Skip to document

Sahilpreet Singh - file

file
Course

Fundamentals of Computer and IT Laboratory (UGCA1906)

22 Documents
Students shared 22 documents in this course
Academic year: 2021/2022
Uploaded by:
Anonymous Student
This document has been uploaded by a student, just like you, who decided to remain anonymous.
I. K. Gujral Punjab Technical University

Comments

Please sign in or register to post comments.

Preview text

KingMaker RAT (Android) Malware

A PROJECT REPORT
Submitted by:

Sahilpreet Singh (2001149)

in partial fulfillment for the award of the degree

of

BACHELOR OF COMPUTER APPLICATIONS

BABA BANDA SINGH BAHADUR ENGINEERING COLLEGE FATEHGARH SAHIB PUNJAB (INDIA) - 140406

(AFFILIATED TO I.K. PUNJAB TECHNICAL UNIVERSITY, KAPURTHALA, PUNJAB (INDIA) April 2023

CANDIDATE’S DECLARATION

I hereby certify that the project entitled “KingMaker (RAT)” submitted by Sahilpreet Singh (2001149) in partial fulfillment of the requirement for the award of degree of the Bachelor of Computer Applications submitted in I. Gujral Punjab Technical University, Kapurthala at Baba Banda Singh Bahadur Engineering College, Fatehgarh Sahib is an authentic record of my own work carried out during a period from 6 Feb, 2023 to 4 May, 2023 under the guidance of Prof. Ramanpreet Kaur

The matter presented in this project has not formed the basis for the award of any other degree, diploma, fellowship or any other similar titles.

Signature of the Student

Place:

Date:

ABSTRACT

Abstract to be followed by

Marks to be filled by Guide Marks Obtained

Regularity

Self-Motivation and Determination Working within Team

Total

Signature of the Guide

ACKNOWLEDGEMENT

I express my sincere gratitude to the I. Gujral Punjab Technical University, Kapurthala for giving me the opportunity to work on the Major Project during my final year of Bachelor of Computer Applications is an important aspect in the field of engineering. I would like to thank Dr. Lakhvir Singh, Principal and Dr. Jatinder Singh, Head of Department, CSE at Baba Banda Singh Bahadur Engineering College, Fatehgarh Sahib for their kind support. I also owe my sincerest gratitude towards Prof Kaur for his/her valuable advice and healthy criticism throughout my project which helped me immensely to complete my work successfully. I would also like to thank everyone who has knowingly and unknowingly helped me throughout my work. Last but not least, a word of thanks for the authors of all those books and papers which I have consulted during my project work as well as for preparing the report.

1. Introduction

There are more than 2 billion Android devices active each month, any of which can be hacked with the use of a remote administration tool, more commonly known as a RAT. KIngMaker, one of these powerful tools, can help outsiders monitor a device's location, see SMS messages, take camera snapshots, and even record with the microphone without the user knowing.

Remote administration tools were first programs intended to provide technical support to remote computers by allowing an administrator to log in and control the device directly. However, hackers quickly saw the potential of these tools and started using them for more nefarious deeds. Today, advanced RATs are used to remotely access and control a wide variety of devices, but today we'll focus on one of the world's most popular — Android.

KingMaker is a new, up-and-coming, open-source Android RAT, currently in the beta stages of development, which uses a simple GUI interface. While Android RATs aren't a new thing, what makes this one stand out from the crowd is the simple and easy-to-understand graphical user interface. Additionally, KingMaker is multi-platform, available on Linux, Windows.

1 Problem Definition

Desktop Application Not Working Electron Package errors Client does not connect to the server

1 Project Overview/Specifications The RAT consists of two parts. The first is a server-side application based on Electron framework, in our case, just our desktop or laptop, but this could be scaled up to some degree if needed. This acts as a control panel which we use to create and connect to the RAT. The second part is client side, which is the infected Android application we'll use as a backdoor.

KIngMaker is a powerful open-source Android remote administration tool with which you can access informational data from another device. An attacker with KingMaker Download can access critical information like the current geographical location of the device which is being attacked. In advanced use it is used to hack the microphone, launch recordings, get camera snapshots as well as read personal messages on the device attacked.

Objectives This project we are implementing RAT (Remote Administration tool) for Android , which can obtain various types/formats of data from children's devices and send them to parents. It will capture all the data from Device. KingMaker is a simple Android RAT tool to build backdoor attacks like malware application Services attack.

In this project, we use Nodejs and Local Disk databases. It has Two modules

  1. Admin
  2. Client Application

Admin Module

Server side: desktop application based on electron framework (control panel)
Build APK:

At the top of the screen, select "APK Builder." The first thing to change is "Source IP." This needs to be the IP address of the computer you'll be sending and receiving commands from. For testing purposes, I'll just be using my local Wi-Fi network. However, if you wanted it to work outside of the local network, you would need to port-forward your computer to the internet and use your public IP address.

Proposed System

KingMaker RAT (Remote Administration Tool) is an open-source software that allows for remote control of a device. As a language model, I cannot propose a system for malicious purposes. However, I can provide you with information on the features and capabilities of KingMaker RAT.

1 Hardware Specification

Processor: Pentium-iv and above

RAM: 256 MB Hard Disk: 4

Floppy Disk: 1 MB CD Drive

Monitor-15” Color Monitor

1 Software Specification

OS : Windows, Linux

JRE or JDK- NodeJs

Port forwarding

Tunel

Software Features
JRE or JDK

JRE stands for Java Runtime Environment. It is the implementation of JVM (Java Virtual Machine) and it is specially designed to provide an environment to execute Java programs. It is also platform dependent like JDK. It consists of JVM, Java binaries, and other classes for the smooth execution of the program. It doesn’t contain any development tools like a compiler, debugger, etc. If we only want to execute a program, we just need to install JRE and not JDK, since there is no development or compilation of the code required.

JDK stands for Java Development Kit. It is a software development environment used to develop Java applications and applets. It is a platform-specific software i there are separate installers for Windows, Mac, and Unix systems. Java developers can use it on their Windows, macOS, Solaris, and Linux to code and run Java programs. It contains Java Runtime Environment(JRE) and other development tools like an interpreter, compiler, archiver, and a document generator. We can possibly install more than one JDK version on the same computer.

Nodejs

Node is a server-side platform built on Google Chrome's JavaScript Engine (V8 Engine). Node was developed by Ryan Dahl in 2009 and its latest version is v0.10. The definition of Node as supplied by its official documentation is as follows.

Node is a platform built on Chrome's JavaScript runtime for easily building fast and scalable network applications. Node uses an event-driven, non-blocking I/O model that makes it lightweight and efficient, perfect for data-intensive real-time applications that run across distributed devices.

Node is an open source, cross-platform runtime environment for developing server-side and networking applications. Node applications are written in JavaScript, and can be run within the Node runtime on OS X, Microsoft Windows, and Linux.

Node also provides a rich library of various JavaScript modules which simplifies the development of web applications using Node to a great extent.

Node = Runtime Environment + JavaScript Library
Features of Node

Following are some of the important features that make Node the first choice of software architects.

Asynchronous and Event Driven − All APIs of Node library are asynchronous, that is, non-blocking. It essentially means a Node based server never waits for an API to return data. The server moves to the next API after calling it and a notification mechanism of Events of Node helps the server to get a response from the previous API call.

Very Fast − Being built on Google Chrome's V8 JavaScript Engine, Node library is very fast in code execution.

Single Threaded but Highly Scalable − Node uses a single threaded model with event looping. Event mechanism helps the server to respond in a non-blocking way and makes the server highly scalable as opposed to traditional servers which create limited threads to handle requests. Node uses a single threaded program and the same program can provide service to a much larger number of requests than traditional servers like Apache HTTP Server.

No Buffering − Node applications never buffer any data. These applications simply output the data in chunks.

License − Node is released under the MIT license.

Feasibility Study

From a technical standpoint, KingMaker RAT is a feasible tool for attackers since it is easy to customize and modify to suit their specific needs. It is also designed to be stealthy and evade detection, making it a useful tool for performing various malicious activities on infected systems.

However, from an ethical and legal perspective, the use of KingMaker RAT is not feasible since it is a tool used for malicious purposes and can cause significant harm to individuals and organizations. It is illegal to use KingMaker RAT to gain unauthorized access to computer systems and steal sensitive data or launch further attacks.

3. System Analysis and Design

3 Requirement Specification

Hardware requirement This software requires following minimum hardware configuration:

✔ Processor: Pentium-iv and above ✔ RAM: 256 MB

✔ Hard Disk: 4 ✔ Floppy Disk: 1 MB

✔ CD Drive ✔ Monitor-15” Color Monitor

Software Requirement

✔ OS : Windows or Linux ✔ JRE or JDK-

✔ Nodejs ✔ Port Forwarding

✔ Tunel

3 Design Steps

Design Document The entire system is projected with a physical diagram which specifies the actual storage parameters that are physically necessary for any database to be stored on to the disk. The overall system's existential idea is derived from this diagram.

The relation upon the system is structured through a conceptual ER-Diagram, which not only specifics the existential entities but also the standard relations through which the system exists and the cardinalities that are necessary for the system state to continue.

The content level DFD is provided to have an idea of the functional inputs and outputs that are achieved through the system. The system depicts the input and output standards at the high level of the systems existence.

User Flow Chart

Testing Process

Testing is very vital for any system to be successfully implemented. The common view is that it is performed to prove that there are no errors in a program. Therefore the most useful and practical approach is with the explicit intention of finding errors. The system is tested experimentally to ensure that the software does not fail. The system is run according to its specifications and in the way the user accepts. Following testing practices are used. The system will process as normal input proration of test-sample data.

STRATEGIES FOR TESTING

Unit Testing Each and every module was intensively tested to check for errors and defects. All possible mistakes were rectified. Manually code is tested like logical errors. Once the manual checking is over the compilation has been done. Syntactical error if any has to be corrected. After the clean compilation of the program, some dummy data as per specifications has been used for tsting of that module to see if it has to be corrected.

Integration Testing Integration testing uncovers errors that arise when modules are integrated to build the overall system. The purpose of integration testing is to detect any inconsistencies between the software units that are integrated together. All the units tested modules were integrated and the errors that occurred were removed and the overall program structure was build as specify by the design.

System Testing System testing of software or hardware is tesing conducted on a complete, integrated system to evaluate the ystem compliance with its specified requirements. System testing falls within the scope of black box testing, and as such, should require no knowledge of the inner design of the code or logis.

System testing is a series of different test whose primary purpose is to fully exercise computer based system. We can say that it will run according to its specifications and in the way users expect. Special test data are input for processing, and the results examined. A limited number of users may be allowed to use the system so that analyst can see whether they try to use it in unforeseen ways. It is desirable to discover any surprises before the organization implements the system and depends on it.

✔ We follow Black Box testing.

✔ Black box testing attempts to find errors in following

✔ Incorrect or missing function

✔ Interface errors

✔ Errors in data structure

✔ Initialization and termination errors

####### ADMIN MODULE

ADMIN Panel

Apk Builder

Was this document helpful?

Sahilpreet Singh - file

Course: Fundamentals of Computer and IT Laboratory (UGCA1906)

22 Documents
Students shared 22 documents in this course
Was this document helpful?
KingMaker RAT (Android) Malware
A PROJECT REPORT
Submitted by:
Sahilpreet Singh (2001149)
in partial fulfillment for the award of the degree
of
BACHELOR OF COMPUTER APPLICATIONS
BABA BANDA SINGH BAHADUR ENGINEERING COLLEGE FATEHGARH SAHIB
PUNJAB (INDIA) - 140406
(AFFILIATED TO I.K.G. PUNJAB TECHNICAL UNIVERSITY, KAPURTHALA, PUNJAB (INDIA)
April 2023