Remote maintenance software
The remote maintenance software ( English. Remote Administration Tool or RAT for short for literally translated " remote administration tool ") represents an application of the concept of remote maintenance for any computer or computer system. It is usually used to log on to other computers from remote locations to remotely control them for repair or maintenance work.
For example, the following actions are possible:
- Screen capture ( screenshot , screen sharing )
- File management (uploading, downloading, renaming and creating files, etc.)
- Registration management
- other functions
With a direct connection, one or more client computers connect directly to the server:
[Client] [Client] | [Client] \ | / / | / __/ | / / | / / [Server]-----[Client]
Alternatively, the server can also connect to the client. In this way, for example, restrictions of Internet routers on port forwarding can be bypassed. Automated connections from several administration servers to a client also enable B. Mass updates possible.
Funkt. Funkt. \ / Funkt. Funkt. [SERVER] \ / | [SERVER] | / | / | / Funkt. Funkt.AKK | / \ / [CLIENT]-----[SERVER]
Many Trojan horses and similar malware have remote maintenance functions. Often a file has to be opened or started before a Trojan can gain access to the PC. Trojans commonly spread through P2P networks, email attachments, or careless downloads.
Most Trojans use fake error messages to camouflage themselves. Some also switch off the firewall and the antivirus program so that nothing can prevent them from accessing them. Examples of the possible harmful effects of such programs are
- Download, upload, delete and change files
- Open / close the CD-ROM drive
- Infiltration of worms and viruses onto the PC
- Logging of keystrokes ( keylogger function)
- Theft of passwords (e.g. from Internet Explorer )
- Monitoring of the screen content
- Termination, start, monitoring of processes
- Masking of desktop icons, taskbar files
- Text output
- Output of noises via the sound card
- Control and control of the mouse and keyboard
- Recording and transmission of audio signals e.g. B. a connected microphone
- Recording of webcam signals.
Removing such a Trojan horse is usually not easy, as they are often designed to avoid access by the administrator or user.