I recently started experimenting with Darkcomet rat and some of it's features really appealed to me. Nevertheless I do not succeed in getting the stub or payload created with Darkcomet past the AV of my other computer. Is there anyone who could help me with this problem?
Forum Thread: How to Crypt or Bypass Av with Darkcomet Stub?
- Hot
- Active
-
Forum Thread: When My Kali Linux Finishes Installing (It Is Ready to Boot), and When I Try to Boot It All I Get Is a Black Screen. 8 Replies
6 days ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
2 wks ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 2 Replies
1 mo ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
1 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
2 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
3 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
3 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
3 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
3 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
3 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
3 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
4 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
4 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
5 mo ago -
Forum Thread: How to Run and Install Kali Linux on a Chromebook 18 Replies
5 mo ago -
Forum Thread: How to Find Admin Panel Page of a Website? 13 Replies
6 mo ago -
Forum Thread: can i run kali lenux in windows 10 without reboting my computer 4 Replies
6 mo ago -
Forum Thread: How to Hack School Website 11 Replies
6 mo ago -
Forum Thread: Make a Phishing Page for Harvesting Credentials Yourself 8 Replies
6 mo ago -
Forum Thread: Creating an Completely Undetectable Executable in Under 15 Minutes! 38 Replies
8 mo ago
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
How To: Use LinEnum to Identify Potential Privilege Escalation Vectors
-
How To: Dox Anyone
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Exploit EternalBlue on Windows Server with Metasploit
-
How To: Find Vulnerable Webcams Across the Globe Using Shodan
-
Hack Like a Pro: How to Find Directories in Websites Using DirBuster
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
Tutorial: Create Wordlists with Crunch
-
How To: Write an XSS Cookie Stealer in JavaScript to Steal Passwords
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Crack Password-Protected Microsoft Office Files, Including Word Docs & Excel Spreadsheets
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
BT Recon: How to Snoop on Bluetooth Devices Using Kali Linux
-
How To: Spy on Traffic from a Smartphone with Wireshark
-
How To: Use Ettercap to Intercept Passwords with ARP Spoofing
-
How To: Use SpiderFoot for OSINT Gathering
-
How to Hack Wi-Fi: Cracking WPA2-PSK Passwords Using Aircrack-Ng
12 Responses
Do you know how crypting technology works? Do you know how AV software works? If your answer is no to both or either of these questions then of course you you cannot solve this problem. Have you tried experimenting with free options such as Veil Evasion?
I am completely new in crypting but I'd like to start learning it. However I do not know which crypting software I should use to crypt my existing payload. When I tried using Veil-Evasion it provides me with a new payload that can get behind security walls but I do not understand how to do this with an existing payload.
How well do you know C and/or the WINAPI?
I am learning C++ but Veil-Evasion works only for python right and the stub that DarkComet creates isn't.
Here is the source code to Veil Evasion's C WINAPI method. Take your time to look over the code, research the functions and understand the bigger picture. Once you know how everything works, apply your own methods.
GitHub
Thanks alot
let me break it down for you. DarkComet is one of the most well known RATs and therefore 90% of all the AVs you find will know its algorithm and therefore it is useless unless you change the payload, or code your own Crypter (which is for very experienced programmers) my best advice is to find a different rat.
the reason why you need to code your own crypter is because every free crypter you see will be useless, and I guarantee that it will. Because when a software is free, it means anyone in the world can download it, which means white hat hackers and anyone who wants to protect people can download the malware study it and find its algorithm. Even the paid ones are hard to find working because some are willing to pay a hacker for his crypter and they then find the algorithm and again patch it. So again, build your own or go with a different rat.
well after you make it,you can encode it,but you need some skills.and by the way darkcomet must have virus in it,because
2.i don't see any official site of that to download.
Darkcomet is a virus
i know it's a r.a.t but the program that you use to create that virus may have virus too,u can never know for sure
True, I posted this weeks ago so I am now fully convinced about using metasploit instead
Share Your Thoughts