Anhui Vocactional & Technical College of Industry & Trade
µÚ¶þ´úľÂíµÄÑо¿ÓëʵÏÖ
Research and implementation of second generation Trojan
±Ï Òµ ÂÛ ÎÄ
ËùÔÚϵԺ£º ¼ÆËã»ú¼¼Êõϵ רҵ°à¼¶£º 2013¼¶¼ÆËã»úÓ¦Óü¼Êõ1°à ѧÉúѧºÅ£º 2013290108 ѧÉúÐÕÃû£º Ī Èç Ö¸µ¼½Ìʦ£º ÉÌ ½Ü
¶þ©–Ò»Áù Äê ËÄ Ô ¶þÊ® ÈÕ
°²»Õ¹¤Ã³Ö°Òµ¼¼ÊõѧԺ±ÏÒµÂÛÎÄ
µÚ¶þ´úľÂíµÄÑо¿ÓëʵÏÖ
Õª Òª; Ëæ×ÅÐÅÏ¢»¯Ê±´úµÄµ½À´ÈËÀàÉç»áÉú»î¶ÔÒòÌØÍøµÄÐèÇóÈÕÒæÔö³¤£¬Ê¹µÃ¼ÆËã»úÍø
Âç¼¼ÊõѸËÙ·¢Õ¹ºÍÆÕ¼°¡£ÒòÌØÍøÊ¹µÃÈ«ÊÀ½ç¶¼ÁªÏµµ½ÁËÒ»Æð¡£¼«´óµÄ´Ù½øÁËÈ«ÇòÒ»Ì廯µÄ·¢Õ¹¡£µ«ÊÇËæ×Å»¥ÁªÍøµÄÆÕ¼°ºÍÓ¦ÓõIJ»¶Ï·¢Õ¹£¬¸÷Öֺڿ͹¤¾ßºÍÍøÂçÊֶε¼ÖÂÍøÂçºÍÓû§ÊÕµ½²Æ²úËðʧ£¬ÆäÖÐ×îÑÏÖØµÄ¾ÍÊÇľÂí¹¥»÷ÊֶΡ£ËüÒÔÆä¹¥»÷·¶Î§¹ã¡¢Î£º¦´óµÈÌØµã³ÉΪ³£¼ûµÄÍøÂç¹¥»÷¼¼ÊõÖ®Ò»£¬¶ÔÕû¸ö»¥ÁªÍøÕÕ³ÉÁ˼«´óµÄΣº¦¡£±¾ÎÄ·ÖÎöÁËľÂí²¡¶¾µÄ»ù±¾ÔÀí£¬Õë¶ÔľÂí²¡¶¾µÄÌØÕ÷¡¢´«²¥Í¾¾¶µÈ·ÖÎö½á¹û£¬ÕÒ³ö¼ÆËã»ú¸ÐȾ²¡¶¾µÄÔÒò¡£²¢ÇÒ¶ÔľÂí²¡¶¾µÄÖÖÀà¡¢¼ÓÔØ¼¼Êõ¼°ÏÖ×´½øÐÐÁËÏêϸµÄÑо¿£¬Ìá³öÁËÍêÉÆµÄ·À·¶½¨Òé¡£
¹Ø¼ü´Ê£ºÄ¾Âí²¡¶¾£»ÍøÂ簲ȫ£»×Ô¶¯¼ÓÔØ£»Îļþ½Ù³Ö¡£
I
°²»Õ¹¤Ã³Ö°Òµ¼¼ÊõѧԺ±ÏÒµÂÛÎÄ
ABSTRACT
With the growing demand for information technology era of human social life on the Internet, computer network technology rapid development and popularization. The Internet makes the whole world is linked to together. Greatly contributed to the development of global integration. But with the popularity of the Internet and the continuous development of the application, a variety of hacking tools and network means the network and the user receives property damage, the most serious of which is Trojan attacks. With its wide range of attacks, hazards and other characteristics to become one of the common network attack techniques, the entire Internet according to become great harm.
Keywords: Trojan; network security; Automatically loaded £»File hijacked
II
°²»Õ¹¤Ã³Ö°Òµ¼¼ÊõѧԺ±ÏÒµÂÛÎÄ
Ŀ ¼
Õª Òª; ............................................................................................................................................ I ABSTRACT ................................................................................................................................... II ÒýÑÔ ................................................................................................................................................. 2 µÚÒ»Õ ľÂí²¡¶¾µÄ¸ÅÊö¼°ÏÖ×´ ................................................................................................... 3
1.1 ľÂíµÄ»ù±¾ÌØÕ÷ ............................................................................................................. 3 1.2ľÂíµÄ´«²¥Í¾¾¶ ...................................................................................................................... 4 1.3ľÂí²¡¶¾µÄΣº¦ ...................................................................................................................... 5 µÚ¶þÕ ľÂí²¡¶¾µÄÏÖ×´ ............................................................................................................... 5
2.1 ÌØÂåÒÁľÂíµÄ·¢Õ¹ ......................................................................................................... 6 2.2ľÂí²¡¶¾µÄÖÖÀà .............................................................................................................. 7 µÚÈýÕ ľÂí²¡¶¾µÄ·¢Õ¹Ç÷ÊÆ ....................................................................................................... 9 µÚËÄÕ ľÂí²¡¶¾µÄ»ù±¾ÔÀí ..................................................................................................... 12 µÚÎåÕ ľÂí²¡¶¾µÄ·À·¶ .............................................................................................................. 18
1