Font Size: a A A

Attack Technology Research Aiming At WINDOWS Reduction System

Posted on:2013-01-04Degree:MasterType:Thesis
Country:ChinaCandidate:C ZhengFull Text:PDF
GTID:2218330362959376Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Along with the ascension of computer security awareness, all kinds of reduction systems are widely installed in Windows system now, such as Symantec's Ghost One Key Reduction, Freezing Point Reduction, Reduction Elves, etc. But the attack and defense technology is the unity of opposites, now there appeared many attack Windows reduction system viruses, Trojans, malicious softwares, and they have brought great security hidden danger to our host systems.This paper first expounded on the types and common technologies of Windows reduction system, mainly including the reduction based on Ghost image file and the reduction based on virtual disk technology, and contained the disk parameters, disk addressing ways, disk structure, driver, the basic principle of the redution card and the reduction software.Then gave the design and implementation of the Trojan virus technology through reduction system based on virtual disk.This paper then expounded on the Ghost image file format, including drive format and partition format, and gave the design and implementation of parsing the Ghost image file.and analyzed the back door attack technology of the Ghost reduction technology, and realized the Ghost image file through command line tool. This tool can read Ghost image file, display the complete document catalogue information, and be able to write the back door to the files to realize the Trojan hidden. It contained gaining indexs module, loading indexs module, showing file directory module, implanting file module. Finally this paper put forward the prevention and detection of using all of these methods to stay viruses and Trojans hidden, ensured the security and integrity after the restoration of the system.
Keywords/Search Tags:Windows Reduction, Ghost, Trojan Virus, Pass Through, Stay Hidden
PDF Full Text Request
Related items