How To Reverse Connection In Anydesk

AnyDesk is a popular remote desktop software that allows users to access and control another computer remotely.

While its primary function is to provide assistance by allowing users to connect to a remote computer, you might be wondering if it’s possible to reverse the connection in AnyDesk.

In this article, we’ll explore the concept of reversing the connection in AnyDesk and discuss its practical implications.

Understanding Reverse Connection

Reverse connection refers to a scenario where the remote control process is initiated by the host computer (the computer that will be controlled) rather than the client computer (the computer that will initiate the connection). In the context of AnyDesk, this means that the host computer can initiate a remote assistance session with the client computer.

Can You Reverse the Connection in AnyDesk?

As of my knowledge cutoff date in September 2021, AnyDesk is primarily designed for providing remote support or assistance, which means that the client computer initiates the connection to the host computer. This is the default behavior of AnyDesk and aligns with its intended use case.

However, AnyDesk doesn’t offer a built-in feature to reverse the connection by default. In other words, you cannot initiate a remote control session from the host computer to the client computer using the standard AnyDesk interface.

Alternative Solutions

If you need to establish a reverse connection scenario using AnyDesk, you might need to explore alternative solutions or workarounds. Keep in mind that such solutions could involve more complex setups and might not be officially supported by AnyDesk.

It’s important to note that attempting to reverse engineer or modify the software’s behavior can potentially lead to security risks, breaches, or unintended consequences. If you’re considering any alternative solutions, it’s recommended to do so in a controlled and secure environment and only after thoroughly understanding the potential risks and implications.

Attackers typically install malware through various methods, including phishing emails with a malicious attachment, malvertising, exploits, and by disguising the malware as regular software and uploading it to websites.

Installed malware includes information stealers that steal information from the infected system, ransomware that encrypts files to demand ransom, and DDoS Bots that are used in DDoS attacks.

Apart from these, backdoor and RAT are also important malware programs used by attackers. Backdoor malware installs itself on infected systems and receives commands from the attacker to perform malicious behavior. By doing so, the attacker can take over the infected system.

These types of backdoor malware not only take over individual systems, but through lateral movement take over networks and can ultimately be used to steal internal corporate information or used as a means for attacks that encrypt internal systems under control.

Exit Strategy

Before the scammer catches the scammer, you already have an exit strategy planned. Once the scammer has installed the payload and the scammer has gained access to your PC, it will be crucial that the scammer come out clean and not raise suspicions that could lead the scammer to investigate. Therefore, the scammer will give the scammer something that they will probably receive throughout the day: distrust. The goal is to let the scammer believe that their attempt failed, which it probably will 99% of the time, and then move on to the next victim. Here’s one way to do it:

The scammer needs an explanation as to why the .exe file they opened didn’t lead to their intended target. Therefore, the payload has to provide a feasible explanation.

Mstsc.exe – Microsoft RDP client Tested Version: build rs_prerelease.180928-1410

After we finished checking open source implementations we felt we had a pretty good understanding of the protocol and now you can start reverse engineering the Microsoft RDP client. But first things first, we need to find which binaries contain the logic we want to examine. The *.dll and *.exe files we chose to focus on:

  • rdpbase.dll – Protocol layer for the RDP client.
  • rdpserverbase.dll: Protocol layer for the RDP server.
  • rdpcore.dll / rdpcorets.dll – Core logic for the RDP engine.
  • rdpclip.exe: an .exe that we found and will present later.
  • mstscax.dll – Mostly the same RDP logic, used by mstsc.exe.


While AnyDesk is a reliable and widely used remote desktop software, its primary design is centered around initiating connections from the client computer to the host computer for remote support purposes. As of my knowledge cutoff date, reversing the connection in AnyDesk is not a built-in feature, and attempting to achieve this might involve complex solutions that could carry security risks.

If you’re interested in utilizing AnyDesk for remote assistance, it’s recommended to use it in its intended manner and to prioritize security and privacy considerations. Always use reputable and trusted software for remote access, and ensure that you’re adhering to best practices to maintain a secure computing environment.

0 comentarios

Dejar un comentario

¿Quieres unirte a la conversación?
Siéntete libre de contribuir

Deja una respuesta

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *