Font Size: a A A

Windows System Remote Close To Take The Research And Application Of The System

Posted on:2011-04-21Degree:MasterType:Thesis
Country:ChinaCandidate:Z ManFull Text:PDF
GTID:2208330335497368Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In recent years, as China's rapid development of Internet, and with the popularization of computer and network technology, China has entered a new Information Network Age. More and more people are becoming increasing dependent on computer and network in their living, learning and working, so the convenience of e-commerce and network has been developed and reflected vigorously. In such environment, the cyber crimes related to the computer and network are also increasingly rampant, and the computer attacks in network have emerged in endlessly, so this kind of high-tech crime has brought to the whole community and people increasing harms.In this thesis, based on the problems encountered with the secretly forensics personnel in their actual remote control jobs, combined with the demands of domestic investigations of network forensics and special institutions of secretly obtaining data, taking examples from a lot of technical information and literatures and previous core technology research findings, through a lot of exploratory researches on remote control technology's development in user mode and core state, the remote control system with deep invisibility has been designed and implemented finally, which can well resolve the actual technical difficulties encountered with the investigation and forensics personnel via remote computer.This thesis firstly elaborates the status and development trend of remote control technology and analyzes the current situation at home and abroad in this area, and also describes the basic concepts of remote control system and its basic knowledge and theories to implement it. Secondly, the function frame of remote control system has been designed and brought to specific realization by using network programming SOCKETS and WINDOWS system programming API. Then, a lot of spaces are used to discuss in detail the most core techniques of remote control system, through which can the system be hidden and presence in the remote computer to the maximum extent. These technologies are WINDOWS hook technology, hiding technology based on DLL insert, hiding technology based on Svchost call services, SSDT hook technology and the kernel object manipulation techniques, which can not only enhance the system's invisibility, safety and reliability, but also through studying the tunneling protocol, can make the system avoid the firewall filtering and realize the hidden secure transmission of data.Following, in this thesis, through a series of functional tests directing to the remote control system, by analyzing the properties and characteristics of this system, it is resulted that all function parameters as original designed according to functional requirements have been achieved through repeated testing and verifications, which is invisibility, security and reliability when the system in the remote controlled computer.Finally, this thesis is closed to a summary of remote control system's implementation from the perspective f technology development and application development, and putting forward to the future development of this system.
Keywords/Search Tags:Remote control, Trojans, cyber crime, system programming, network structure, tunneling protocol
PDF Full Text Request
Related items