摘 要
木馬是用于遠程控制的黑客工具,被黑客用來遠程操作他人計算機、監視別人和盜竊別人帳號、密碼和數據等,以達到破壞他人計算機、偷竊別人隱私和得到經濟利益的目的。作為網絡安全管理人員,認真地研究木馬攻擊技術,理清木馬攻擊手段與過程,提早思考應對策略是防御木馬攻擊的有效途徑。因此,在木馬已對網絡與信息安全構成極大危險的時代研究木馬技術、編寫木馬程序,對于防護網絡安全、促進電子商務的發展具有重要的現實意義。
文中在深入研究國內外木馬技術與發展方向的基礎上,介紹了木馬的發展與現狀以及木馬組成與特性;對反彈端口木馬的連接方法進行了具體詳盡的分析。充分利用傳統防火墻疏于對向外連接的過濾這一特點,使用Visual C++ 6.0進行Socket網絡編程開發而成。實現了木馬繞過防火墻建立連接;實現木馬的隱藏、自動運行等基本特性,讓服務端光驅彈出、機箱播放音樂等功能。文中細致地描繪了木馬的功能執行過程。最后提供了全面的測試結果。
關鍵詞:木馬;反彈端口;服務端;客戶端;套接字
Design and Implementation of Rebound Ports Trojan horse
Abstract
The Trojan horse is a kind of hacker’s tool which is used for remote control and operating others’ computers, monitoring and stealing others’ account numbers, passwords and data and so on, in order to destroy others’ computers or get their privacy and economic interests. As the Internet security manager, we should pay attention to preventing the Trojan horse when we detect and delete the Trojan horse. We must study the technology of the Trojan horse attack, clear the means and process of the Trojan horse to find an efficient path to prevent the Trojan horse attack ahead of time. So at the time that the Trojan horse is dangerous to the network and security of information, we should study the technology of the Trojan horse and code the Trojan horse programs, which is significant to protect the Internet security and promote the development of the e-business.
The thesis is writen on the bases of deeply studying the Trojan horse technique and development orientation at home and overseas, then, introduces the development and current situation of Trojan horse and its component as well as characteristics. This thesis analyzes the method of how to connect with Rebound Ports Trojan horse in detail. Making full use of which the firewall neglect to filter the Rebound Ports Trojan horse, it is developed by Visual C++6.0. The design has realized the function which the service could connect the client actively, also implemented the basic characteristics of concealment, automatic running, rebounding the CD-ROM of services, chassis playing music and so on. At last the paper describes the progress of executing Trojan horse and affords all-around test result.