Chapter 6: Malware Development
In previous chapters, we have learned how to gather information pertaining to the user and how this information can be used to attack the victim. In this chapter, we will move toward a new dimension and develop a Remote Access Tool (RAT). RATs allow pen testers to gain access to victims' computers remotely and are widely used in the field of cybersecurity. There are much more advanced RAT programs available on the internet. However, the goal of this chapter is to help you build your own RAT, which will give you far more advanced control.
In this chapter, we will cover the following topics:
- Introduction to RATs
- Socket programming in Python
- Creating malware
- Running commands remotely on the victim