Reverse Connection

This product was added to computer science because of the content, defects on the quality assurance side of the editor. This is done to bring the quality of the articles from the computer science subject area to an acceptable level. Help us to eliminate the substantive shortcomings of this article and take part you in the discussion! ( ) Reason: Could someone professionally remove the little article yet? - Buecherwuermlein 23:00, March 23 2008 ( CET )

As a Reverse Connection a compound is referred to another computer that is used to bypass a firewall. This one uses the property of the firewall, although those blocks incoming connections, not outgoing.

This type of connection is reflected in various situations application, such as file-sharing networks or during file transfer via FTP (so-called passive mode). The trick is, however, also used by Trojans which make up unnoticed by the victim to connect to the perpetrators.

Background

Most Internet connections are made over the Transmission Control Protocol (TCP). It acts of a connection partner as a server that listens for incoming connections. The other ( client) initiates the connection with a request to the server.

Many malicious programs or Internet users try vulnerabilities on the computers of other participants exploit to gain unauthorized access to this by opening connections to these. To protect yourself from such attacks, firewalls are used, which are often configured so that they do not allow incoming connections. A link from a customer to the Internet can thus only created when the client initiates the connection, thus acting as a client.

However, there are Internet platforms and communication protocols that are dependent on that they can build a relationship with the customer. Thus, behind a firewall do not use this one customer. The principle of the reverse connection consists in the fact that the application of the customer is prompted to initiate a connection. This connection is allowed by the firewall.

In the case of a Trojan horse, this means that the Trojan, which is introduced on the victim's computer and normally acts as a server, first assumes the role of client and connects to the application of the offender.

  • Network protocol
680060
de