首页 | 本学科首页   官方微博 | 高级检索  
     

基于局域网渗透的木马技术研究与实现
引用本文:田磊,李振海,陈琳,李世超.基于局域网渗透的木马技术研究与实现[J].计算机应用与软件,2007,24(10):195-197,204.
作者姓名:田磊  李振海  陈琳  李世超
作者单位:解放军信息工程大学,河南,郑州,450004
摘    要:考虑局域网渗透的需求,对现有的木马技术进行了研究,深入分析了动态嵌入式DLL木马中的远程线程技术,提出了一种基于Winsock 2 SPI的新型DLL木马.该木马与采用远程线程技术的木马相比,在Windows环境中具有很好的隐藏性和跨平台性,在局域网渗透中具有一定的应用价值.

关 键 词:局域网  渗透  木马  SPI  服务提供者  协议链  局域网  木马技术  技术研究  PENETRATING  INTERNAL  BASED  TROJAN  HORSE  TECHNOLOGY  IMPLEMENTATION  价值  应用  跨平台性  环境  Windows  Winsock  远程线程技术  嵌入式  动态  分析  需求
修稿时间:2005-03-07

RESEARCH AND IMPLEMENTATION OF A TECHNOLOGY OF TROJAN HORSE BASED ON INTERNAL PENETRATING IN LAN
Tian Lei,Li Zhenhai,Chen Lin,Li Shichao.RESEARCH AND IMPLEMENTATION OF A TECHNOLOGY OF TROJAN HORSE BASED ON INTERNAL PENETRATING IN LAN[J].Computer Applications and Software,2007,24(10):195-197,204.
Authors:Tian Lei  Li Zhenhai  Chen Lin  Li Shichao
Affiliation:Information Engineering University of the PLA, Zhengzhou 450004, Henan, China
Abstract:Considering internal penetrating requirement in LAN, researches are made on the current Trojan horse technology, Remote thread technology of dynamic embedded DLL Trojan horse is analyzed. A new DLL Trojan horse based on Winsock 2 SPI is proposed. Compared with Trojan horse based on remote thread technology, this Trojan horse has a good disguise for self-protection on Windows. Meanwhile, the Trojan bourse is supported by multifarious Windows platforms, and thus it has some value in internal penetrating in LAN.
Keywords:LAN Penetrating Trojan horse SPI Service provider Protocol chain
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号