SlideShare a Scribd company logo
Ultimate Guide to Setup DarkComet RAT
with NoIP
What is Darkcomet?
DarkComet RAT is a free and popular Remote Administration Tool. This software is
an efficient type of software, especially created to remote control any Microsoft
Windows machine.
It is famous for being one of if not the most stable and most complete RAT’s
available. Just like VNC and other similar types of software, DarkComet gives you
the ability to connect to and control your systems, wherever you are.
You can keep a close eye on your computers to supervise the online activity of your
employees or children. Furthermore DatkComer RAT can be used to monitor your
system, remotely assist your clients or family members to recover lost data or repair a
computer.
The main functions of DarkComet RAT are System Monitor (Process, Registry,
Startup, DNS Manager, etc.), File manager (which is even more complete than an
FTP-server), Surveillance (Micro-capture, Keylogger, Screen capture, Webcam
capture, etc.), Network functions (Scan for local computers, monitor network activity,
WIFI viewer, download files from web, etc.) and much more.
Both the DarkComet RAT Controller and its Controlled module can be detected by
some antivirus-programs but that constitutes a false positive due of the abilities of the
program in the system. The package doesn’t and will not ever contain any viruses or
other types of malware. Its why DarkComet RAT got such a very good reputation.

HackingSpace.org
Requirement before Setup
1. Latest Darkcomet RAT Legacy v5.4.1. Link to download will be provided at the
end of this post.
2. A No-IP account (Click to visit site)
What is No-IP?
No-ip is a DNS redirectional service. You may have used it before if you managed a
RSPS. For RSPS, it was easier than remembering a specific IP like 83.111.911.83 for
an example. Rather RSPSserver.zapto.org or something. For your RAT, it simply
covers your ass if your IP changes. The problem with direct linking to your IP is if
your IP changes and you’re NOT using No-ip, you lose every single one of your
slaves. This is where No-ip comes to rescue, making sure that as long as you used it,
slaves are redirected to your real IP and you keep all of your slaves. It’s why it’s so
crucial.

HackingSpace.org
How to create and setup No-IP account?
Go to http://www.no-ip.com/ and hover over “Sign in” and click “Sign up for an
account”.

HackingSpace.org
Now go to your email and click on the confirmation link.
Go Download the client app from this link or on their website.
Install it in your OS. After the installation you will see this windows popup. Type in
your username and password.

HackingSpace.org
After you’ve successfully login, you should see something like this.

Do not freak out, click on EDIT HOSTS. Login to your noip.com type in your
username and password and click on Manage Host

HackingSpace.org
Now back to your DUC or NoIp app. Click on Edit Host

HackingSpace.org
Check on the host that you’ve just created and click on Save.

If you’ve done it correctly, you should see something like this.

That’s it. All that you need to do with it after is keep it running, and it will perform its
duty of redirecting your slaves to your real IP. Enjoy.

HackingSpace.org
How to Set up Darkcomet?
This is where I see a lot of things go wrong, this is where the false information gets
spread, propagated, and A LOT of things can go wrong. Let’s begin. Start by
extracting and opening Darkcomet. If you recently downloaded it from the link I
mentioned earlier, you have to extract it from the .ZIP before you can use it.
What the @#$% happened to Darkcomet?!
If your Darkcomet.exe does not have a blue asteroid icon, or just doesn’t show at all,
your Antivirus has likely quarantined and/or corrupted Darkcomet. Turn it off. If you
don’t have an AV and it still does this, Windows Defender is likely the cause.
How to disable windows defender?
Click the Start Button -> (Enter into the Search Box) -> Windows Defender > Open -> Tools -> Options -> Administrator -> Use this program? -> Uncheck > Apply -> You’re awesome! Once Darkcomet is open, an EULA should come up,
just hit the checkbox, “Do not again display the EULA” and press Accept after 10
seconds. After Darkcomet is open (and it is your first time), another box should come
up giving you general tips about Darkcomet. If you wish to read through it, that’s fine.
Just hit “Do not show on restart” and then “Fine” after you are done.

Once it is open, go to the Socket/net Tab at the top middle-right and right click in the
general area, and click “Add port to listen.”
HackingSpace.org
This box should come up.

What should I put for the port?
The port, like the No-ip, does not matter. The only two restrictions are it HAS to be a
number between 1-65535 and another program must not be using it. Other than that,
go free. 1337 or 1604 or 101 are all popular, it’s really your own preference, though.
Once you click Listen, a Windows Firewall diologue box should pop up (If you have
it enabled) and if it does, just click “Allow access”. This is Darkcomet trying to add
itself as an exception to the firewall, this is fine.

What is upnp.exe in %temp% for?
Darkcodersc (Coder of Darkcomet) added Universal Plug and Play to Darkcomet.
This is not a RAT or a keylogger, it is simply trying to portforward for you
automatically. I’d say this is a good thing, especially since most routers support it and
it would eliminate the hassle for you trying to portforward. Once it is added, navigate
to Canyouseeme.org and check if it’s open. If UpNP worked successfully, your port
should be open and working.

HackingSpace.org
Hurray! Good for you. If it’s not, do the following.
1. Completely Disable Windows Firewall/Any other Firewalls you may have. (These
often block the ping from canyouseeme.org)
2. Completely disable your antivirus (Some block the connection as well.)
3. Make sure Darkcomet is open AND listening to the port. (I cannot stress this
enough, it will be a false negative, your port MUST be listened to before it can
show as open.)
If it still not open, I will have a mini tutorial soon for portforwarding near the bottom
of the post. Alright. My port is open, Darkcomet is open, what do I do now? Make a
stub.

HackingSpace.org
There are two different options for making a stub: Minimalist and Expert. I will sum
up the options here:
 Minimalist: Little options, very hard to screw up but still possible.
 Expert: A plethora of options, any screw up will leave you with a corrupted server
after crypting.


Settings for Minimalist:

Stub ID is a variable which can set to your liking, though it could be used for
organization of your slaves. IE: From Youtube, From Ewhoring, From Torrents, From
X Crypter, etc. IP/DNS: No-ip address. Port: The port you chose earlier in the thread.
1604 is the default port. Generate the stub as “Normal”. Why? It has a chance to
corrupt if you crypt a small server. (As it’s compressed with UPX)
Why did you turn off startup?
It ensures the maximum amount of compatibility for your crypter. It is much more
stable to use your crypter startup. In my own experiences, it has also corrupted the
stub after it was crypted, though not all the time. It’s essential to leave it off for this
HackingSpace.org
reason. Settings for Expert: Expert only has one advantage in my opinion to
Minimalist, otherwise it’s the exact same. Mutex. Mutex ensures that only one copy of
that specific stub runs on one slave. It is useful for making sure that your slave count
is accurate, and to avoid duplicates.

For Advanced Users

(Note that the Client Password is not required, if you don’t want to use it, that’s fine.
Just uncheck it, but I will be covering it as it does increase security for you by a good
amount.) Click “Network Settings,” the settings for such can be found here:

HackingSpace.org
(Once again, 1604 was the default port for Darkcomet. Obviously replace it with the
one you are using.) Skip “Module Startup”, “Install Message”, and “Module
Shield”, “Keylogger”, “Hosts File”, “Add Plugins”, “File Binder”, “Choose
Icon”, skip down to “Stub Finalization”.

Why??
This is to ensure the maximum amount of compatability for the crypter you are using.
If you want any options on any of those pages, it should be enabled on your crypter
only. (Especially startup.) Now, make sure to build it according to my settings
following:

HackingSpace.org
Click Build the stub, give a name to it and hit enter. Congrats, you are ready to test
your stub. What about the password we set earlier? Oh right, let’s cover that!
Navigate to Client Settings.

Enter the password you entered earlier in Expert build (If you used it. If you did not,
do not bother with this step.)

HackingSpace.org
Now, we are ready to test it.
Still doesn’t work no matter what I do
This is due to your router not supporting NAT Loopback, most do not. Therefore, you
testing it on yourself will give you a false negative in terms of whether or not your
server works.
How do I test my stub, then?
Use Anubis. (Uncrypted servers ONLY, Anubis distributes samples + Crypted ones
do not work.) You may also be able to test it if some very helpful person were to give
you a test install, otherwise running it on one of their slaves to see if your server
works. (I do not do this as I have little slaves.)

HackingSpace.org
Mini Portforwarding Tutorial
I understand that most routers do not have the exact same options, but the majority of
them support port forwarding in the exact same way. It may be called as a different
name, “Virtual Server” or “Port Opening” or “Pin holes” or just “Port Forwarding”.
These are the exact same thing. Navigate to the start Menu -> Enter into search
box -> Cmd -> Hit Enter.
When that black box comes up, type “Ipconfig” and hit Enter. The following text
should come up.

Find the “Ipv4 address” and copy it down. This is the IP you’ll be forwarding too.
There are multiple Ipv4 addresses, which one do I know is right?
There is two ways. It is the first one to display this information (It’s not at the bottom,
it’s at the very top after you type the command.)
The second way is if it has “default gateway”. This is a surefire way to tell that it is
correct.

HackingSpace.org
Copy the “Default Gateway” into the address bar of your browser. Then hit enter. If
your router has a password, it should prompt you for a password.A quick google
search of your router model + default password will probably reveal it.
That’s on you. Once you’re at your router page, it can be tricky to locate the “Port
forwarding” option. It is, in most cases, located under the Security
section/Firewall/Advanced Settings/Advanced Setup.
It’s different for every router, so there is no way to encompass them all. Mine was
under Advanced Setup.

Yours should look similar to mine (but not in GUI, but in options.)

HackingSpace.org
Starting Port: The port you’re going to use on your RAT.
Ending port: The port you’re going to use on your RAT. (Note that Starting port and
Ending port should be the same number. As it only requires one port to RAT for
Darkcomet.)
Protocol: TCP (It’s what Darkcomet uses.)
If your router only has “Both” and you want to be doubly sure, go ahead.
It doesn’t matter, as long as it encompasses TCP at one point or another. IP address:
That IPv4 address from CMD, enter that in that box. Since the other settings are
marked as optional by my router, the only thing you need to do now is hit the
equivalent of “Apply” on your router.
It may be save settings, it may be apply settings, whatever. Your router may restart to
apply them, and it may not. It depends on what you have.
Darkcomet is open (and listening to the port). Windows Firewall is off. Antivirus
is off. I followed the mini portforwarding guide. My port is still not open. What
do?
In this, there is only one more option on your router that could be of assistance. In my
case DynDNS: (Dynamic DNS) This will allow ANY traffic from any port on your

HackingSpace.org
router. This is a major security concern. If you wish to allow it, find “Dynamic DNS”
on your router, enable it and enter your IPv4 address and hit Apply.

That’s All! I hope you enjoyed the tutorial. If I did ANYTHING wrong at all, I gave
the false info, I had a spelling mistake, my image was not relevant. PLEASE leave the
comment or shoot me an email. I really love to hear your feedback on this post.
Download Links:
Darkcomet v5.4.1 Legacy
Mirror Links:
Mirror Link 1
Mirror Link 2
Mirror Link 3

HackingSpace.org

More Related Content

What's hot

Metasploit framework in Network Security
Metasploit framework in Network SecurityMetasploit framework in Network Security
Metasploit framework in Network Security
Ashok Reddy Medikonda
 
Pentesting Using Burp Suite
Pentesting Using Burp SuitePentesting Using Burp Suite
Pentesting Using Burp Suite
jasonhaddix
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
amit kumar
 
Pentest with Metasploit
Pentest with MetasploitPentest with Metasploit
Pentest with Metasploit
M.Syarifudin, ST, OSCP, OSWP
 
Sql, Sql Injection ve Sqlmap Kullanımı
Sql, Sql Injection ve Sqlmap KullanımıSql, Sql Injection ve Sqlmap Kullanımı
Sql, Sql Injection ve Sqlmap Kullanımı
BGA Cyber Security
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploitdevilback
 
ARコンテンツ作成勉強会:C#ではじめようOpenCV(カラートラッキング編)
ARコンテンツ作成勉強会:C#ではじめようOpenCV(カラートラッキング編)ARコンテンツ作成勉強会:C#ではじめようOpenCV(カラートラッキング編)
ARコンテンツ作成勉強会:C#ではじめようOpenCV(カラートラッキング編)
Takashi Yoshinaga
 
Linux privilege escalation
Linux privilege escalationLinux privilege escalation
Linux privilege escalation
SongchaiDuangpan
 
Darkweb
DarkwebDarkweb
Jhon the ripper
Jhon the ripper Jhon the ripper
Jhon the ripper
Merve Karabudağ
 
Burp suite
Burp suiteBurp suite
Burp suite
SOURABH DESHMUKH
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
Niyas Nazar
 
Aktif Dizin (Active Directory) Güvenlik Testleri - I: Bilgi Toplama
Aktif Dizin (Active Directory) Güvenlik Testleri - I:  Bilgi ToplamaAktif Dizin (Active Directory) Güvenlik Testleri - I:  Bilgi Toplama
Aktif Dizin (Active Directory) Güvenlik Testleri - I: Bilgi Toplama
BGA Cyber Security
 
password cracking using John the ripper, hashcat, Cain&abel
password cracking using John the ripper, hashcat, Cain&abelpassword cracking using John the ripper, hashcat, Cain&abel
password cracking using John the ripper, hashcat, Cain&abel
Shweta Sharma
 
Ceh v5 module 10 session hijacking
Ceh v5 module 10 session hijackingCeh v5 module 10 session hijacking
Ceh v5 module 10 session hijacking
Vi Tính Hoàng Nam
 
Selinux
SelinuxSelinux
Selinux
Ankit Raj
 
Brute Force Attack
Brute Force AttackBrute Force Attack
Brute Force Attack
Ahmad karawash
 
Snort
SnortSnort
VERİTABANI SIZMA TESTLERİ
VERİTABANI SIZMA TESTLERİVERİTABANI SIZMA TESTLERİ
VERİTABANI SIZMA TESTLERİ
BGA Cyber Security
 

What's hot (20)

Metasploit framework in Network Security
Metasploit framework in Network SecurityMetasploit framework in Network Security
Metasploit framework in Network Security
 
Pentesting Using Burp Suite
Pentesting Using Burp SuitePentesting Using Burp Suite
Pentesting Using Burp Suite
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
 
Pentest with Metasploit
Pentest with MetasploitPentest with Metasploit
Pentest with Metasploit
 
Sql, Sql Injection ve Sqlmap Kullanımı
Sql, Sql Injection ve Sqlmap KullanımıSql, Sql Injection ve Sqlmap Kullanımı
Sql, Sql Injection ve Sqlmap Kullanımı
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploit
 
ARコンテンツ作成勉強会:C#ではじめようOpenCV(カラートラッキング編)
ARコンテンツ作成勉強会:C#ではじめようOpenCV(カラートラッキング編)ARコンテンツ作成勉強会:C#ではじめようOpenCV(カラートラッキング編)
ARコンテンツ作成勉強会:C#ではじめようOpenCV(カラートラッキング編)
 
Linux privilege escalation
Linux privilege escalationLinux privilege escalation
Linux privilege escalation
 
Darkweb
DarkwebDarkweb
Darkweb
 
Jhon the ripper
Jhon the ripper Jhon the ripper
Jhon the ripper
 
Burp suite
Burp suiteBurp suite
Burp suite
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
Aktif Dizin (Active Directory) Güvenlik Testleri - I: Bilgi Toplama
Aktif Dizin (Active Directory) Güvenlik Testleri - I:  Bilgi ToplamaAktif Dizin (Active Directory) Güvenlik Testleri - I:  Bilgi Toplama
Aktif Dizin (Active Directory) Güvenlik Testleri - I: Bilgi Toplama
 
password cracking using John the ripper, hashcat, Cain&abel
password cracking using John the ripper, hashcat, Cain&abelpassword cracking using John the ripper, hashcat, Cain&abel
password cracking using John the ripper, hashcat, Cain&abel
 
Ceh v5 module 10 session hijacking
Ceh v5 module 10 session hijackingCeh v5 module 10 session hijacking
Ceh v5 module 10 session hijacking
 
Selinux
SelinuxSelinux
Selinux
 
Brute Force Attack
Brute Force AttackBrute Force Attack
Brute Force Attack
 
Snort
SnortSnort
Snort
 
Hacking_SharePoint_FINAL
Hacking_SharePoint_FINALHacking_SharePoint_FINAL
Hacking_SharePoint_FINAL
 
VERİTABANI SIZMA TESTLERİ
VERİTABANI SIZMA TESTLERİVERİTABANI SIZMA TESTLERİ
VERİTABANI SIZMA TESTLERİ
 

Viewers also liked

Cmmaao pmi-design blueprint v1b
Cmmaao pmi-design blueprint v1bCmmaao pmi-design blueprint v1b
Cmmaao pmi-design blueprint v1bmission_vishvas
 
Pmi pmbok-resume template-10
Pmi pmbok-resume template-10Pmi pmbok-resume template-10
Pmi pmbok-resume template-10mission_vishvas
 
Cmmaao communication-plan-pmi-pmp
Cmmaao communication-plan-pmi-pmpCmmaao communication-plan-pmi-pmp
Cmmaao communication-plan-pmi-pmpmission_vishvas
 
Resume template 18-cmmaao-pmi
Resume template 18-cmmaao-pmiResume template 18-cmmaao-pmi
Resume template 18-cmmaao-pmimission_vishvas
 
Vishvas resume template-7
Vishvas resume template-7Vishvas resume template-7
Vishvas resume template-7mission_vishvas
 
Present perfect
Present perfectPresent perfect
Present perfect
Mhammd Nour Hajjat
 
Pmi pmp-resume template-12
Pmi pmp-resume template-12Pmi pmp-resume template-12
Pmi pmp-resume template-12mission_vishvas
 
Cmmaao pmi-resume template-9
Cmmaao pmi-resume template-9Cmmaao pmi-resume template-9
Cmmaao pmi-resume template-9mission_vishvas
 
Cmmaao pmi-resume template-19
Cmmaao pmi-resume template-19Cmmaao pmi-resume template-19
Cmmaao pmi-resume template-19mission_vishvas
 
Cmmaao pmi-lessons learned v1b
Cmmaao pmi-lessons learned v1bCmmaao pmi-lessons learned v1b
Cmmaao pmi-lessons learned v1bmission_vishvas
 
Vishvas resume template-15
Vishvas resume template-15Vishvas resume template-15
Vishvas resume template-15mission_vishvas
 
High common factor (HCF)
High common factor (HCF)High common factor (HCF)
High common factor (HCF)
Likkle Bonita
 
Pmi pmbok-resume template-19
Pmi pmbok-resume template-19Pmi pmbok-resume template-19
Pmi pmbok-resume template-19mission_vishvas
 
Pmi pmbok-resume template-9
Pmi pmbok-resume template-9Pmi pmbok-resume template-9
Pmi pmbok-resume template-9mission_vishvas
 
Vishvas resume template-3
Vishvas resume template-3Vishvas resume template-3
Vishvas resume template-3mission_vishvas
 

Viewers also liked (20)

Resume template 15
Resume template 15Resume template 15
Resume template 15
 
Cmmaao pmi-design blueprint v1b
Cmmaao pmi-design blueprint v1bCmmaao pmi-design blueprint v1b
Cmmaao pmi-design blueprint v1b
 
Resume template 1
Resume template 1Resume template 1
Resume template 1
 
Pmi pmbok-resume template-10
Pmi pmbok-resume template-10Pmi pmbok-resume template-10
Pmi pmbok-resume template-10
 
Cmmaao communication-plan-pmi-pmp
Cmmaao communication-plan-pmi-pmpCmmaao communication-plan-pmi-pmp
Cmmaao communication-plan-pmi-pmp
 
Resume template 18-cmmaao-pmi
Resume template 18-cmmaao-pmiResume template 18-cmmaao-pmi
Resume template 18-cmmaao-pmi
 
Vishvas resume template-7
Vishvas resume template-7Vishvas resume template-7
Vishvas resume template-7
 
Resume template 11
Resume template 11Resume template 11
Resume template 11
 
Present perfect
Present perfectPresent perfect
Present perfect
 
Pmi pmp-resume template-12
Pmi pmp-resume template-12Pmi pmp-resume template-12
Pmi pmp-resume template-12
 
Animation
AnimationAnimation
Animation
 
Cmmaao pmi-resume template-9
Cmmaao pmi-resume template-9Cmmaao pmi-resume template-9
Cmmaao pmi-resume template-9
 
Cmmaao pmi-resume template-19
Cmmaao pmi-resume template-19Cmmaao pmi-resume template-19
Cmmaao pmi-resume template-19
 
Cmmaao pmi-lessons learned v1b
Cmmaao pmi-lessons learned v1bCmmaao pmi-lessons learned v1b
Cmmaao pmi-lessons learned v1b
 
Vishvas resume template-15
Vishvas resume template-15Vishvas resume template-15
Vishvas resume template-15
 
Cmmaao pmi
Cmmaao pmiCmmaao pmi
Cmmaao pmi
 
High common factor (HCF)
High common factor (HCF)High common factor (HCF)
High common factor (HCF)
 
Pmi pmbok-resume template-19
Pmi pmbok-resume template-19Pmi pmbok-resume template-19
Pmi pmbok-resume template-19
 
Pmi pmbok-resume template-9
Pmi pmbok-resume template-9Pmi pmbok-resume template-9
Pmi pmbok-resume template-9
 
Vishvas resume template-3
Vishvas resume template-3Vishvas resume template-3
Vishvas resume template-3
 

Similar to Step by Step on How to Setup DarkComet

Rob "Mubix" Fuller: Attacker Ghost Stories
Rob "Mubix" Fuller: Attacker Ghost StoriesRob "Mubix" Fuller: Attacker Ghost Stories
Rob "Mubix" Fuller: Attacker Ghost Stories
Area41
 
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)Rob Fuller
 
44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus
44CON 2014 - Switches Get Stitches,  Eireann Leverett & Matt Erasmus44CON 2014 - Switches Get Stitches,  Eireann Leverett & Matt Erasmus
44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus
44CON
 
Backtrack Manual Part9
Backtrack Manual Part9Backtrack Manual Part9
Backtrack Manual Part9
Nutan Kumar Panda
 
Hack the book Mini
Hack the book MiniHack the book Mini
Hack the book Mini
Khairi Aiman
 
Old Linux Security Talk
Old Linux Security TalkOld Linux Security Talk
Old Linux Security Talk
Tanner Lovelace
 
Security & ethical hacking p2
Security & ethical hacking p2Security & ethical hacking p2
Security & ethical hacking p2
ratnalajaggu
 
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting ClassThe Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
Rob Fuller
 
Project: Intrusion Detection
Project: Intrusion DetectionProject: Intrusion Detection
Project: Intrusion Detection
Jay Schulman
 
Thou shalt not
Thou shalt notThou shalt not
Thou shalt not
taftosterone
 
#Data vault, irc warez (ty 4 moving x)
#Data vault, irc warez (ty 4 moving x)#Data vault, irc warez (ty 4 moving x)
#Data vault, irc warez (ty 4 moving x)Vishal Gurujuwada
 
Securing Rails
Securing RailsSecuring Rails
Securing Rails
Alex Payne
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for Everyone
Nikhil Mittal
 
Test & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automatedTest & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automated
Zoltan Balazs
 
Hackers The Anarchists Of Our Time
Hackers The Anarchists Of Our TimeHackers The Anarchists Of Our Time
Hackers The Anarchists Of Our TimeUtkarsh Sengar
 
Bettercap
BettercapBettercap
Teach Your Sites to Call for Help: Automated Problem Reporting for Online Ser...
Teach Your Sites to Call for Help: Automated Problem Reporting for Online Ser...Teach Your Sites to Call for Help: Automated Problem Reporting for Online Ser...
Teach Your Sites to Call for Help: Automated Problem Reporting for Online Ser...
Caktus Group
 
Joxean Koret - Database Security Paradise [Rooted CON 2011]
Joxean Koret - Database Security Paradise [Rooted CON 2011]Joxean Koret - Database Security Paradise [Rooted CON 2011]
Joxean Koret - Database Security Paradise [Rooted CON 2011]RootedCON
 
Information gathering
Information gatheringInformation gathering
Information gathering
MoTechInc
 
bettercap.pdf
bettercap.pdfbettercap.pdf
bettercap.pdf
shehbaz15
 

Similar to Step by Step on How to Setup DarkComet (20)

Rob "Mubix" Fuller: Attacker Ghost Stories
Rob "Mubix" Fuller: Attacker Ghost StoriesRob "Mubix" Fuller: Attacker Ghost Stories
Rob "Mubix" Fuller: Attacker Ghost Stories
 
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
 
44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus
44CON 2014 - Switches Get Stitches,  Eireann Leverett & Matt Erasmus44CON 2014 - Switches Get Stitches,  Eireann Leverett & Matt Erasmus
44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus
 
Backtrack Manual Part9
Backtrack Manual Part9Backtrack Manual Part9
Backtrack Manual Part9
 
Hack the book Mini
Hack the book MiniHack the book Mini
Hack the book Mini
 
Old Linux Security Talk
Old Linux Security TalkOld Linux Security Talk
Old Linux Security Talk
 
Security & ethical hacking p2
Security & ethical hacking p2Security & ethical hacking p2
Security & ethical hacking p2
 
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting ClassThe Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
 
Project: Intrusion Detection
Project: Intrusion DetectionProject: Intrusion Detection
Project: Intrusion Detection
 
Thou shalt not
Thou shalt notThou shalt not
Thou shalt not
 
#Data vault, irc warez (ty 4 moving x)
#Data vault, irc warez (ty 4 moving x)#Data vault, irc warez (ty 4 moving x)
#Data vault, irc warez (ty 4 moving x)
 
Securing Rails
Securing RailsSecuring Rails
Securing Rails
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for Everyone
 
Test & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automatedTest & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automated
 
Hackers The Anarchists Of Our Time
Hackers The Anarchists Of Our TimeHackers The Anarchists Of Our Time
Hackers The Anarchists Of Our Time
 
Bettercap
BettercapBettercap
Bettercap
 
Teach Your Sites to Call for Help: Automated Problem Reporting for Online Ser...
Teach Your Sites to Call for Help: Automated Problem Reporting for Online Ser...Teach Your Sites to Call for Help: Automated Problem Reporting for Online Ser...
Teach Your Sites to Call for Help: Automated Problem Reporting for Online Ser...
 
Joxean Koret - Database Security Paradise [Rooted CON 2011]
Joxean Koret - Database Security Paradise [Rooted CON 2011]Joxean Koret - Database Security Paradise [Rooted CON 2011]
Joxean Koret - Database Security Paradise [Rooted CON 2011]
 
Information gathering
Information gatheringInformation gathering
Information gathering
 
bettercap.pdf
bettercap.pdfbettercap.pdf
bettercap.pdf
 

Recently uploaded

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 

Recently uploaded (20)

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 

Step by Step on How to Setup DarkComet

  • 1. Ultimate Guide to Setup DarkComet RAT with NoIP What is Darkcomet? DarkComet RAT is a free and popular Remote Administration Tool. This software is an efficient type of software, especially created to remote control any Microsoft Windows machine. It is famous for being one of if not the most stable and most complete RAT’s available. Just like VNC and other similar types of software, DarkComet gives you the ability to connect to and control your systems, wherever you are. You can keep a close eye on your computers to supervise the online activity of your employees or children. Furthermore DatkComer RAT can be used to monitor your system, remotely assist your clients or family members to recover lost data or repair a computer. The main functions of DarkComet RAT are System Monitor (Process, Registry, Startup, DNS Manager, etc.), File manager (which is even more complete than an FTP-server), Surveillance (Micro-capture, Keylogger, Screen capture, Webcam capture, etc.), Network functions (Scan for local computers, monitor network activity, WIFI viewer, download files from web, etc.) and much more. Both the DarkComet RAT Controller and its Controlled module can be detected by some antivirus-programs but that constitutes a false positive due of the abilities of the program in the system. The package doesn’t and will not ever contain any viruses or other types of malware. Its why DarkComet RAT got such a very good reputation. HackingSpace.org
  • 2. Requirement before Setup 1. Latest Darkcomet RAT Legacy v5.4.1. Link to download will be provided at the end of this post. 2. A No-IP account (Click to visit site) What is No-IP? No-ip is a DNS redirectional service. You may have used it before if you managed a RSPS. For RSPS, it was easier than remembering a specific IP like 83.111.911.83 for an example. Rather RSPSserver.zapto.org or something. For your RAT, it simply covers your ass if your IP changes. The problem with direct linking to your IP is if your IP changes and you’re NOT using No-ip, you lose every single one of your slaves. This is where No-ip comes to rescue, making sure that as long as you used it, slaves are redirected to your real IP and you keep all of your slaves. It’s why it’s so crucial. HackingSpace.org
  • 3. How to create and setup No-IP account? Go to http://www.no-ip.com/ and hover over “Sign in” and click “Sign up for an account”. HackingSpace.org
  • 4. Now go to your email and click on the confirmation link. Go Download the client app from this link or on their website. Install it in your OS. After the installation you will see this windows popup. Type in your username and password. HackingSpace.org
  • 5. After you’ve successfully login, you should see something like this. Do not freak out, click on EDIT HOSTS. Login to your noip.com type in your username and password and click on Manage Host HackingSpace.org
  • 6. Now back to your DUC or NoIp app. Click on Edit Host HackingSpace.org
  • 7. Check on the host that you’ve just created and click on Save. If you’ve done it correctly, you should see something like this. That’s it. All that you need to do with it after is keep it running, and it will perform its duty of redirecting your slaves to your real IP. Enjoy. HackingSpace.org
  • 8. How to Set up Darkcomet? This is where I see a lot of things go wrong, this is where the false information gets spread, propagated, and A LOT of things can go wrong. Let’s begin. Start by extracting and opening Darkcomet. If you recently downloaded it from the link I mentioned earlier, you have to extract it from the .ZIP before you can use it. What the @#$% happened to Darkcomet?! If your Darkcomet.exe does not have a blue asteroid icon, or just doesn’t show at all, your Antivirus has likely quarantined and/or corrupted Darkcomet. Turn it off. If you don’t have an AV and it still does this, Windows Defender is likely the cause. How to disable windows defender? Click the Start Button -> (Enter into the Search Box) -> Windows Defender > Open -> Tools -> Options -> Administrator -> Use this program? -> Uncheck > Apply -> You’re awesome! Once Darkcomet is open, an EULA should come up, just hit the checkbox, “Do not again display the EULA” and press Accept after 10 seconds. After Darkcomet is open (and it is your first time), another box should come up giving you general tips about Darkcomet. If you wish to read through it, that’s fine. Just hit “Do not show on restart” and then “Fine” after you are done. Once it is open, go to the Socket/net Tab at the top middle-right and right click in the general area, and click “Add port to listen.” HackingSpace.org
  • 9. This box should come up. What should I put for the port? The port, like the No-ip, does not matter. The only two restrictions are it HAS to be a number between 1-65535 and another program must not be using it. Other than that, go free. 1337 or 1604 or 101 are all popular, it’s really your own preference, though. Once you click Listen, a Windows Firewall diologue box should pop up (If you have it enabled) and if it does, just click “Allow access”. This is Darkcomet trying to add itself as an exception to the firewall, this is fine. What is upnp.exe in %temp% for? Darkcodersc (Coder of Darkcomet) added Universal Plug and Play to Darkcomet. This is not a RAT or a keylogger, it is simply trying to portforward for you automatically. I’d say this is a good thing, especially since most routers support it and it would eliminate the hassle for you trying to portforward. Once it is added, navigate to Canyouseeme.org and check if it’s open. If UpNP worked successfully, your port should be open and working. HackingSpace.org
  • 10. Hurray! Good for you. If it’s not, do the following. 1. Completely Disable Windows Firewall/Any other Firewalls you may have. (These often block the ping from canyouseeme.org) 2. Completely disable your antivirus (Some block the connection as well.) 3. Make sure Darkcomet is open AND listening to the port. (I cannot stress this enough, it will be a false negative, your port MUST be listened to before it can show as open.) If it still not open, I will have a mini tutorial soon for portforwarding near the bottom of the post. Alright. My port is open, Darkcomet is open, what do I do now? Make a stub. HackingSpace.org
  • 11. There are two different options for making a stub: Minimalist and Expert. I will sum up the options here:  Minimalist: Little options, very hard to screw up but still possible.  Expert: A plethora of options, any screw up will leave you with a corrupted server after crypting.  Settings for Minimalist: Stub ID is a variable which can set to your liking, though it could be used for organization of your slaves. IE: From Youtube, From Ewhoring, From Torrents, From X Crypter, etc. IP/DNS: No-ip address. Port: The port you chose earlier in the thread. 1604 is the default port. Generate the stub as “Normal”. Why? It has a chance to corrupt if you crypt a small server. (As it’s compressed with UPX) Why did you turn off startup? It ensures the maximum amount of compatibility for your crypter. It is much more stable to use your crypter startup. In my own experiences, it has also corrupted the stub after it was crypted, though not all the time. It’s essential to leave it off for this HackingSpace.org
  • 12. reason. Settings for Expert: Expert only has one advantage in my opinion to Minimalist, otherwise it’s the exact same. Mutex. Mutex ensures that only one copy of that specific stub runs on one slave. It is useful for making sure that your slave count is accurate, and to avoid duplicates. For Advanced Users (Note that the Client Password is not required, if you don’t want to use it, that’s fine. Just uncheck it, but I will be covering it as it does increase security for you by a good amount.) Click “Network Settings,” the settings for such can be found here: HackingSpace.org
  • 13. (Once again, 1604 was the default port for Darkcomet. Obviously replace it with the one you are using.) Skip “Module Startup”, “Install Message”, and “Module Shield”, “Keylogger”, “Hosts File”, “Add Plugins”, “File Binder”, “Choose Icon”, skip down to “Stub Finalization”. Why?? This is to ensure the maximum amount of compatability for the crypter you are using. If you want any options on any of those pages, it should be enabled on your crypter only. (Especially startup.) Now, make sure to build it according to my settings following: HackingSpace.org
  • 14. Click Build the stub, give a name to it and hit enter. Congrats, you are ready to test your stub. What about the password we set earlier? Oh right, let’s cover that! Navigate to Client Settings. Enter the password you entered earlier in Expert build (If you used it. If you did not, do not bother with this step.) HackingSpace.org
  • 15. Now, we are ready to test it. Still doesn’t work no matter what I do This is due to your router not supporting NAT Loopback, most do not. Therefore, you testing it on yourself will give you a false negative in terms of whether or not your server works. How do I test my stub, then? Use Anubis. (Uncrypted servers ONLY, Anubis distributes samples + Crypted ones do not work.) You may also be able to test it if some very helpful person were to give you a test install, otherwise running it on one of their slaves to see if your server works. (I do not do this as I have little slaves.) HackingSpace.org
  • 16. Mini Portforwarding Tutorial I understand that most routers do not have the exact same options, but the majority of them support port forwarding in the exact same way. It may be called as a different name, “Virtual Server” or “Port Opening” or “Pin holes” or just “Port Forwarding”. These are the exact same thing. Navigate to the start Menu -> Enter into search box -> Cmd -> Hit Enter. When that black box comes up, type “Ipconfig” and hit Enter. The following text should come up. Find the “Ipv4 address” and copy it down. This is the IP you’ll be forwarding too. There are multiple Ipv4 addresses, which one do I know is right? There is two ways. It is the first one to display this information (It’s not at the bottom, it’s at the very top after you type the command.) The second way is if it has “default gateway”. This is a surefire way to tell that it is correct. HackingSpace.org
  • 17. Copy the “Default Gateway” into the address bar of your browser. Then hit enter. If your router has a password, it should prompt you for a password.A quick google search of your router model + default password will probably reveal it. That’s on you. Once you’re at your router page, it can be tricky to locate the “Port forwarding” option. It is, in most cases, located under the Security section/Firewall/Advanced Settings/Advanced Setup. It’s different for every router, so there is no way to encompass them all. Mine was under Advanced Setup. Yours should look similar to mine (but not in GUI, but in options.) HackingSpace.org
  • 18. Starting Port: The port you’re going to use on your RAT. Ending port: The port you’re going to use on your RAT. (Note that Starting port and Ending port should be the same number. As it only requires one port to RAT for Darkcomet.) Protocol: TCP (It’s what Darkcomet uses.) If your router only has “Both” and you want to be doubly sure, go ahead. It doesn’t matter, as long as it encompasses TCP at one point or another. IP address: That IPv4 address from CMD, enter that in that box. Since the other settings are marked as optional by my router, the only thing you need to do now is hit the equivalent of “Apply” on your router. It may be save settings, it may be apply settings, whatever. Your router may restart to apply them, and it may not. It depends on what you have. Darkcomet is open (and listening to the port). Windows Firewall is off. Antivirus is off. I followed the mini portforwarding guide. My port is still not open. What do? In this, there is only one more option on your router that could be of assistance. In my case DynDNS: (Dynamic DNS) This will allow ANY traffic from any port on your HackingSpace.org
  • 19. router. This is a major security concern. If you wish to allow it, find “Dynamic DNS” on your router, enable it and enter your IPv4 address and hit Apply. That’s All! I hope you enjoyed the tutorial. If I did ANYTHING wrong at all, I gave the false info, I had a spelling mistake, my image was not relevant. PLEASE leave the comment or shoot me an email. I really love to hear your feedback on this post. Download Links: Darkcomet v5.4.1 Legacy Mirror Links: Mirror Link 1 Mirror Link 2 Mirror Link 3 HackingSpace.org