A
A
aspirinchikc9h8o42016-12-10 11:56:24
SSH
aspirinchikc9h8o4, 2016-12-10 11:56:24

Is there any material on remote protocols rdp, ssh, telnet, vnc?

How do they emulate a mouse and keyboard? How do they work on and their connection with tcp/ip?
We need article materials and other usefulness. If there is system programming, also throw it (although I'm not in the tooth with my foot), but it will also be interesting to read. It is especially interesting how the "emulated mouse" click commands work through these protocols. Binding ID and more...

Answer the question

In order to leave comments, you need to log in

2 answer(s)
R
Rou1997, 2016-12-10
@aspirinchikc9h8o4

It is necessary to look at the source code of clients and servers, and use a sniffer for research, otherwise there will be no real understanding, theory without practice is only suitable for term paper, etc., and will not give you skills in work.
Using the OS API, for example on Windows, there are WinAPI functions mouse_event and keybd_event.
The protocols implemented in these programs are implemented on top of the TCP protocol, that is, Berkeley sockets API is used to transfer images from the monitor and other data, this API is included in the Windows API and in other POSIX-compliant operating systems, such as Linux and OS X.
And each A "packet" contains: an Ethernet header, an IPv4 header, a TCP header, and finally data from a specific application protocol such as SSH.
Roughly speaking, a protocol is a data format that is contained in a certain conditional "package" - a fragment of a data stream transmitted over a network. A "packet" is somewhat like a file, it is also a "piece" of an abstract set of bytes (whether in a cable or on a disk), and just like files, a "package" usually has a format, that's the protocol.
It is in programs such as remote desktops that the TCP protocol is used "fully" or close to the "ideal", that is, maximum stability is provided, up to detecting and processing network cable breaks or equivalent problems with the Wi-Fi network.

A
aspirinchikc9h8o4, 2016-12-10
@aspirinchikc9h8o4

Thanks for the answer. Using these mouse_event and keybd_event functions, is it possible to block actions (clicks, keystrokes) of an attacker for example? After all, he will come from a different ip, but the id of the manipulator is different than that of a real user.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question