Remote maintenance software

from Wikipedia, the free encyclopedia
The articles remote maintenance and remote maintenance software overlap thematically. Help me to better differentiate or merge the articles (→  instructions ) . To do this, take part in the relevant redundancy discussion . Please remove this module only after the redundancy has been completely processed and do not forget to include the relevant entry on the redundancy discussion page{{ Done | 1 = ~~~~}}to mark. Fabiwanne ( discussion ) 23:56, Jul 11, 2013 (CEST)

The remote maintenance software ( English. Remote Administration Tool or RAT for short for literally translated " remote administration tool ") represents an application of the concept of remote maintenance for any computer or computer system. It is usually used to log on to other computers from remote locations to remotely control them for repair or maintenance work.

Possible actions

For example, the following actions are possible:

  • Screen capture ( screenshot , screen sharing )
  • File management (uploading, downloading, renaming and creating files, etc.)
  • Check
  • Registration management
  • other functions

Direct connection

With a direct connection, one or more client computers connect directly to the server:

  [Client]       [Client]
    |    [Client]  \
    |      /	  /
    |     /   __/ 
    |    /  /
    |   / /
  [Server]-----[Client]

Opposite connection

Alternatively, the server can also connect to the client. In this way, for example, restrictions of Internet routers on port forwarding can be bypassed. Automated connections from several administration servers to a client also enable B. Mass updates possible.

Funkt. Funkt.
  \    /   Funkt. Funkt.
  [SERVER]   \    /
    |    [SERVER]
    |      /
    |     /
    |    /   Funkt. Funkt.AKK
    |   /      \     /
  [CLIENT]-----[SERVER]

Abuse, malware

Many Trojan horses and similar malware have remote maintenance functions. Often a file has to be opened or started before a Trojan can gain access to the PC. Trojans commonly spread through P2P networks, email attachments, or careless downloads.

Most Trojans use fake error messages to camouflage themselves. Some also switch off the firewall and the antivirus program so that nothing can prevent them from accessing them. Examples of the possible harmful effects of such programs are

  • Download, upload, delete and change files
  • Open / close the CD-ROM drive
  • Infiltration of worms and viruses onto the PC
  • Logging of keystrokes ( keylogger function)
  • Theft of passwords (e.g. from Internet Explorer )
  • Monitoring of the screen content
  • Termination, start, monitoring of processes
  • Masking of desktop icons, taskbar files
  • Text output
  • Output of noises via the sound card
  • Control and control of the mouse and keyboard
  • Recording and transmission of audio signals e.g. B. a connected microphone
  • Recording of webcam signals.

Removing such a Trojan horse is usually not easy, as they are often designed to avoid access by the administrator or user.

See also

Web links