Trojan horse is a kind of tool programs, which has the characteristics of concealment and unauthorization, based on the computer remote-control technique.According to the techniques the Trojan Horses can be called as neither good nor evil. For the purpose of national security, it is necessary to control specific computers remotely and secretly in specific duration and/or at specific sites. The techniques are the same as used by Trojan horses. In this thesis, based on the materials on Trojan horses collected from all over the world, the principles and implementation styles of recent popular Trojan horse techniques are comprehensively analyzed, especially focused on the concealing, communicating between foreground and background, and auto-downloading. Then a Trojan horse utility program is designed and implemented for the business of the NSA (National Security Affairs). It is a smaller program with some powerful functionality. It can pass through the Trojan horse tool check, bypass the blocking by firewalls and routers, and be rebooted and removed. It is really concealable and secret, and the controller subprogram is reliable and robust.
|