首页 | 本学科首页   官方微博 | 高级检索  
     

基于内核入侵的木马设计与实现
引用本文:冯万利. 基于内核入侵的木马设计与实现[J]. 微计算机信息, 2006, 22(18): 120-122
作者姓名:冯万利
作者单位:223001,江苏省淮安市淮阴工学院计算机工程系
摘    要:通过内核入侵是木马入侵Linux系统的一种重要形式,其原理是利用Linux内核提供的机制来实现木马的各种功能,主要是通过内核编程来实现。本文重点研究了内核入侵的两种方法:直接对内核源代码进行修改,利用Linux的模块机制。最后在此基础上完成了一个基于内核入侵的木马设计与实现。

关 键 词:内核入侵  木马  模块  源码修改
文章编号:1008-0570(2006)06-3-0120-03
修稿时间:2005-12-12

The Design and Implementation of the Trojan Horse Based on Kernel Hacking
Feng,Wanli. The Design and Implementation of the Trojan Horse Based on Kernel Hacking[J]. Control & Automation, 2006, 22(18): 120-122
Authors:Feng  Wanli
Abstract:It is an important ways that the Trojan Horse invades the Linux system through the kernel hacking. its principle is usingthe mechanism provided by Linux kernel to realize Trojan Horse functions, mainly is realized through the kernel programing. This pa-per has studied the two methods of kernel hacking with emphasis: Directly revises the kernel source codes, uses the Linux modulemechanism. Based on that, has completed the design and the realization of a kind of kernel hacking Trojan Horse Finally.
Keywords:kernel hacking  Trojan Horse  Module  Codes Revised
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号