April 2017
Intermediate to advanced
350 pages
8h 35m
English
This chapter focused on creating RATs and using msfvenom. It explained what a RAT is and how hackers use it. We demonstrated the process of making a Remote Access Trojan. In the end, we gained an understanding of how RATs are used by hackers.
In Chapter 5, Veil Framework, we will be working with the Veil Framework.
Read now
Unlock full access