Font Size: a A A

The Design And Implementation Of A Hacker Attack Toolkit

Posted on:2004-05-20Degree:MasterType:Thesis
Country:ChinaCandidate:Y SongFull Text:PDF
GTID:2168360095952961Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Studying and grasping common used methods and tools of hackers can help network security maintenance staffs learn to simulate those attack methods. That makes it possible to find potential security leaks in the network. Then, according to the findings, network security maintenance staff can customize the security policy and amend the leaks. On the other side, these methods and tools can be used to test function and quality performance of the security product such as firewall and IDS.This paper studies and analyzes many kinds of hacker's attack methods and tools. Based on that, this paper puts forward a integrative and intellective toolkit model, which can be expand easily.The main contributions of the paper are listed as follows:1. Studies and analyzes the principle and characters of numerous tools of DoS and scan, the most popular tools of hacker's.2. In order to simulating those attack methods under various network traffic, this paper improves the DoS tools to let user can set the packet-send rate of the DoS by some easy operations.3. Puts forward the overall structure of the toolkit. Explores the integration means and the run mechanism of the tools, which as the ingredient of the toolkit. Finally, this paper puts forward a method to avoid the interfere, which caused by the difference of tools. In the meantime, the expansibility is ensured by the overall structure of the toolkit.4. Designs and implements the software of this toolkit under the linux platform. This tookit integrates lots of attack tools of hacker's. It can simulate 33 kinds of attack methods and invoke the tools automatically and afford some interfaces to manage the tools.The significance of the paper is that it puts forward a new way to study the security of network and puts forward a integrative and intellective overall structure of the toolkit and implements the software of this toolkit under the linux platform.
Keywords/Search Tags:Security of Network, Toolkit, DoS, Scan, Hacker
PDF Full Text Request
Related items