NJRAT HACKING
BY : MOHAMMED AREF AL-AJLOUNEI
Hacking
OUTLINE
•Introduction
•Njrat Features & Characteristics
•How to protect your device
Hacking : unauthorized access to computer, or network.
Malware : abbreviation of the two words malicious Software
Victim : Is a person who has access to his pc without
knowing it
Introduction
Trojans, worms, and rootkits
Provocation
When access to the personal computer (PC) of
the victim, the hacker can steal and use of data
for purposes such of extortion
It is a tool ; the principle of its work on a Trojan in
achieving hack and using malware to sharing For ease of
participation
Njrat:
The encryption of the virus through a Dot-Net languages
programming
Such as C Sharp .
Njrat interface
Requirements :
1- Download one of the versions of the njrat ( last version 7.4)
2- You must have your own domain (DNS)
3- victim's device should be connected to the Internet
How Njrat works
(by sending a Virus)
- creating a Server and combined with a video image or anything else.
-send and wait ... until the victim open the file.
-When you open this file begins to work and send all the information to the other
device.
-The hacking … started.
Are several ways hacker
Send virus
Orby IPAddress
How Njrat works
How Njrat works
Features of njrat
3- Use the victim more than one way
2- Bring the victim device Information
Device name / IP / Operating system version/country etc.
1- Full control of creating the virus
4- The server is small in size (24kb)
Features of njrat
Features of njrat
Characteristics
1- Full control of the files
Upload file - delete a file - Download file - Rename the file etc.
2- operations Controlling
cmd , add or remove programming , shutdown , play games etc.
3-spying
Using the camera and microphone.
4-Conversation with the victim
by voice or chatting.
HOW TO PROTECT YOUR
DEVICE
PC must be protected by anti-virus program/Anti-malware
Don’t accept any program or file an anonymous
sourcebuying the original copies of the programs (Licensees)
Don't use this software for unethical purposes
References
(https://en.wikipedia.org/wiki/Malware (Wikipedia, 2015))
(http://www.dev-point.com/vb/t458139.html, 2015)
(http://www.pcworld.com/article/2048261/understanding-tech-language-the-difference-between-malware-and-a-virus.html(pc-world2015))

Njarat 2015

  • 1.
    NJRAT HACKING BY :MOHAMMED AREF AL-AJLOUNEI Hacking
  • 2.
    OUTLINE •Introduction •Njrat Features &Characteristics •How to protect your device
  • 3.
    Hacking : unauthorizedaccess to computer, or network. Malware : abbreviation of the two words malicious Software Victim : Is a person who has access to his pc without knowing it Introduction Trojans, worms, and rootkits
  • 4.
    Provocation When access tothe personal computer (PC) of the victim, the hacker can steal and use of data for purposes such of extortion
  • 5.
    It is atool ; the principle of its work on a Trojan in achieving hack and using malware to sharing For ease of participation Njrat: The encryption of the virus through a Dot-Net languages programming Such as C Sharp .
  • 6.
  • 7.
    Requirements : 1- Downloadone of the versions of the njrat ( last version 7.4) 2- You must have your own domain (DNS) 3- victim's device should be connected to the Internet How Njrat works
  • 8.
    (by sending aVirus) - creating a Server and combined with a video image or anything else. -send and wait ... until the victim open the file. -When you open this file begins to work and send all the information to the other device. -The hacking … started. Are several ways hacker Send virus Orby IPAddress How Njrat works
  • 9.
  • 10.
    Features of njrat 3-Use the victim more than one way 2- Bring the victim device Information Device name / IP / Operating system version/country etc. 1- Full control of creating the virus 4- The server is small in size (24kb)
  • 11.
  • 12.
  • 13.
    Characteristics 1- Full controlof the files Upload file - delete a file - Download file - Rename the file etc. 2- operations Controlling cmd , add or remove programming , shutdown , play games etc. 3-spying Using the camera and microphone. 4-Conversation with the victim by voice or chatting.
  • 14.
    HOW TO PROTECTYOUR DEVICE PC must be protected by anti-virus program/Anti-malware Don’t accept any program or file an anonymous sourcebuying the original copies of the programs (Licensees) Don't use this software for unethical purposes
  • 15.
    References (https://en.wikipedia.org/wiki/Malware (Wikipedia, 2015)) (http://www.dev-point.com/vb/t458139.html,2015) (http://www.pcworld.com/article/2048261/understanding-tech-language-the-difference-between-malware-and-a-virus.html(pc-world2015))