<s>
Beast	O
is	O
a	O
Windows-based	O
backdoor	O
trojan	O
horse	O
,	O
more	O
commonly	O
known	O
in	O
the	O
hacking	O
community	O
as	O
a	O
Remote	B-Protocol
Administration	I-Protocol
Tool	I-Protocol
or	O
a	O
"	O
RAT	O
"	O
.	O
</s>
<s>
It	O
is	O
capable	O
of	O
infecting	O
versions	O
of	O
Windows	B-Application
from	O
95	B-Application
to	O
XP	B-Application
.	O
</s>
<s>
Written	O
in	O
Delphi	B-Language
and	O
released	O
first	O
by	O
its	O
author	O
Tataye	O
in	O
2002	O
,	O
it	O
became	O
quite	O
popular	O
due	O
to	O
its	O
unique	O
features	O
.	O
</s>
<s>
It	O
used	O
the	O
typical	O
client	B-Operating_System
–	I-Operating_System
server	I-Operating_System
model	I-Operating_System
where	O
the	O
client	B-Protocol
would	O
be	O
under	O
operation	O
by	O
the	O
attacker	O
and	O
the	O
server	B-Application
is	O
what	O
would	O
infect	O
the	O
victim	O
.	O
</s>
<s>
Beast	O
was	O
one	O
of	O
the	O
first	O
trojans	O
to	O
feature	O
a	O
reverse	B-Architecture
connection	I-Architecture
to	O
its	O
victims	O
,	O
and	O
once	O
established	O
it	O
gave	O
the	O
attacker	O
complete	O
control	O
over	O
the	O
infected	O
computer	O
.	O
</s>
<s>
On	O
a	O
machine	O
running	O
Windows	B-Application
XP	I-Application
,	O
removal	O
of	O
these	O
three	O
files	O
in	O
safe	B-Operating_System
mode	I-Operating_System
with	O
system	O
restore	O
turned	O
off	O
would	O
disinfect	O
the	O
system	O
.	O
</s>
<s>
The	O
default	O
ports	B-Protocol
used	O
for	O
the	O
direct	O
and	O
reverse	B-Architecture
connections	I-Architecture
were	O
6666	O
and	O
9999	O
respectively	O
,	O
though	O
the	O
attacker	O
had	O
the	O
option	O
of	O
changing	O
these	O
.	O
</s>
<s>
Beast	O
came	O
with	O
a	O
built-in	O
firewall	B-Application
bypasser	O
and	O
had	O
the	O
ability	O
of	O
terminating	O
some	O
Anti-Virus	B-Application
or	O
firewall	B-Application
processes	O
.	O
</s>
