第二代木马的研究与实现
1.无需注册登录,支付后按照提示操作即可获取该资料.
2.资料以网页介绍的为准,下载后不会有水印.资料仅供学习参考之用.
密 惠 保
摘 要
随着互联网的迅速普及和应用的不断发展,各种黑客工具和网络攻击手段层出不穷,网络安全越发重要。特洛伊木马以其攻击范围广、隐蔽性、危害大等特点成为常见的网络攻击技术之一,对网络环境中计算机信息资源的危害比许多病毒都还大。本论文介绍了木马的定义、原理、分类及其发展趋势等基本理论,对木马所采用的技术方法进行了归纳研究,采用第二代木马技术,设计了一个基于网络的Windows平台上的木马。在论文中分析了当前网络的安全现状,介绍了木马的发展历史及第二代木马采用的关键技术,最终完成了木马程序的编写,实现了远程系统信息获取模块,远程系统功能限制模块,信息发送模块,击键记录模块等几大模块功能。归纳了现阶段存在的问题和改进意见,并根据系统的功能瓶颈提出了后续开发方向。
关键词:网络安全;网络攻击;黑客;特洛伊木马 [资料来源:THINK58.com]
Research and Implementation of
Second-generation Trojan
Abstract
With the popularization of the Internet and the development of its application, various attack methods to Internet have also appeared. Network security has become important. As one of the means of attacking Internet, comparing with many viruses, Trojan is more harmful in network environment. The article concludes the Trojan's basic theory and technology. A Trojan was designed based on Windows platform according to the second-generation Trojan technology. This article analyses the current network security status and introduces Trojan's development and the key technology of the second-generation Trojan. Ultimately, the system accomplishes the Trojan program achieving the main functional modules, such as sending information, capturing typing and so on. The existing problems are summed up, and the future direction is proposed according to the bottleneck problem of the system. [资料来源:http://THINK58.com]
Key words: Network security;Network attack;Hacker; Trojan
功能要求
本系统的开发要求采用C/S结构,选用所熟悉的开发工具及开发环境进行本系统的设计与开发。
设计开发一个木马程序,本设计要求实现部分功能--目标机器(肉鸡)情况的获取和控制等,具体包括以下内容:(1)在设计与开发中,着重于解决目标机器情况的获取和控制问题;(2)在设计与开发中,既探讨能实现木马程序自启动,拷贝到system32下及文件关联的实现。 [资料来源:THINK58.com]
[资料来源:http://THINK58.com]