- 1、本文档共29页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
透视木马程序开发技术(Development technology of perspective Trojan horse program)
透视木马程序开发技术(Development technology of perspective Trojan horse program)
Perspective Trojan program development technology, virus source code detailed
2009-08-23 00:09 source: IT Chinese laboratory Author: anonymous [I want comment] [review] in recent years, the hacker technology continues to mature, caused a great threat to network security, one of the main means of hackers attack, is the use of Trojan horse technology, penetrate into the main machine system of each other, so as to realize the remote operation of the target host.
In recent years, the hacker technology continues to mature, caused a great threat to network security, one of the main means of hackers attack, is the use of Trojan horse technology, penetrate into each other in the host system, so as to realize the remote operation of the target host. The damage is big, can not be overlooked, hackers in the end is how to make this kind of destructive Trojan, Trojan below I conduct a detailed analysis of the source code, let us to the Trojan development technology to do a thorough perspective, from the beginning to understand the Trojan technology, more secure the management of your computer.
1, Trojan classification
Trojan horse technology development so far, has gone through 4 generations, the first generation, that is, simple code stealing, sending, etc., nothing special. Second generation Trojan horse, in the technology has made great progress, glacier can be said to be one of the typical representative of domestic Trojan horse. The third generation of Trojan horse in the data transmission technology, but also made a lot of improvements, there have been ICMP and other types of Trojan horse, the use of malformed packets to pass data, increasing the difficulty of killing. The fourth generation Trojan has made great changes in the process of hiding, using the kernel inserted mode, using the remote insertion thread technology to embed the DLL thread. Or hang PSAPI, to achieve the hidden Trojan program, even
您可能关注的文档
- 运动生理)(Exercise physiology).doc
- 运动的世界复习题(The world review of sports).doc
- 运用脾胃学说治疗慢性肠胃疾病体会(Experience of treating chronic gastrointestinal diseases with the theory of spleen and stomach).doc
- 运笔常识(Stroke common sense).doc
- 运动的判断和消除(Judgment and elimination of motion).doc
- 运用孙子兵法创造高效率的销售技巧(Use Sun Tzu's art of war to create efficient sales techniques).doc
- 运用公式求算两种遗传病的概率(Use formula to calculate the probability of two kinds of genetic diseases).doc
- 运营与运维的区别(Difference between operation and operation and maintenance).doc
- 运笔方法(Stroke writing method).doc
- 过氧乙酸(peracetic acid).doc
最近下载
- 安徽省合肥市瑶海区2022-2023学年九年级上学期期中考试英语试题 .docx VIP
- 2025年一建一级建造师项目管理考点重点知识总计中范围预测记忆笔记.pdf
- 2024北师大版四年级下册数学全册教案.pdf VIP
- [疾病的隐喻].桑塔格(大全).pdf
- 《军事理论》考试题库大全(含各章节)-共600多题.docx
- AI助力教育创造性学习的未来.pptx
- YB∕T 4001.3-2020- 钢格栅板及配套件 第3部分:钢格板楼梯踏板.pdf
- 国家开发银行招聘考试真题汇编.docx
- 括号里最大能填几基础训练一.pdf VIP
- 党课PPT课件含讲稿:二十届三中全会解读人才自主培养机制造就高水平创新型人才队伍.pptx VIP
文档评论(0)