Reverse connection

From Wikipedia, the free encyclopedia

A reverse connection is usually used to bypass firewall restrictions on open ports.[1] A firewall usually blocks incoming connections on open ports, but does not block outgoing traffic. In a normal forward connection, a client connects to a server through the server's open port, but in the case of a reverse connection, the client opens the port that the server connects to.[2] The most common way a reverse connection is used is to bypass firewall and router security restrictions.[3]

For example, a backdoor running on a computer behind a firewall that blocks incoming connections can easily open an outbound connection to a remote host on the Internet. Once the connection is established, the remote host can send commands to the backdoor. Remote administration tools (RAT) that use a reverse connection usually send SYN packets to the client's IP address. The client listens for these SYN packets and accepts the desired connections.

If a computer is sending SYN packets or is connected to the client's computer, the connections can be discovered by using the netstat command or a common port listener like “Active Ports”. If the Internet connection is closed down and an application still tries to connect to remote hosts it may be infected with malware. Keyloggers and other malicious programs are harder to detect once installed, because they connect only once per session. Note that SYN packets by themselves are not necessarily a cause for alarm, as they are a standard part of all TCP connections.

There are honest uses for using reverse connections, for example to allow hosts behind a NAT firewall to be administered remotely. These hosts do not normally have public IP addresses, and so must either have ports forwarded at the firewall, or open reverse connections to a central administration server.


  1. ^ MD, Aatif M. Husain (2008-02-21). A Practical Approach to Neurophysiologic Intraoperative Monitoring. Demos Medical Publishing. pp. 52–53. ISBN 978-1-934559-97-0.
  2. ^ Cai, Hongmin; Wu, Naiqi (June 2010). "Design and implementation of a DIDS". 2010 IEEE International Conference on Wireless Communications, Networking and Information Security. pp. 340–342. doi:10.1109/WCINS.2010.5541796. ISBN 978-1-4244-5850-9. S2CID 2768729.
  3. ^ Raj, Sudhanshu; Walia, Navpreet Kaur (July 2020). "A Study on Metasploit Framework: A Pen-Testing Tool". 2020 International Conference on Computational Performance Evaluation (ComPE). pp. 296–302. doi:10.1109/ComPE49325.2020.9200028. ISBN 978-1-7281-6644-5. S2CID 221845403.

External links[edit]