In this chapter, we will focus on creating Remote Access Trojans (RATs) using msfvenom. This chapter will explain what a RAT is and how hackers use it. We will go over basic terms and the command-line syntax. We will also demonstrate the entire process of making a Remote Access Trojan and how to deliver it to a victim machine. Methods of defense against this type of attack will also be covered in this chapter. After reading this chapter, you will have a fundamental understanding of how RATs are used by hackers and how best to stop them.




















































