Data transmission method of penetrating firewall

Source: Internet
Author: User
Tags socket firewall

Usually, the firewall on the host will let us encounter some minor problems when we need to send the data to the back door for the target host. If you open a port (or even a new socket) for our own process, most firewalls will intercept it. Is there any way to "penetrate" these firewalls?

Let me introduce you to a way to "penetrate" the firewall to transfer important data on a small scale. However, you are not recommended to use this method in other situations.

In fact, my idea is very simple, since the firewall will intercept the unauthenticated process and release the data transfer of the validated process, then we will be other processes in the other process to allow data transfer socket handle to be used. The specific process is as follows:

1, identify the target process;

2, find the socket handle;

2, using DuplicateHandle () function to convert its socket to be able to use their own;

3, with the converted socket for data transmission.



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.