exe) for code injection.
  • Generating malicious payload using Kali Linux terminal.
  • Setting up a web server to host the malicious shell code.
  • Executing the target file to establish remote control over the Windows PC.
  • Using the command line to listen for incoming connections on Kali Linux.
  • Demonstrating full access to the infected PC after executing the payload.
  • Encouraging viewers to experiment responsibly and ethically.

Youtube Video: https://www.youtube.com/watch?v=h7VoAQwyI4Y
Youtube Channel: Loi Liang Yang
Video Published: Sun, 16 Mar 2025 08:15:59 +0000