Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Long-range control method and system

A remote control and control terminal technology, applied in the field of network communication security, can solve problems such as strikes, and achieve the effect of strong communication security and strong concealed communication capabilities

Inactive Publication Date: 2008-10-15
RUN TECH CO LTD BEIJING
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, most of the software firewalls rely on the operating system NDIS (middle layer driver) to manage the process communication through their own drivers, and use firewall rules to control the network communication of the process. 90% of the software firewalls are monitoring. To prevent intrusion, this is the main reason why using remote thread injection to IE browser can break through the firewall, because the firewall defaults the IE process to allow access to the network, and the server of the Trojan horse operates in the form of a thread in the IE process , so it can easily penetrate the interception of the firewall, but antivirus software developers or some security software developers have discovered this kind of problem, and have targeted IE and Explorer with stricter rules and management, which has greatly blown Such attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Long-range control method and system
  • Long-range control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The remote control method and remote control system based on the DNS penetration technology of the present invention will be described in detail below in conjunction with the accompanying drawings, but this does not constitute a limitation to the present invention.

[0027] The present invention is mainly described for Microsoft Windows series operating systems, and the method of the present invention is also applicable to operating systems such as Linux with the same principle.

[0028] The processing flow of the server end and the control end of the present invention, such as figure 1 shown.

[0029] (1) The server hooks the DNS sending module of the operating system through HOOK technology, and initializes the DNS sending module to obtain the local communication ports that have been opened. The purpose is to tell the control terminal which ports can be connected, so as to actively connect to the control terminal.

[0030] There are two situations: one is that the se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention pertains to the field of network communication security, which particularly relates to a remote control method and remote control system. The invention adds modules into a service end and a control end; the service end is arranged in a computer to be controlled and initiatively connected with the control end; improvement is carried out according to the mechanism of firewall or intrusion detection systems; the firewall or the intrusion detection systems are penetrated initiatively, thus easily traversing interception and realizing the purpose of covert communication.

Description

technical field [0001] The invention relates to the field of network communication security, in particular to a remote control method and a remote control system. Background technique [0002] Most of the early remote control systems were in the C / S mode, that is, the client and the server communicate with each other. The more common ones are pcAnywhere and so on. In addition, Trojan horse programs such as Glacier, Black Hole, Gray Pigeon, etc. are software of this type of communication mechanism. [0003] There are two traditional communication methods, one is forward connection, that is, the control terminal program actively connects to the designated port opened by the server, and the other is reverse connection, that is, the control terminal first opens a port to listen to a local port and waits for the service. end connection. Early firewalls were very sensitive to unsolicited connections, and reverse links were more penetrating. With the continuous improvement of ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
Inventor 翁越龙
Owner RUN TECH CO LTD BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products