Font Size: a A A

Research And Implementation Of Remote Penetration Schem Based On DNS Spoofing

Posted on:2012-12-21Degree:MasterType:Thesis
Country:ChinaCandidate:L X KongFull Text:PDF
GTID:2178330332487561Subject:Information security
Abstract/Summary:PDF Full Text Request
With the rapid development of computer and network technology, people inevitably have to face the growing threat caused by the openness and freedom of the network when they enjoy more and more applications on the Internet, variety of network crime seriously affect the individual, society and the national security. However, the network complexity and secrecy of cybercrime make it increasingly difficult to track, control, collect evidence and combat the criminals. Although the Internet polices and network security managers who own computer skills and the access to network resources have played an important role, the effect of the existing techniques are still limited, we need to further study new techniques and nethods. This paper studies remote penetration based on DNS spoofing, according to which the network polices and security managers can take remote penetration to criminals' hosts taking the advantage of attack technology and access to resourses. The main work of this paper is as follows:1) analyze and summarize the principle of ralate knowledge and technology which is needed in the fight against cybercrime, including:user behavior analysis, domain name system, Windows network architecture, exploit technology and so on.2) under the backgroud of the Internet, a remote penetration scheme based on DNS spoofing is proposed and key technology involved in the scheme is studied. Further more, compare the advantages and disadvantages of different technology in different modules.3) In the real environment, develope a test system to show the remote penetration based on DNS spoofing, give the overall structure and implementation method of each module in the system. Then, based on the system, make verification and analysis of the feasibility and effectiveness of the scheme in this paper.The result of the experimentation show the strong penetration ability of the program flow designed in this paper, the scheme can be effectively used in the combat against the cyber criminal operations.
Keywords/Search Tags:cybercrime, Internet police, attack technology, DNS spoofing remote penetration
PDF Full Text Request
Related items