Font Size: a A A

Research On The Penetration Techniques Of Personal Firewall Based Http-tunnel

Posted on:2011-12-21Degree:MasterType:Thesis
Country:ChinaCandidate:F C LiuFull Text:PDF
GTID:2178360308452587Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet,People's work and life has been increasingly relied on network. Attacking network means emerges endlessly and network security issues have become particularly important. To prevent malicious network attack, more and more networked hosts use the personal firewall. With the maturity of personal firewall technology and the widespread use of personal firewall, malicious network attack damage and influence has been effectively restrained. Personal firewall technology protects the safety of network; On the other hand, some Trojans and tools can not work well. Nowadays the firewall technology can detect and identify the most traditional Trojans, and set the intercept. Trojans can't work properly, so we need to study a new technology to penetrate personal firewall network communication. Based on the research and analysis of the Windows operating system architecture and personal firewall technology,this paper presents the firewall penetrating technology based on HTTP-tunnel combining with reverse-link, and achieves the module penetrating through the firewall. The actual firewall tests validate the effectiveness of the method.First describes the Windows architecture. It introduces the overall structure and the layers of Windows; then it introduces the components of Windows and their use; it introduces emphatically the network components of Windows.Then this paper introduces the firewall technology. First, it introduces definition and function of the firewall; then it points out the weakness of the firewall, which provides the consideration of the further study for firewall penetrating communication technology; it mainly introduces personal firewall technology and personal firewall network packets intercepted technology based on Windows platform. After introducing the firewall detection theory, this paper designs and realizes a firewall detection system. The system can detect whether there is a firewall on the target machine, what type of firewall has been installed and what services (ACL rules) the firewall allows into, and then determines the weaknesses of the firewall.Finally, after reviewing and analyzing several technologies of application-layer firewall penetration, this paper presents the firewall penetrating technology based on HTTP-tunnel combining with reverse connection, designs and implements a firewall penetrating communication module of HTTP-tunnel.This paper finally achieves penetrating the personal firewall based on HTTP-tunnel combining with reverse connection. Through the test, it works well and can penetrate all popular firewalls, which validates the efficiency and reliability of the system.
Keywords/Search Tags:Firewall penetrating, Windows system structure, Firewalking detection, Reverse connection, HTTP-tunnel communication
PDF Full Text Request
Related items