1 00:00:00,880 --> 00:00:03,850 ‫Another powerful and easy to use tool is the fat rat. 2 00:00:04,240 --> 00:00:09,910 ‫It's an exploitation tool that can help you to generate back doors and post exploitation attacks like 3 00:00:10,060 --> 00:00:11,830 ‫browser attack deal files. 4 00:00:12,430 --> 00:00:18,910 ‫This tool compiles malware with popular payloads, and then the compiled malware can be executed on 5 00:00:18,910 --> 00:00:22,780 ‫Windows, Linux, Mac, OS X and Android. 6 00:00:24,440 --> 00:00:26,560 ‫Because it's not embedded into Calley. 7 00:00:26,810 --> 00:00:29,240 ‫We need to install the fat rat first. 8 00:00:30,980 --> 00:00:35,000 ‫At the beginning, we need to download the files of the fat rat framework. 9 00:00:36,240 --> 00:00:39,150 ‫Clone, the get a account of the fat rat for this purpose. 10 00:00:40,130 --> 00:00:45,470 ‫Wait, until the cloning is finished, that may take some time, according to your internet connection 11 00:00:45,470 --> 00:00:45,830 ‫speed. 12 00:00:50,250 --> 00:00:52,920 ‫The files are cloned under the Fat Cat folder. 13 00:00:54,080 --> 00:00:56,960 ‫Go into the folder using the CD command. 14 00:00:58,260 --> 00:01:03,750 ‫Look at the files using is let's run the fat rat shell script. 15 00:01:04,440 --> 00:01:04,920 ‫Oops. 16 00:01:05,400 --> 00:01:06,720 ‫Permission denied. 17 00:01:07,560 --> 00:01:09,120 ‫Look at the file permissions. 18 00:01:09,750 --> 00:01:12,840 ‫Probably it does not have the executive privileges. 19 00:01:13,620 --> 00:01:13,990 ‫True. 20 00:01:14,700 --> 00:01:15,060 ‫No. 21 00:01:15,060 --> 00:01:16,440 ‫Execute right at all. 22 00:01:17,420 --> 00:01:22,220 ‫Make the fat rat file executable using C-H mode that C mode. 23 00:01:22,640 --> 00:01:23,570 ‫Linux Command. 24 00:01:25,210 --> 00:01:27,850 ‫Now it has execute rights for all. 25 00:01:29,200 --> 00:01:31,210 ‫Now we can run the fat rat script. 26 00:01:33,040 --> 00:01:37,060 ‫It says we have to run set up Dot S.H. script first. 27 00:01:38,020 --> 00:01:41,680 ‫We're not going to run set up as each script all the time. 28 00:01:41,920 --> 00:01:44,650 ‫It's just needed to run before the first usage. 29 00:01:45,810 --> 00:01:53,610 ‫Like the fat rat file set up, Dot P y file does not have execute privileges, make it executable as 30 00:01:53,610 --> 00:01:55,650 ‫well and run. 31 00:01:57,340 --> 00:02:03,190 ‫It installs all the dependent tools necessary for the fat rat tool and upgrades the tools. 32 00:02:03,670 --> 00:02:08,290 ‫There are a lot of tools that the set up script checks if they are installed and up to date. 33 00:02:08,770 --> 00:02:09,730 ‫So be patient. 34 00:02:10,120 --> 00:02:11,230 ‫Don't be anxious. 35 00:03:06,540 --> 00:03:08,670 ‫Installing tool dependencies. 36 00:03:10,280 --> 00:03:11,840 ‫Updating Cally Repo. 37 00:03:20,260 --> 00:03:23,080 ‫Installing M.W. 32 compiler. 38 00:03:25,050 --> 00:03:29,760 ‫At the end of the setup, it asks if you want a shortcut for fat rat in the system. 39 00:03:30,360 --> 00:03:35,820 ‫That means the setup will add fat rat into the path, so you'll be able to run it from anywhere in your 40 00:03:35,820 --> 00:03:36,330 ‫terminal. 41 00:03:38,130 --> 00:03:40,290 ‫Now we can run the fat rat script. 42 00:03:41,890 --> 00:03:44,800 ‫It checks all the dependencies at the beginning. 43 00:03:52,900 --> 00:03:56,860 ‫It warns us not to upload the output files to VirusTotal. 44 00:03:57,730 --> 00:03:59,470 ‫We already know the reason. 45 00:04:00,550 --> 00:04:03,550 ‫It shares the files with the antivirus companies. 46 00:04:04,120 --> 00:04:11,020 ‫Instead, you can upload it to know distribute icon to test if it can bypass the antivirus systems. 47 00:04:12,040 --> 00:04:14,200 ‫Now we're ready to use the fat rat.