Font Size: a A A

Research On Network Attack Technology Implementation

Posted on:2008-02-12Degree:MasterType:Thesis
Country:ChinaCandidate:J HuangFull Text:PDF
GTID:2178360272469513Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Network security become more and more important with the widely use of computer system. Network struggle will be a new style of future information campaign in the military affair, and network attack technology is an indispensable weapon of network struggle. Research of network attack technology is great significance on both military and civilian use.This paper analyses the existing network attack technology included: target survival detection, port scanning technology, operation system detection, vulnerability classification, vulnerability detection method, using of vulnerability, Trojan classification, key technology of Trojan etc. On base of summarizing basic network attack methods, designs and implements NNRIS (Nasl-based Network Remote Inbreak System) with high applicability and performance, easy to use and extension and integrating detection, infiltration and control together.The paper also discusses vulnerability detection technology based on script. Describe the theory of detecting vulnerability by NASL script and detail of relevant technology, included: work flow of NASL vulnerability detection, basic syntax of script, accidence and syntax analysis, explanation and execution of script etc. Discuss the theory of using of vulnerability of buffer overflow with future development trend of vulnerability using technology. And implement the solution using of vulnerability of buffer overflow project based on TEB(Thread Environment Block), PE(Portable Executable). Besides, on base of basic need of network remote monitoring, also discusses the key technology of screen image monitoring, program hiding in target control and information capturing.The result shows NNRIS system can finish a series of steps in basic information detection, system vulnerability detection, from using of vulnerability to intrusion, and integrate these steps effectively. This system can be used as tool of both network attack and security evaluation, and it has big practical value.
Keywords/Search Tags:Network Attack, Network Inbreak, Vulnerability Detection, Vulnerability Invasion, Vulnerability Detection Script
PDF Full Text Request
Related items