[project]Gain Access to the Target System using Trojans
Lab1 :Gain control over a victim machine using the njRAT RAT Trojan
Open njRAT and type IP address of the Windows 10 (attacker machine) in the host field
Save the file name as Test.exe in the Target machine (Windows server 2016)
When the victim double clicks the file, it establishes a persistent connection with the host machine and appears in the console.
You can manipulate the victim machine via console such as renaming a file
Process managers show the currently running processes on the victim machine.
You can check connections between the host and victim machine.
You can also check the registry of the victim machine.
From the remote shell option, you can run commands on the victim machine.
You can run some scripts from the host machine.
You can launch a remote desktop connection without the victim’s awareness.
You can use a keylogger to trace what the victim has typed.
The outstanding feature of a njRAT is to keep connected with the victim even after rebooting.
It is necessary to terminate the process from Task Manager by clicking End Task.