If you are not new to RATs, you should have heard the word DarkComet. Because DarkComet is such a great tool for hacking remote computers. It has several features that many RATs do not have. I have explained the basics of RATs and Setting up Extreme RAT in my previous articles. So before proceeding into this article, you must understand the basics of RATing. So please go through those articles first. You can read them from here.

In this article i am going to show you how we can hack remote computers using DARKCOMET RAT. Here, some steps are same as Extreme RAT tutorial . But i will repeat all the steps to avoid confusion. So lets move on.

Things you require


This is the RAT you are going to use. You can get it from HERE.

2) No-ip.biz  account

As our IP-Address is dynamic(in general), we need to make it static.

3) DUC client

We can automatically update our dynamic IP-Adress, by installing DUC client.

4) VPN (If you are behind a router)

We must enable our router to allow us to connect to a remote PC. So we need to port forward.
Instead of port forwarding we use a VPN(Virtual Private Network).
You can use Proxpn.


Step 1:

First you need to create an account in www.no-ip.com

Step 2:

After creating an account, login with your account and create a host. You can do this by just following the steps.

Goto this link, and login. Then follow the steps as shown in the picture.

Finally click “Create Host”.

Step 3: Setting up your server.

First install Dark-Comet RAT on your PC and run it. It opens a window as shown below.

Now click on the + button which is at left bottom corner as shown below.

 It opens a small window showing you the port number. Click on “listen” button.

Then it disappears, don’t click the “listen” button again. Now click on “edit server” button at the bottom of the window as shown in the figure. 

It opens a new window with huge amount of options. First lets move on to the main settings. You can set a password to use when listening connections. You can see the default password by checking “security password” and “show chars” in the fillowing picture.

Now we need to set up our “network settings”. Clearly follow the steps here. You need to give your domain name you got from no-ip.com
It looks like yourdomain.no-ip.biz

 We came to the funniest part of our RAT setup. Here you can choose your icon. DarkComet is providing us some beautiful icon. So that our victim can easily believe us. Just follow steps  shown in the figure. It is self explanatory.

You can bind your server file with a PDF or Image. So when the victim clicks it, it opens the PDF file and the victim will not be able to suspect you. You can follow the steps as shown in the figure.

Finally click on “Build Server” button. It creates a new server file in the same directory where your dark-comet files are stored.

You are done. your server file looks like this. 

Now give your server file to your vicyim by any means. When  he clicks the server file, he will be connected to your computer. 

Now you can do anything you want. You can see him with his web cam, downloading files and many more. Just move around the options and play with him. I put two screenshots of how it looks like when you get access to his computer.

Using RATs on remote systems without their permission is illegal. This article is for educational purpose only. Dont do anything illegal. I will not be held responsible for that.

Hope you enjoyed this article. If you have any doubts or suggestions, feel free to leave your comments. 
These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • Sphinn
  • del.icio.us
  • Facebook
  • Mixx
  • Google
  • Furl
  • Reddit
  • Spurl
  • StumbleUpon
  • Technorati

10 Responses to this post

  1. AnUsHa MaNne on 31 October 2011 09:00

    Awesome one!!! Really Liked it!!! Keep posting!!

  2. srinivas on 31 October 2011 09:47

    @ AnUsHa MaNne
    Thank you :)

  3. ManiKanTa on 1 November 2011 06:59

    Dude.... i think ua really workin hard even to edit the pics... v.guwork yar...........thnx

  4. JAVID on 5 November 2011 07:24

    how to activate keyloggers in this application

  5. Anonymous on 23 December 2011 16:37

    sa semble etre complexe tout cela.....
    je tente de le faire mais bon...

    si il y a ceux qui arrive dites nous

  6. srinivas on 24 December 2011 22:03

    please use english.. i cant understand

  7. prasanna on 22 February 2012 01:58

    is every time the victim need to open the virus file?
    can it be invoked automatically every time the system turned on?

  8. srinivas on 25 February 2012 08:24

    you will have an option add to start up..
    If u do so,, it will be automatically invoked with ur system startup

  9. Anonymous on 11 March 2012 13:34

    srinu bhayya me classes super...

  10. Anonymous on 22 May 2012 08:15

    keka seenu anna ....nenu neeku fan aipoya....keep posting

Leave a comment