µÚ¶þ´úľÂíµÄÑо¿ÓëʵÏÖ ±ÏÒµÂÛÎÄ ÏÂÔØ±¾ÎÄ

Anhui Vocactional & Technical College of Industry & Trade

µÚ¶þ´úľÂíµÄÑо¿ÓëʵÏÖ

Research and implementation of second generation Trojan

±Ï Òµ ÂÛ ÎÄ

ËùÔÚϵԺ£º ¼ÆËã»ú¼¼Êõϵ רҵ°à¼¶£º 2013¼¶¼ÆËã»úÓ¦Óü¼Êõ1°à ѧÉúѧºÅ£º 2013290108 ѧÉúÐÕÃû£º Ī Èç Ö¸µ¼½Ìʦ£º ÉÌ ½Ü

¶þ©–Ò»Áù Äê ËÄ Ô ¶þÊ® ÈÕ

°²»Õ¹¤Ã³Ö°Òµ¼¼ÊõѧԺ±ÏÒµÂÛÎÄ

µÚ¶þ´úľÂíµÄÑо¿ÓëʵÏÖ

Õª Òª; Ëæ×ÅÐÅÏ¢»¯Ê±´úµÄµ½À´ÈËÀàÉç»áÉú»î¶ÔÒòÌØÍøµÄÐèÇóÈÕÒæÔö³¤£¬Ê¹µÃ¼ÆËã»úÍø

Âç¼¼ÊõѸËÙ·¢Õ¹ºÍÆÕ¼°¡£ÒòÌØÍøÊ¹µÃÈ«ÊÀ½ç¶¼ÁªÏµµ½ÁËÒ»Æð¡£¼«´óµÄ´Ù½øÁËÈ«ÇòÒ»Ì廯µÄ·¢Õ¹¡£µ«ÊÇËæ×Å»¥ÁªÍøµÄÆÕ¼°ºÍÓ¦ÓõIJ»¶Ï·¢Õ¹£¬¸÷Öֺڿ͹¤¾ßºÍÍøÂçÊֶε¼ÖÂÍøÂçºÍÓû§ÊÕµ½²Æ²úËðʧ£¬ÆäÖÐ×îÑÏÖØµÄ¾ÍÊÇľÂí¹¥»÷ÊֶΡ£ËüÒÔÆä¹¥»÷·¶Î§¹ã¡¢Î£º¦´óµÈÌØµã³ÉΪ³£¼ûµÄÍøÂç¹¥»÷¼¼ÊõÖ®Ò»£¬¶ÔÕû¸ö»¥ÁªÍøÕÕ³ÉÁ˼«´óµÄΣº¦¡£±¾ÎÄ·ÖÎöÁËľÂí²¡¶¾µÄ»ù±¾Ô­Àí£¬Õë¶ÔľÂí²¡¶¾µÄÌØÕ÷¡¢´«²¥Í¾¾¶µÈ·ÖÎö½á¹û£¬ÕÒ³ö¼ÆËã»ú¸ÐȾ²¡¶¾µÄÔ­Òò¡£²¢ÇÒ¶ÔľÂí²¡¶¾µÄÖÖÀà¡¢¼ÓÔØ¼¼Êõ¼°ÏÖ×´½øÐÐÁËÏêϸµÄÑо¿£¬Ìá³öÁËÍêÉÆµÄ·À·¶½¨Òé¡£

¹Ø¼ü´Ê£ºÄ¾Âí²¡¶¾£»ÍøÂ簲ȫ£»×Ô¶¯¼ÓÔØ£»Îļþ½Ù³Ö¡£

I

°²»Õ¹¤Ã³Ö°Òµ¼¼ÊõѧԺ±ÏÒµÂÛÎÄ

ABSTRACT

With the growing demand for information technology era of human social life on the Internet, computer network technology rapid development and popularization. The Internet makes the whole world is linked to together. Greatly contributed to the development of global integration. But with the popularity of the Internet and the continuous development of the application, a variety of hacking tools and network means the network and the user receives property damage, the most serious of which is Trojan attacks. With its wide range of attacks, hazards and other characteristics to become one of the common network attack techniques, the entire Internet according to become great harm.

Keywords: Trojan; network security; Automatically loaded £»File hijacked

II

°²»Õ¹¤Ã³Ö°Òµ¼¼ÊõѧԺ±ÏÒµÂÛÎÄ

Ŀ ¼

Õª Òª; ............................................................................................................................................ I ABSTRACT ................................................................................................................................... II ÒýÑÔ ................................................................................................................................................. 2 µÚÒ»Õ ľÂí²¡¶¾µÄ¸ÅÊö¼°ÏÖ×´ ................................................................................................... 3

1.1 ľÂíµÄ»ù±¾ÌØÕ÷ ............................................................................................................. 3 1.2ľÂíµÄ´«²¥Í¾¾¶ ...................................................................................................................... 4 1.3ľÂí²¡¶¾µÄΣº¦ ...................................................................................................................... 5 µÚ¶þÕ ľÂí²¡¶¾µÄÏÖ×´ ............................................................................................................... 5

2.1 ÌØÂåÒÁľÂíµÄ·¢Õ¹ ......................................................................................................... 6 2.2ľÂí²¡¶¾µÄÖÖÀà .............................................................................................................. 7 µÚÈýÕ ľÂí²¡¶¾µÄ·¢Õ¹Ç÷ÊÆ ....................................................................................................... 9 µÚËÄÕ ľÂí²¡¶¾µÄ»ù±¾Ô­Àí ..................................................................................................... 12 µÚÎåÕ ľÂí²¡¶¾µÄ·À·¶ .............................................................................................................. 18

1