木马和混合型威胁副本汇编.pptx

  1. 1、本文档共19页,可阅读全部内容。
  2. 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
木马和混合型威胁副本汇编

Trojan Horse Blended Threats Trojan Horse The Origin of “Trojan Horse” What’s “Trojan Horse” Backdoor Rootkit The History of “Trojan Horse” Impacts of “Trojan Horse” The Origin of the “Trojan Horse” The Trojan Horse is a tale from the Trojan War about the subterfuge that the Greeks used to enter the city of Troy and win the war. Client Program Server program Malicious Hackers Innocent Users (Pretend to be legitimate) (Get cheated) (Controller) A Trojan horse, or Trojan, in computing is any malicious computer program which misrepresents itself to appear useful, routine, or interesting in order to persuade a victim to install it. The Definition of Trojan Horse No! You are a liar and thief! A backdoor in a computer system is a method of bypassing normal authentication, securing unauthorized remote access to a computer, or obtaining access to plaintext while attempting to remain undetected (usually through a rootkit). A rootkit (隐匿程式) is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that would not otherwise be allowed while at the same time masking its existence or the existence of other software. The term rootkit is a concatenation of “root” and the word “kit(工具箱)“. It’s backdoor! Adverse Impacts: steal control Damage degree varies: For Example… Category: universal transitive Crashing the computer or device. Modification or deletion of files. Data corruption. Formatting disks, destroying all contents. Spread malware across the network. Spy on user activities and access sensitive information. Destructive Features: History of Trojan Horse ?Using kernel-embedded and Rootkit technology ?Using thread technology to embed into DLL(Dynamically Linked Library)动态链接程式库 ?Using technology like Armyworm ?Systematic anti-detection technology SSDT:把一个ring3的Win32 API(应用程序界面)和ring0的内核API联系起来。 Repentant Thief Bandit (No copies and reproduction by infect

文档评论(0)

jiayou10 + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

版权声明书
用户编号:8133070117000003

1亿VIP精品文档

相关文档