Do you need to know how to configure port forwarding on VPS? Inshort, port forwarding is a technique used in computer networking that allows incoming network traffic to be redirected from one network port on a router or firewall to another network port. Read this article and watch the video to find out how to open port and listen to it on VPS (RDP)

Forwarding a port is often necessary to enable communication between two devices on a network when they are not directly connected. For example, suppose you want to access a web server running on a machine within your home network from outside that network. In that case, you should set up port forwarding on your router or firewall.

Does malware use port forwarding?

Malware may use port forwarding as a means of enabling remote access and control of an infected device, as well as bypassing security measures that are in place to prevent such access. By setting up port forwarding on an infected device, the malware can create a pathway to communicate with other devices on the internet or within a local network without being detected by security systems designed to monitor network traffic.

For example, some types of malware may use port forwarding to enable a remote attacker to connect to a backdoor that the malware has created on an infected device, providing the attacker with full access to the device’s resources and sensitive information. Malware may also use port forwarding to create a proxy server on an infected device, which can relay traffic between other compromised devices and the attacker’s command and control servers.

Remote access trojans on Remote Desktop Protocol (RDP) and Virtual Network Computing (VNC) can use port forwarding to gain unauthorized access to a target system’s desktop interface.

Also, Malware and backdoor tools such as Netcat, Reverse Shell, some ransomware, and Backdoor Factory can use port forwarding to create a reverse connection from a compromised system to an attacker-controlled system, allowing the attacker to gain remote access and control of the compromised system.

Can FUD crypter affect the connection?
No, Leave the Tool options and use the crypter options instead. Put the injection on “itself” if you want to use your tool options (like startup, installation, etc.)

How to open forwarding port on RDP?

In short, If you are using the VPS, open the port and set the rules on your firewalls.

If you want to run it on your PC, you can use a VPN with custom port forwarding or open the port on your modem or router(some modems & routers haven’t port forwarding features). In the below video, we show you how to open port forwarding on VPS or RDP. Before starting we recommend watching bypass Windows Defender videos if you interest for make FUD results.

This tutorial is made for how to forward a port on VPS (RDP).

Open Windows Defender Firewall settings. You can reach this setting by “Control PanelAll Control Panel ItemsWindows Defender”.

Firewall or use this keyboard shortcut: Windows + R and type “firewall.cpl”.

Choose “Advanced settings.”

You must define your desired port by creating rules on Inbound rules settings.

Click on the “Inbound Rules”

Then click on “New Rule…”

In the opened window, select the port option and click next

As you see, you have two options (TCP and UDP). You must open your desired port in both.

add your port number and click next

Click Next and enter your port name as you like.

It is better to write the name in such a way that later for changes, you will know whether it is TCP or UDP.

We have now opened the port for TCP; we do the same steps for UDP and define its rule like this. Click “New Rule…” and do it.

Let’s check the port on the Canyouseeme website and see what happens.

type the forwarded port and click on the Check port button

See the error result. Port forwarding on VPS faild.

What should we do? After you have forwarded the port, you should listen to it.

How to listen to a port?

In order for a device to receive incoming network traffic on a specific port, the port must be open and listening for incoming connections. It means that a forwarded port must also be listening to receive incoming traffic forward to it.

To listen on a specific port, an application or service must be running on the device that is designed to handle incoming connections on that port.

When a port is forwarding to a device on a network, the device’s router or firewall will forward incoming traffic on that port to the listening service or application running on the device. It allows the device to receive incoming traffic from other devices on the internet or within the same network and to respond to requests accordingly.

It is important to note that forwarding a port alone does not automatically make a service or application accessible from the internet or other networks. The listening service or application must also be properly configured to accept incoming connections and respond to requests.

The device will connect to a network with a unique IP address on that network. A port is a number that is used to differentiate between different network services that may be running on the same device. For example, a web server may be running on a device, along with an email server and a file-sharing service.

how open forwarding and listen to it? To receive incoming network traffic on a specific port, the software application that is responsible for handling that type of traffic must be running and listening on the corresponding port.

If the port is not open and listening, incoming traffic will not be able to reach the intended service or application. Instead, the client attempting to connect to the service will receive an error message or a connection timeout.

For listening to port forwarding on VPS, I will try it in the DcRAT tool for testing.

Type the forwarded port for listening on DcRAT.

Now let’s recheck the result. You can test your file with crypter Runtime tool too.

See, we have configured the port forwarding correctly. If you have a problem with how to make FUD a RAT visit our blog. You can watch how make Warzone RAT FUD for instance.

Follow us on telegram and give your feedback. If you want to make a crypter read our articles.