1.
What does "RAT" mean?
Correct Answer
B. Remote Administration Tool
Explanation
Other possibilities:
-Remote Access Tool
-Remote Access trojan
2.
Which RAT does NOT exist?
Correct Answer
C. ShockRAT
Explanation
ShockRAT does not exist. Ratty, LuminosityLInk and Imminent Monitor are real
3.
Tick all safe and working DNS Services (for blackhat ratting)
Correct Answer(s)
B. Freenom
D. Armada's DNS Service
Explanation
Never use No-IP or DuckDNS! FishDNS is not working anymore.
4.
DarkComet is a outdated RAT
Correct Answer
A. True
Explanation
DarkComet is outdated and can be used against you
5.
VPN's which keeps no logs
Correct Answer(s)
A. Ra4wVPN
B. 143VPN
C. CrypticVPN
Explanation
Softether is not safe. You share your IP with other Members of the VPN
6.
What are crypters?
Correct Answer
C. They are legal encryption tools to protect your files
Explanation
Crypters are legal encryption tools that are used to protect files. These tools are designed to encrypt data and make it unreadable to unauthorized users. By using a crypter, individuals can ensure that their files and sensitive information remain secure and inaccessible to anyone who does not have the necessary decryption key. Crypters are commonly used by individuals and organizations to safeguard their data from potential threats and maintain the confidentiality of their files.
7.
Do I need to port-forward that I can use a RAT (get connection from client binary)
Correct Answer
B. Yes, but it insn't needed if I want to get a connection from someone in my LAN
Explanation
If you take the localhost IP on the client builder the client binary will connect to you if the machine is in your LAN
8.
Using RATs as malware is totaly okay! Its 100% legal to infect PCs without permissions from the owner.
Correct Answer
B. No. Its illegal. Its better if I don't do that
Explanation
The correct answer is "No. Its illegal. Its better if I don't do that." This answer correctly states that using Remote Access Trojans (RATs) as malware is illegal and not recommended. Infecting PCs without the owner's permission is a violation of privacy and can lead to legal consequences. It is important to respect the rights and privacy of others, and refrain from engaging in illegal activities.
9.
Okay, your done!Did you like it? Please leave me a review (Yes/No)
Correct Answer
Yes, No
Explanation
For questions, suggestions etc. contact "DeepExploit" on HF.
Thank you for your participation
10.
The crypter "static crypt v3" has 3 injection types:.net 2 (MSBuild) , .net 4 (MSBuild) and ...
Correct Answer
B. Native (It self)
Explanation
The given correct answer is "Native (It self)". This means that the crypter "static crypt v3" uses its own native injection type. This suggests that the crypter has its own built-in method of injecting code into a target system without relying on any external frameworks or technologies like .net 2, .net 4, or .net 6 (MSBuild).
11.
There are 2 detection types which paid crypters should able to bypass.
Correct Answer(s)
B. Runtime detection
E. Scanntime detection
Explanation
Paid crypters are software tools used to encrypt malware and make it undetectable by antivirus software. In order to be effective, paid crypters should be able to bypass certain detection types. The question mentions two detection types that paid crypters should be able to bypass: runtime detection and scanntime detection. Runtime detection refers to the ability of antivirus software to detect malware while it is running or executing on a system. Scanntime detection, on the other hand, refers to the ability of antivirus software to detect malware during a system scan or when files are being scanned. Therefore, the correct answer is runtime detection and scanntime detection.
12.
Select all AV-Scann websites which do not distribute
Correct Answer(s)
A. MajixScanner
D. PoisonScanner
E. Viruscheckmate
Explanation
The given answer includes the websites MajixScanner, PoisonScanner, and Viruscheckmate. These websites are selected because they do not distribute the AV-Scan software.