Dear my FBI Agent, I am sincerely sorry for watching this whole entire video, but the reason I am doing so because I am curious. And I am sure this is why you are seeing everything I do as well, Sorry Sincerely, Kenny Don't take this seriously, just a joke.
Since you've showcased a few RATs recently, maybe you should do a video on how to detect malware/RATs on your own system. Maybe something such as Glasswire to manually view outgoing/incoming connections or an automated alternative. I think it would be good to see both sides of the same coin. Keep up the good work!
@@kingtunip6386 Hope you are aware of something called a crypter. It obfuscate the code of the rat making it almost impossible to be detected by anti virus atleast for some time.
@@lewisolise12 "git" is the tool used. -"The usage of "u" as a replacement for "you" is a sad thing of the modern generation"- stfu Sam, that was a cringe thing to say
found a solution go to release on the download page and download the source code of the latest version and that work ! your'e welcome !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
6:14 I got stuck here because I followed all of the steps and confirmed that they were done correctly but once I reached this point I see that most of the files are the same but I am missing the build debug and release files. Any solutions or suggestions?
Hey, the GitHub repository doesn't have the Files you showed in the video, so would you please update it, 'cause I can't really figure out how I setup the RAT.
honestly I am not sure how smart it is to wildly promote use of rats,because they can be easily malociously used. either way,you'd need to compile quesar first,server and client,ofc ur not gonna be using a closed source rat,because it may just be a client on your own computer. Download Visual Studios,update liberaries,and select the release option for the build.
When I execute the client on the host PC it works perfectly, but when I copy the client to my other PC it just doesn't connect. The host PC is a laptop with Windows 10 and the "victim" is a desktop PC with Windows 11. My laptop uses WiFi and the other one doesn't. I was using adguard's DNS but I tried disabling it and nothing. Please someone help!
@@oh_tassos It's a stupid word if you ask me. It makes the word double negative and makes you think it's the opposite of "regardless" (which honestly it should be). Then again, this isn't the only stupid thing English does. Took me a while to get that "all but" means "almost" and it's not the same as saying "everything but". Although it can also mean that too, which is even more stupid.
Remote Administration Tool or Remote Access Trojan? I think term choice should reflect usage. I like AndroRAT. Also, the reply just before mine is correct, it's pronounced kway-zar.... and nice tut.
It is called a R.A.T. - Remote Administration Tool, now, if you want to put it into a trojan's payload, you can, but it itself is not one... As it does not pretend to be something else, just hide itself...
over00lord Unknown true but all you have to do is bind it to an innocuous app ... it's like the soldier and the innocuous app is like the horse... so when you put the soldier in the horse the soldier and horse together as a whole become the Trojan... so you are correct, but if using the soldier this was makes him a Trojan Horse than my linguistic convention it's how you use your soldiers that decides whether you call them Trojans or just solders... so I feel I'm not wrong. And if you want to say that the soldier is never truly one with the horse and can serve your kingdom with or without the horse than sure you wouldn't be wrong and if you proceeded to make the point that thusly the soldier is still a soldier in or out of the horse you'd still be correct, but if you say that we should thusly always simply refer to him as a soldier and never a Trojan because the soldier is just a soldier in or out of the horse, and that the horse is just a wooden horse with or without a soldier in it than technically you'd not be wrong and thusly technically only the combination of the soldier and the horse together are the Trojan is true, but I'd argue that that constitutes usage and therefore usage of either the horse or the soldier as a Trojan should be called a Trojan while a horse all on his own should be called a horse and a soldier on his own should be called a soldier hence we'd be arguing the same point. So I stand by my statement, usage of such tools should dictate language. I do understand the need (even for black hats) to maintain the integrity of the legitimacy of the tools they use, because remote access (the cloud since way before the term 'cloud computing' lol) is a totally legitimate tool as is password integrity checkers and password secured systems analysis tools (password checkers) have a legitimate use as do all pen testing tools and browsers etc... and it's not just black and white hats it's a round table with black and white hats sitting opposite each other (usually) AND 50 shades of grey sitting between them on either side and all parties at the table have a vested interest in making sure that the legitimacy of these tools are maintained. So I do see a need to point out that a remote access tool is just a remote access tool if it's not employed as anything else... but you do understand that these tools are brought to the table by everyone sitting there right... some great security tools where made by hackers and some awesome hacking tools where made by security professionals, and some really equally useful tools where created by grey hats, and obviously hackers TEND to create tools that are more suitable for hacking while security professionals TEND to create tools that are more geared toward security uses, and grey hats TEND to be the ones to adapt the tools to fit the needs of the other side of the table than they where originally designed for... but every combination of possible events happens... as it happens quasar is a well rounded tool that the hackers tend to use more than the business professionals wanting to connect to their work devices from home... just saying. Sorry but that tool currently has a bit of a darker edge to it. Not that you couldn't use it to remotely administer your own system, and not that many don't, just that many more use it to perform remote administration on systems that are not their own.
Kyle Weeb that's what I'm saying... the only difference between a remote administration tool and a remote access trojan is usage... how you use is is the difference. But unused, it's the same thing.
I know im supper late on this video but i can make a build because it says could not locate "client.bin"file. It should be in the same directory as Quasar... what should i do and also you skipped a part and said i have it all set up what did we miss as far as that goes?
I have been searching how to do this for a long time and I finally found a one that is easy to understand, Thank you so much. Keep up the good work! I will be supporting you!
@Crazy Paradox I dont know how to do either of those, but from what I've seen, you need the 2015 community edition? I have the regular one, and there is no 'Open project' option, only 'open file' and Open folder'.
@Crazy Paradox First, are we talking about Visual Code Studio? You keep writing visualizer studio, so I'm not sure if you're talking about as different thing than Visual Code Studio. Second, if you are talking about Visual Code Studio, then I'm pretty new to it, so I don't know how to do any of those. I do know how to do some things with git bash, but not anything related to .sln files. Thx
I've done everything exactly like you have to every detail and it will not find the other PC even tried on my own labs here in my home and still will not connect any idea why not says listining and will not connect
Thank you for the tutorial. I am in the Security network and such this semester in school. I have been exploiting for a while and I love learning for educational purpose only. My classmates are amazed by simple DDoS attacks but I would like to bring more information.
guys goto whatismyipaddress.com/ it'll show u your publick ip and to canyouseeme.org/ (here change 80 to ur port and if it's sucess u can send it to other people but if it's not sucess u should portforward
That is hardware encoded, the lights on a webcam are I/O related, and were put in place to notify the user that the webcam is on( for safety and accessibility), so no, that is a hardware I/O related issue.
(Anyone With The Visual Studios Config) The Default Instillation Is Set To "Debug" But If Your Wanting Release Please Follow The Steps Down Below 1 Open The Snl File With Visual Studios 2 Click The Top File In The Tab On The Right That Should Say "Solution 'QuasarRAT" (6 Projects) 3 Go Down To The Properties In That File And Click The Dropdown That Says "Debug" And Switch It To Release Any CPU 4 Run And Enjoy (Side Note: You Will Get A Certificate To Create But Other Than That Your Fine)
There is a problem, When I ran the file on my virtual machine, it wouldn't work unless I gave it administrator privileges but when I gave the rat file to my friend and ran it on his computer(With his permission) it wouldn't run even if admin privileges were given
Truly amazing! I️ love your RU-vid channel! My school gives no opportunity to teach us anything beyond PowerPoint 😂! so thanks for the time and effort that you put in to all of your videos!
kaiserzico As others have said, you can use a service which redirects to your IP, *BUT* if you want to use your actual IP, or if you just have a website pointing at a static IP that is not updated, then when your IP changes (if you have a Dynamic IP like most people), you will no longer be able to connect... :/
hey bro can you teach us how to send it to someone without him knowing or send a picture or sum and if he download it he get the rat and u can do whatever you want with his pc
Dear my FBI Agent, I am sincerely sorry for watching this whole entire video, but the reason I am doing so because I am curious. And I am sure this is why you are seeing everything I do as well, Sorry Sincerely, rxrt
How about a series where you perform and explain a full rat attack (all stages explained). It would be really cool to see a walk through of an entire attack. The reason I ask is because I have no idea of how to pull of some of the things needed to exploit Someone by rat.
@@HackerSploit did u ever get around to doing a RAT attack vid? I have been going through your videos and haven't noticed one. Would really appreciate one!
Heyy, very nice tutorial and very informative from the A to Z ;) Just one question, if you want to do it over the network, you need to port forward on the side of the server right?
BUT IT ALWAYS notify , example : i use file explorer and download something from client, A NOTIFICATION POPS UP AND SAYS QUASAR CLIENT STARTED UPLOAD FROM THE EXE FILE ITSELF WHICH WE BUILT
Hello HackerSploit I Want To Say My PC Is Works Nice And Am Thinking I Dont Have RATs But Some Times My PCs Mouse Just Clicking Auto For 5-10 Seconds How Do I Fix This Guys?
You run too fast over settings so you forget to explain something from the settings menu and I can not make it work .. it will not make that file justified by windows defender blocking it
BUT IT ALWAYS notify , example : i use file explorer and download something from client, A NOTIFICATION POPS UP AND SAYS QUASAR CLIENT STARTED UPLOAD FROM THE EXE FILE ITSELF WHICH WE BUILT
Depending on your AV, try whitelisting/excluding the folder you want to install Quasar to. On the target computer you would have to whitelist/exclude the target folder (where you put the client.exe). I won’t be providing the other method I know as it could be used for bad purposes.
Why is no one talking about him using MingW and him not saying how to download it???? I can't find the download site. Can you clone the files without the use of MingW??????
So i turned off my antivirus and i compiled the sln and when i turned it back on it said it found 2 viruses on my pc. And it deleted the .exe file and idk what else. How do I make it not do this? I dont want to add an exclusion because i am paraniod and i think that mabye one of the things i exclude is an actual virus.
Whatever this quasar is I woke up to it being installed onto my computer. It wasn't detected by my antivirus and within less than 5 minutes of it being installed my paypal account was accessed and it sent someone 50 euros as a give 3 times in a row before I called and had my credit card cancelled. And I put in a dispute with paypal and they are telling me it's a legit transaction that I sent to a loved one or a friend or some garbage. I am really upset and i've never had a virus like this. If I hadn't cancelled my card it would have stolen everything I had. This isn't something I see being talked about so maybe it's a new virus but it's very dangerous and could ruin some peoples lives cause paypal and your bank aren't going to back you up. It's wierd cause I was sleeping for at least 5 hours and nothing strange was going on and I woke up to the sound of a confirmation that quasar was installed on my computer by something. I wished I had enough time to screenshot everything. There was a strange folder in my downloads that wasn't supposed to be there and it was def part of the virus. Be careful guys and if anyone has anymore information about this please let me know.
I just got spiked on this with window defender but this is not Hackerspoits problem bc if you got the alerts and checked your defender you could see whats it is doing
Hy your video was great....But I am having a bit of problem ....Because when I hit "Build Client" it show me ........Could not locket "client.bin" file .It should be in the same directory as the Quasar....please help me on solving this problem..
when i write git clone github.com/quasar/Quasar.git it says git is not reconized as an internal or external command, Also how do i getb the big thing u pasted before pasting github.com/quasar/Quasar.git
wait so how do i put the client into the targets computer or does it transfer when it is found in the network, and does this detect macs as well or only windows?
there was a spyware or rat tool, you could send audios and screamers to the hacked person as well as see their files and screen, keystrokes and passwords. Can somebody help me find it ?