GUIs Across the Network, Starring Virtual Network Computing

As we've seen, Netcat and a variety of other tools let an attacker remotely access command shells across a network. However, for some attackers, command shells just aren't enough. These bad guys want to feel like they are sitting in front of the victim computer, at the system console itself. This breed of attackers desires control of the GUI, viewing the screen of the victim machine, moving its mouse, and sending in keystrokes. For this kind of access, attackers employ a variety of tools for remotely controlling a target system's GUI.

It's important to note that not all remote control of a GUI is malicious. Indeed, several completely legitimate commercial companies are built on products ...

Get Malware: Fighting Malicious Code now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.