AN OVERVIEW OF NJRAT ( FOR NEWBIES) - 2024

Currently reading:
 AN OVERVIEW OF NJRAT ( FOR NEWBIES) - 2024

bbyc4rdface

Member
LV
1
Joined
Jul 22, 2024
Threads
10
Likes
3
Awards
4
Credits
492©
Cash
0$
NOTE: First of all, I don't provide any links for downloading
you are free where you are going to download
[Imagen: monkah.png]


njRAT:
njRAT is a RAT with powerful data-stealing capabilities. In addition to loggin keystrokes, it is capable of accessing a victim's camera, stealing credentials stored in browsers, uploading and downloading files, performing the process and file manipulations, and viewing the victim's desktop.
RATs help an attacker to remotely access complete GUI, control victim's computer without his or her awareness and are capable of performing screening and camera capture, code execution, keylogging, file access, password sniffing, registry management, and so on. It infects victims via phishing attacks and drive by downloads and propagates through infected USB keys or networked drives. It can download and execute additional malware, execute shell commands, read and write registry keys, capture screenshots, log keystrokes, and spy on webcams.

The njRAT Trojan can be used to control Botnets (network of computers), allowing the attacker to update, uninstall, disconnect, restart, close the RAT, and rename its compaign ID. The attacker can further create and configure the malware to spread through USB drives with the help of the Command and Control server software.

Objectives
  • Create a server using njRAT.
  • Access the target machine remotely.
Create an Executable Server with njRAT
  1. Log in to Windows and install the njRAT.
  2. Launch the njRAT, the GUI appears along with a pop-up, where you need to specify the port you want to use to interact with the target machine. Use the default port number 5552, and click Start.

    [Image: njrat-1.png]
Click on Builder in the lower-left corner.

[Image: njrat-2.png]


On the Builder dialog-box, enter the IP address of the Attacker machine - Windows 10, check the option Copy to StartUp and Registry StarUp, then click Build as shown below:
[Image: njrat-3.png]

Save the file on the Desktop and name as Example.exe.

Now, we need to use any technique to send this server to the intended target through mail or any other way.
To make this easier in this lab, I copied the Example.exe file in the shared network location.
Execute the Server on the Target MachineIn this Lab I'm using Windows 7 SP1 virtual machine.
Note: Make sure to enable the Firewall on the target machine.

Drag the Example.exe file to your Desktop and double-click it.

[Image: njrat-4-.png]
As you can see below, the connection was successfully established.
[Image: netstat-njrat-0.png]

Switch back to the Windows 10 (Attacker). When the target double-clicks the server, the executable starts running and the njRAT GUI running on the Windows 10 establishes a persistent connection with the Target machine as show below:

[Image: njrat-5-manager.png]
The GUI displays the machine's basic details such as the IP address, OS, user name and so on.



Manipulate Files on Target machineRight-click on the detected Target machine and click Manager.

[Image: njrat-6.png]

Double-click on any directory in the left pane. You can right-click any selected directory and manipulate it using the contextual options:

[Image: njrat-7.png]
[Image: njrat-8.png]
Manage the Processes
Click on Process Manager on the top menu. You will be redirected to the Process Manager, where you can right-click any process and perform actions such as Kill, Delete, and Restart.

[Image: njrat-9.png]
Manage the Connections
Click on Connections on the top menu and select a specific connection, right-click on it, and click Kill Connection. This action kills the connection between two machines communicating through a particular port.

[Image: njrat-10.png]
Manage the Registries
Click on Registry on the top menu and choose a registry from the left pane, right-click on its associated registry files, a few options appear to manipulate them.

[Image: njrat-11.png]
Launch a Remote Shell
Click on Remote Shell on the top menu. This action launches a remote command prompt of the target machine.

[Image: njrat-12.png]
Similarly, you can issue all the other commands that can be executed in the command prompt of the target.
Run File
On the main window of njRAT, righ-click on the Target machine and select Run File. An attacker makes use of these options to execute scripts or files remotely from his/her machine.

[Image: njrat-13.png]

Launch a Remote Desktop Connection
Righ-click on the Target machine and select Remote Desktop Connection

[Image: njrat-14.png]

This launches a remote desktop connection without target's consent. You will be able to remotely interact with the victim machine using the mouse or keyboard.

[Image: njrat-15.png]

In the same way, you can select the Remote Cam and Microphone to spy on the target and track voice conversations.


Perform Key Logging
Switch to the Windows 7 (Target machine). Let's assume that you are a legitimate user and perform a few activities such as logging into any websites or typing text in some documents.
Now, switch back to Windows 10 machine / njRAT GUI and right-click on the target machine, select the Keylogger option.

[Image: rjrat-17.png]

The keylogger window appears, displaying all the keystrokes performed by the target.
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips

Similar threads

Top Bottom