This chapter focused on creating RATs and using msfvenom. It explained what a RAT is and how hackers use it. We demonstrated the process of making a Remote Access Trojan. In the end, we gained an understanding of how RATs are used by hackers.
In Chapter 5, Veil Framework, we will be working with the Veil Framework.