反弹端口木马的设计与实现(VC++)
1.无需注册登录,支付后按照提示操作即可获取该资料.
2.资料以网页介绍的为准,下载后不会有水印.资料仅供学习参考之用.
密 惠 保
反弹端口木马的设计与实现摘 要木马是用于远程控制的黑客工具,被黑客用来远程操作他人计算机、监视别人和盗窃别人帐号、密码和数据等,以达到破坏他人计算机、偷窃别人隐私和得到经济利益的目的。作为网络安全管理人员,认真地研究木马攻击技术,理清木马攻击手段与过程,提早思考应对策略是防御木马攻击的有效途径。因此,在木马已对网络与信息安全构成极大危险的时代研究木马技术、编写木马程序,对于防护网络安全、促进电子商务的发展具有重要的现实意义。文中在深入研究国内外木马技术与发展方向的基础上,介绍了木马的发展与现状以及木马组成与特性;对反弹端口木马的连接方法进行了具体详尽的分析。充分利用传统防火墙疏于对向外连接的过滤这一特点,使用Visual C++ 6.0进行Socket网络编程开发而成。实现了木马绕过防火墙建立连接;实现木马的隐藏、自动运行等基本特性,让服务端光驱弹出、机箱播放音乐等功能。文中细致地描绘了木马的功能执行过程。最后提供了全面的测试结果。 [资料来源:http://www.THINK58.com]
关键词:木马;反弹端口;服务端;客户端;套接字 copyright think58 [来源:http://www.think58.com]
Design and Implementation of Rebound Ports Trojan horse AbstractThe Trojan horse is a kind of hacker’s tool which is used for remote control and operating others’ computers, monitoring and stealing others’ account numbers, passwords and data and so on, in order to destroy others’ computers or get their privacy and economic interests. As the Internet security manager, we should pay attention to preventing the Trojan horse when we detect and delete the Trojan horse. We must study the technology of the Trojan horse attack, clear the means and process of the Trojan horse to find an efficient path to prevent the Trojan horse attack ahead of time. So at the time that the Trojan horse is dangerous to the network and security of information, we should study the technology of the Trojan horse and code the Trojan horse programs, which is significant to protect the Internet security and promote the development of the e-business. The thesis is writen on the bases of deeply studying the Trojan horse technique and development orientation at home and overseas, then, introduces the development and current situation of Trojan horse and its component as well as characteristics. This thesis analyzes the method of how to connect with Rebound Ports Trojan horse in detail. Making full use of which the firewall neglect to filter the Rebound Ports Trojan horse, it is developed by Visual C++6.0. The design has realized the function which the service could connect the client actively, also implemented the basic characteristics of concealment, automatic running, rebounding the CD-ROM of services, chassis playing music and so on. At last the paper describes the progress of executing Trojan horse and affords all-around test result.
本文来自think58 [资料来源:http://THINK58.com]
[版权所有:http://think58.com]Key words: Trojan horse Rebound port service port client port socket 本文来自think58 [来源:http://www.think58.com]
目 录论文总页数:19页1引言11.1课题背景11.2国内外研究现状11.3课题研究的意义21.4课题的研究方法22相关理论基础22.1木马概述22.1.1 木马的组成32.1.2 木马的特征32.1.3 反弹端口木马介绍42.2C/S模式42.3套接字(SOCKET)52.4VISUAL C++ 6.053需求分析53.1系统规格说明53.1.1 木马的概貌53.1.2 功能要求63.1.3 性能要求63.1.4运行要求63.2数据要求63.3用户系统描述74木马的设计与实现74.1木马结构设计74.1.1 木马的主体设计84.1.2 木马的自动启动实现84.1.3 木马的窗口隐藏实现94.2木马连接过程94.2.1 连接过程理论研究94.2.2 木马连接过程实现114.3木马的远程控制功能设计134.3.1木马的功能实现134.3.2木马的功能执行过程145测试155.1测试环境155.2测试过程与结果15结 论17参考文献17致 谢18声 明19预览图: copyright think58 [版权所有:http://think58.com]
[资料来源:http://THINK58.com]