<s>
NetBus	B-Protocol
or	O
Netbus	B-Protocol
is	O
a	O
software	B-Application
program	I-Application
for	O
remotely	O
controlling	O
a	O
Microsoft	B-Application
Windows	I-Application
computer	O
system	O
over	O
a	O
network	O
.	O
</s>
<s>
NetBus	B-Protocol
was	O
written	O
in	O
Delphi	B-Language
by	O
Carl-Fredrik	O
Neikter	O
,	O
a	O
Swedish	O
programmer	O
in	O
March	O
1998	O
.	O
</s>
<s>
It	O
was	O
in	O
wide	O
circulation	O
before	O
Back	B-Protocol
Orifice	I-Protocol
was	O
released	O
,	O
in	O
August	O
1998	O
.	O
</s>
<s>
However	O
,	O
use	O
of	O
NetBus	B-Protocol
has	O
had	O
serious	O
consequences	O
.	O
</s>
<s>
In	O
1999	O
,	O
NetBus	B-Protocol
was	O
used	O
to	O
plant	O
child	O
pornography	O
on	O
the	O
work	O
computer	O
of	O
a	O
law	O
scholar	O
at	O
Lund	O
University	O
.	O
</s>
<s>
He	O
was	O
acquitted	O
from	O
criminal	O
charges	O
in	O
late	O
2004	O
,	O
as	O
a	O
court	O
found	O
that	O
NetBus	B-Protocol
had	O
been	O
used	O
to	O
control	O
his	O
computer	O
.	O
</s>
<s>
There	O
are	O
two	O
components	O
to	O
the	O
client	B-Operating_System
–	I-Operating_System
server	I-Operating_System
architecture	I-Operating_System
.	O
</s>
<s>
The	O
server	B-Application
must	O
be	O
installed	O
and	O
run	O
on	O
the	O
computer	O
that	O
should	O
be	O
remotely	O
controlled	O
.	O
</s>
<s>
When	O
started	O
for	O
the	O
first	O
time	O
,	O
the	O
server	B-Application
would	O
install	O
itself	O
on	O
the	O
host	O
computer	O
,	O
including	O
modifying	O
the	O
Windows	B-Protocol
registry	I-Protocol
so	O
that	O
it	O
starts	O
automatically	O
on	O
each	O
system	O
startup	O
.	O
</s>
<s>
The	O
server	B-Application
is	O
a	O
faceless	B-Operating_System
process	I-Operating_System
listening	O
for	O
connections	O
on	O
port	B-Protocol
12345	O
(	O
in	O
some	O
versions	O
,	O
the	O
port	B-Protocol
number	I-Protocol
can	O
be	O
adjusted	O
)	O
.	O
</s>
<s>
Port	B-Protocol
12346	O
is	O
used	O
for	O
some	O
tasks	O
,	O
as	O
well	O
as	O
port	B-Protocol
20034	O
.	O
</s>
<s>
The	O
client	B-Protocol
was	O
a	O
separate	O
program	O
presenting	O
a	O
graphical	B-Application
user	I-Application
interface	I-Application
that	O
allowed	O
the	O
user	O
to	O
perform	O
a	O
number	O
of	O
activities	O
on	O
the	O
remote	O
computer	O
.	O
</s>
<s>
Tunneling	B-Protocol
protocol	I-Protocol
(	O
NetBus	B-Protocol
connections	O
through	O
a	O
number	O
of	O
systems	O
.	O
)	O
</s>
<s>
The	O
NetBus	B-Protocol
client	B-Protocol
was	O
designed	O
to	O
support	O
the	O
following	O
operating	B-General_Concept
system	I-General_Concept
versions	O
:	O
</s>
<s>
Netbus	B-Protocol
client	B-Protocol
(	O
v1.70	O
)	O
works	O
fine	O
in	O
Windows	B-Application
2000	I-Application
and	O
in	O
Windows	B-Application
XP	I-Application
as	O
well	O
.	O
</s>
<s>
Major	O
parts	O
of	O
the	O
protocol	O
,	O
used	O
between	O
the	O
client	B-Protocol
and	O
server	B-Application
interaction	O
(	O
in	O
version	O
1.70	O
)	O
are	O
textual	O
.	O
</s>
<s>
Thus	O
the	O
server	B-Application
can	O
be	O
controlled	O
by	O
typing	O
human	O
understandable	O
commands	O
over	O
a	O
raw	O
TCP	O
connection	O
.	O
</s>
<s>
It	O
is	O
more	O
difficult	O
than	O
using	O
the	O
client	B-Protocol
application	I-Protocol
yet	O
allows	O
one	O
to	O
administrate	O
computers	O
with	O
NetBus	B-Protocol
from	O
operating	O
environments	O
other	O
than	O
Windows	O
,	O
or	O
when	O
original	O
client	B-Protocol
is	O
not	O
available	O
.	O
</s>
<s>
Features	O
(	O
such	O
as	O
screen	B-Protocol
capture	I-Protocol
)	O
require	O
an	O
application	O
with	O
ability	O
of	O
accepting	O
binary	O
data	O
,	O
such	O
as	O
netcat	B-Protocol
.	O
</s>
<s>
Most	O
of	O
more	O
common	O
protocols	O
(	O
like	O
the	O
Internet	B-Protocol
Relay	I-Protocol
Chat	I-Protocol
protocol	O
,	O
POP3	B-Protocol
SMTP	B-Protocol
,	O
HTTP	B-Protocol
)	O
can	O
also	O
be	O
used	O
over	O
a	O
raw	O
connections	O
in	O
a	O
similar	O
way	O
.	O
</s>
<s>
NetBus	B-Protocol
2.0	O
Pro	O
was	O
released	O
in	O
February	O
1999	O
.	O
</s>
<s>
It	O
was	O
marketed	O
commercially	O
as	O
a	O
powerful	O
remote	B-Protocol
administration	I-Protocol
tool	O
.	O
</s>
<s>
All	O
versions	O
of	O
the	O
program	O
were	O
widely	O
used	O
by	O
"	O
script	O
kiddies	O
"	O
and	O
was	O
popularized	O
by	O
the	O
release	O
of	O
Back	B-Protocol
Orifice	I-Protocol
.	O
</s>
<s>
Because	O
of	O
its	O
smaller	O
size	O
,	O
Back	B-Protocol
Orifice	I-Protocol
can	O
be	O
used	O
to	O
gain	O
some	O
access	O
to	O
a	O
machine	O
.	O
</s>
<s>
The	O
attacker	O
can	O
then	O
use	O
Back	B-Protocol
Orifice	I-Protocol
to	O
install	O
the	O
NetBus	B-Protocol
server	B-Application
on	O
the	O
target	O
computer	O
.	O
</s>
<s>
Most	O
anti-virus	B-Application
programs	I-Application
detect	O
and	O
remove	O
NetBus	B-Protocol
.	O
</s>
