首页 | 本学科首页   官方微博 | 高级检索  
     

基于木马的黑客攻击技术
作者单位:广东商学院教育技术中心 广东广州510320
摘    要:木马程序一般分为客户端程序和服务端程序两部分,客户端程序用于远程控制计算机。而服务端程序,则隐藏到远程计算机中,接收并执行客户端程序发出的命令。本文首先介绍了木马的定义,功能和特点,其次介绍了木马的常见植入技术,包括网站挂马,发送超级链接,电子邮件,缓冲区溢出,和其它病毒形态相结合五种。再次阐述了木马的自启动技术,然后是木马的隐藏技术,包括文件隐藏,进程隐藏和通信隐藏。最后是木马的免杀技术,主要包括加壳,修改特征码和加花指令。

关 键 词:木马  木马植入  木马自启动  木马隐藏  木马免杀

Technology of Hacker's Attack Based on Trojan
Authors:LIN Cong
Abstract:Generally speaking,there are two parts in a Trojan,client and server.the one which control the computer was the client,the other which hide in the computer,receive the command by client was the server.First,the definition,functions and charactors of the Torjan were introduced In the Text.Second,how computer was infected,including Torjan in the web,send URL, e-mail,buffer overflow,integrated with other virus was discussed.Third,the auto-startup of the Trojan was discussed. Fourth, how Trojan hide in the computer,hiding files,hiding processes,hiding communication were included.Fifth,how Trojan aviod death.Personate,amend character and add NOP.
Keywords:Torjan  infect method  auto-startup  hiding  avoid found
本文献已被 CNKI 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号