In previous post I wrote about what is
a RAT, hope you all read it. Now this time I am posting a tutorial
about one of the most famous RAT program ProRAT.
1. First download a ProRAT
program, (I will soon be updating this post by adding download link for
proRAT) Extract all datas into the folder.
2. You will got a window something like this.
3. Now click on create button.
4. click on the "Create ProRAT server 342kbayt"
5. Now in "PC connective Notification Network". put your own IP address. You can find your IP address
here
Now in "Mail notification" put your own email ID hope you know
this(joking :-p). This column is used to connect ProRAT server to you
computer and and send you email of the logs that its keylogger will
record.
6. Now click on the "Create server" a pop up window would appear stating
"The server has been created" the server will be created in the default
directory i.e. in the folder were proRAT is kept.
7. Not
everyone would be willing to click on anything with .exe extension so,
what we need to do is to hide the server.exe file. Best way is to bind
it with another file such as some mp3 or some jpeg for which victim may
fall for. Now click on the bind server with file option, click on select
file browse and choose the file you want to bind server with click on
bind.

8.
Server file when created looks suspious, you can also change the server
icon just go to server icon and choose the icon you want from the
entire collection.
Now,
you need to send this file to your victim, here you need some social
engineering. First off all make a RAR archive for server as you can not
send .exe file via email due to policies of service providers. Bind the
file with any favorite song or picture of victim or to anything that
victim will be compiled to click on and once he clicked he is all
yours.
PROs and CONS
- ProRAT is a complete package, it is a RAT, a keylogger, binder etc.
- ProRAT has been around for quite a long time.
- As its around for quite a long time it can be detected by anti viruses during scan time but is undetectable during run time.
Hope you guys liked this tutorial please leave comment for any quires and suggestions.
by this method you can also hack any email or social networking accounts.