﻿1
00:00:00,890 --> 00:00:06,320
‫Another powerful and easy to use tool is the fat rat, it's an exploitation tool that can help you to

2
00:00:06,320 --> 00:00:11,850
‫generate back doors and post exploitation attacks like browser attack Delal Files.

3
00:00:12,470 --> 00:00:18,950
‫This tool compiles malware with popular payloads, and then the compiled malware can be executed on

4
00:00:18,950 --> 00:00:22,820
‫Windows, Linux, Mac, OS, X and Android.

5
00:00:24,470 --> 00:00:29,300
‫Because it's not embedded into Calli, we need to install the fat rat first.

6
00:00:31,010 --> 00:00:35,030
‫At the beginning, we need to download the files of the fat rat framework.

7
00:00:36,230 --> 00:00:39,200
‫Clone the git account of the fat rat for this purpose.

8
00:00:40,180 --> 00:00:45,520
‫Wait until the cloning is finished, that may take some time, according to your Internet connection

9
00:00:45,520 --> 00:00:45,880
‫speed.

10
00:00:50,280 --> 00:00:52,950
‫The files are cloned under the fat rat folder.

11
00:00:54,130 --> 00:00:57,010
‫Go into the folder using the CD command.

12
00:00:58,280 --> 00:01:06,790
‫Look at the files using is let's run the fat rat shell script, oops, permission denied.

13
00:01:07,580 --> 00:01:09,170
‫Look at the file permissions.

14
00:01:09,770 --> 00:01:16,480
‫Probably it does not have the executive privileges, drew no execute right at all.

15
00:01:17,460 --> 00:01:23,610
‫Make the fat rat file executable using S.H. mode, that's Modie Linux Command.

16
00:01:25,240 --> 00:01:27,880
‫Now it has execute rights for all.

17
00:01:29,250 --> 00:01:31,290
‫Now we can run the fat rat script.

18
00:01:33,090 --> 00:01:41,220
‫It says we have to run setup dot S.H. script first, we're not going to run set up S.H. script all the

19
00:01:41,220 --> 00:01:44,700
‫time, it's just needed to run before the first usage.

20
00:01:45,840 --> 00:01:54,030
‫Like the fat rat file set up p y file does not have execute privileges, make it executable as well

21
00:01:54,810 --> 00:01:55,680
‫and run.

22
00:01:57,340 --> 00:02:03,250
‫It installs all the dependent tools necessary for the fat rat tool and upgrades the tools.

23
00:02:03,670 --> 00:02:08,310
‫There are a lot of tools that the setup script checks if they are installed and up to date.

24
00:02:08,770 --> 00:02:09,790
‫So be patient.

25
00:02:10,150 --> 00:02:11,290
‫Don't be anxious.

26
00:03:06,570 --> 00:03:08,700
‫Installing tool dependencies.

27
00:03:10,300 --> 00:03:11,890
‫Updating Kelly Ripa.

28
00:03:20,280 --> 00:03:23,130
‫Installing MingW32 compiler.

29
00:03:25,040 --> 00:03:31,160
‫At the end of the set up, it asks if you want a shortcut for fat rat in the system, that means the

30
00:03:31,160 --> 00:03:33,620
‫set up will add fat rat into the path.

31
00:03:33,860 --> 00:03:36,380
‫So you'll be able to run it from anywhere in your terminal.

32
00:03:38,160 --> 00:03:40,380
‫Now we can run the fat rat script.

33
00:03:41,920 --> 00:03:44,830
‫It checks all the dependencies at the beginning.

34
00:03:52,870 --> 00:03:59,530
‫It warns us not to upload the output files to virus total, we already know the reason.

35
00:04:00,560 --> 00:04:03,600
‫It shares the files with the antivirus companies.

36
00:04:04,160 --> 00:04:11,090
‫Instead, you can upload it to know distribute dotcom to test if it can bypass the antivirus systems.

37
00:04:12,080 --> 00:04:14,240
‫Now we're ready to use the fat rat.

