Abstract: One of the most powerful Trojans used by the attacker is the Remote Access Trojan. Remote Access Trojan (RAT) is one of the most terrible security measures that organizations face today. It is an outstanding example of how attackers can misuse remote access technology. Given that Trojan, it is a non-computer program that seeks to simplify the back door to access a computer program management. In this malware, there are two common methods of delivery. This is used for malicious purposes. This Trojan confirms the secret method of data collection by making it inaccessible. Now, these Trojans have the ability to perform various tasks that harm the victim. Trojan Access Trojans can also be viewed as authentic applications when downloaded, RAT also loads them. Enables the attacker to be able to control the target device. Remote access is often used for remote access to corporate network servers, workstations, while providing ease of use, and has also created security issues in auditing. In this paper, a representative-based safety research program is provided and can monitor the performance and maintenance, security of the system, the performance and maintenance of employees using the system through a web page, increasing the flexibility of deployment and ease of use.

Keywords: Remote administration, Network Security, Client-Server, payload Builder


PDF | DOI: 10.17148/IARJSET.2021.8542

Open chat