ProRat

ProRat

ProRat is a Microsoft Windows based backdoor trojan horse, more commonly known as a RAT (Remote Administration Tool). As with other trojan horses it uses a client and server. ProRat opens a port on the computer which allows the client to perform numerous operations on the server (the machine being controlled). ProRat is available in a free version, and a paid version. In the free version, ProRat cannot connect to users over wide area networks (WANs), only over LANs (Local Area Networks). ProRat is known for its server to be almost impossible to remove without up-to-date antivirus software.

Features

ProRat allows many malicious actions on the victim's machine. Some of its abilities include:

* Logging keystrokes
* Stealing passwords
* Full control over files
* Drive formatting
* Open/close CD tray
* Hide taskbar, desktop, and start button
* Take screenshots
* View system information
* View webcam
* Download and run files

Infection Method

ProRat has a server creator with features that allow it to be undetected by antivirus and firewall software, and also allow it to stealthily run in the background. The software only runs completely (including rootkit) in Windows XP/2000. Such features include killing security software, removing and disabling system restore points, and displaying a fake error message to mislead the victim.

External links

* [http://www.prorat.net/ Official Prorat website]
* [http://www.symantec.com/avcenter/venc/data/backdoor.prorat.html Symantec Security Response]
* [http://www.addaxsoft.com/soft/anti_prorat.php Remove Prorat - Anti Prorat]
* [http://anti-prorat.blogspot.com/ How-to Remove Prorat using the free tool Anti Prorat]

ee also

* Trojan
* Backdoor


Wikimedia Foundation. 2010.

Игры ⚽ Нужна курсовая?

Look at other dictionaries:

  • Prorat — [réf. souhaitée] ProRAT fait partie de la famille des RAT (Remote Administration Tool), c est un cheval de Troie qui peut permettre un accès non autorisé et le contrôle d un ordinateur à partir d un emplacement réseau distant. La famille des …   Wikipédia en Français

  • proratable — prorātˈable adjective • • • Main Entry: ↑prorate …   Useful english dictionary

  • Remote administration tool — A Remote administration tool is used to remotely connect and manage a single or multiple computers with a variety of tools, such as: * Screen/camera capture or control * File management (download/upload/execute/etc.) * Shell control (usually… …   Wikipedia

  • Timeline of computer viruses and worms — Contents 1 1960–1969 1.1 1966 2 1970–1979 2.1 1 …   Wikipedia

  • Script kiddie — In hacker culture, a script kiddie (as opposed to speed kiddie Fact|date=August 2008), occasionally script bunny , skiddie , script kitty , script running juvenile (SRJ) , or similar) is a derogatory term used for an inexperienced malicious… …   Wikipedia

  • List of trojan horses — *AytonScape *Bandook *Beast Trojan *Bifrost * Downloader.Zlob *Bohmini.A *Generic8.LDI *Generic9.ABWM *Generic9.ZYW *Graybird (Backdoor Graybird, Backdoor Graybird P) *Insurrection *Koobface (attacks through social networking message links)… …   Wikipedia

  • Remote Administration Tool — Dieser Artikel oder Abschnitt bedarf einer Überarbeitung. Näheres ist auf der Diskussionsseite angegeben. Hilf mit, ihn zu verbessern, und entferne anschließend diese Markierung. Ein Remote Administration Tool (RAT) wird benutzt, um sich von… …   Deutsch Wikipedia

  • Bihrat — Développé par un dénommé GenOcyD en 2007, BiHRat fait partie de la famille des RAT (Remote Administration Tool), c est un cheval de Troie qui peut permettre un accès non autorisé et le contrôle d un ordinateur à partir d un emplacement réseau… …   Wikipédia en Français

  • Список портов TCP и UDP — Эта статья содержит незавершённый перевод с английского языка. Вы можете помочь проекту, переведя её до конца. В данной статье приведён список портов TCP и UDP, ко …   Википедия

  • Скрипт-кидди — (англ. Script kiddie)  в хакерской культуре унизительный термин, используемый для описания тех, кто пользуется скриптами или программами, разработанными другими, для атаки компьютерных систем и сетей, не понимая механизма их действия.… …   Википедия

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”