Sunday, April 6, 2025
HomeBackdoorJSRAT - Secret Command & Control Channel Backdoor to Control Victims Machine...

JSRAT – Secret Command & Control Channel Backdoor to Control Victims Machine Using JavaScript

Published on

SIEM as a Service

Follow Us on Google News

JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication between the server and the target hosts.

Here I have used Kali Linux(Attacker Machine) and Victim Machine (Windows 10)

Installation & Setup :-

  • Download the JSRAT tool Here
  • Download and give appropriate permission to execute the script.Above figure shows the complete installation

Starting the web server:

  • Run and execute the command: python JSRAT.py -i <kali Linux or Attacker Ip> -p 8080
  • JSRAT provides the list of URLs.Copy the Client command here it is http://192.168.172.143:8080/wtf

VICTIM MACHINE:-

  • Open this Client command URL with Victim browser
  • To gain the shell payload generated by URL should be opened with CMD.
  • Once the command is executed a shell will be obtained.

BACK TO ATTACKERS MACHINE WITH BACKDOOR:-

  • Here we go !!! We have connected with the Victim machine
  • Let us try some windows command: Ipconfig
JSRAT
  • The above Figure shows executing the command calc opens up the Windows calculator.JSRat can also provide upload, Read and Download files. Happy Hacking !!!

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Latest articles

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Google Launches Open-Source OSV-Scanner for Detecting Security Vulnerabilities

Google has announced the launch of OSV-Scanner V2, an open-source tool designed to enhance vulnerability...

New Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild

A newly discovered vulnerability in Microsoft Windows, identified by ClearSky Cyber Security, is reportedly...

Fortinet FortiOS & FortiProxy Zero-Day Exploited to Hijack Firewall & Gain Super Admin Access

Cybersecurity firm Fortinet has issued an urgent warning regarding a newly discovered zero-day authentication...