Manipulating the web cam drivers that will allow him to turn on the web cam covertly.The RAT Agent allows following options to the hacker among others: This is the dashboard the hacker has installed on his own Windows PC from where he has full control of the infested computer. Often the tool will compromise core system files of Windows, so it acts like a normal Windows service where it then becomes extremely difficult to be identified as a trojan horse. Once that file is started on a Windows PC for example, it immediately puts itself into the white list of any installed antivirus and firewall tools, and hides itself from being detected through common tools such as Windows Services and similar. The RAT payload is the trojan horse file the victim has to run by being misled. This is the software piece the hacker installs on a server somewhere, usually on a Linux based server, either a dedicated or cloud based server anywhere.