Backtracing a RAT (Find a Hacker’s IP)
Requirements:
Wireshark [DOWNLOAD]
Sandboxie [DOWNLOAD]
First open Wireshark.
Click on Wireless Network Connection or Local Area Connection (Depending on the Connection type) and click Start.

Go to the filter and type “dns”. (use “smtp” and “ftp” for keyloggers)

Now you are seeing all connections using dns.
Now we are going to use sandboxie.
Sandboxie is a useful tool used to analyse files before completely letting them in your system. You can run any Virus in sandboxie and once you terminate all processes your computer is not infected. So it would not add to startup or anything.
Anyways, go to the RAT, right click and run in sandboxie.

Now you are infected, but the virus is trapped in sandboxie, you can easily kill the process. Please do note that the hacker can still controle your computer and view your personal information. Make sure you CLEAR ALL SAVED PASSWORDS in ALL your web browsers, RATs can easily grab your saved passwords on web browsers FROM SANDBOXIE.
Head back to Wireshark, on the right side you should now see a connection between your computer and the RAT’s no-ip dns.
Try to look for something like blahblah.no-ip.biz or blablah.zaptop.org. Here is a list of free No-ip domains which is what you should look for:
This is what it will look like:

Once you got the RAT server’s no-ip, open cmd and type:
Code:
ping enternoipnamehere.no-ip.biz

Hit enter and you will get the IP.
Author : xVulnerable
backtracing hacker, hacker tracing tutorial, how to get hackers ip, how to trace a hacker, how to trace a rat, how to trace hacker, how to trace hackers, how to trace hackers ip, how to trace rat, how to trace rat hacker, how to trace rat hackers ip, trace hacker ip, trace hacker location, trace hacker tutorial, tracing hacker, tracing hackers tutorial, wireshark rat ip tracing
← Macro Office Exploit
Pandora RAT 2.2 →
Leave a Comment
Add Comment
Name*
Email*
VIP Membership

Categories
News
VIP
Software
Tutorial
Security
Hacking
Controller
Cracking
Reverse Engineering
Mobile App
Spamming
Others
Useful links
VMPlayerSandboxieMissing filesKali Linux

We are here to serve you with high quality products and a good support.
Latest Posts
Escrow acceptedNo Distribute ScannersClient Area issue resolvedInstaCopy 1.5 – Copy entire Instagram profilesScreen Lock BuilderBinder & More
Payment Methods






Tags
fud crypter exploit botnet fud exploit silent exploit 0day exploit buy crypter bulletproof vps
Copyright 2014-2017 by Rekings. All Rights Reserved.
Privacy PolicyTerms Of ServiceFAQAffiliateContac
Comments
Post a Comment