Font Size: a A A

Research And Discussion On Network Security Technology Based On Linux Kali

Posted on:2017-03-13Degree:MasterType:Thesis
Country:ChinaCandidate:Q LiuFull Text:PDF
GTID:2308330482989858Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In the information technology developed today, in Internet technology into millions of households that people with its inseparable., hackers and anti hacker,constitutes the invisible touched the battlefield information on the offensive and defensive opposition contradiction. Whether it is to break all kinds of information systems for the music of hackers or information security workers, in the system of Internet security, information gathering stage is a very important link. Information collection, which is to achieve DNS, host, network, the operating system of the target host, such as the summary of information. How do you get this information?Kali Linux for information collection, sniffing provides great convenience and many solutions.The network security technology and more emphasis on practicality, so I do a lot of experiments with the. Network security is comprehensive, from the use of loopholes in the underlying architecture of the various operating systems and the website backstage, hacking tools written, to the network server hardware vulnerabilities, network sniffer technology, packet analysis determines the network security defense line, so in the form of written is some scattered, but the network security industry is such a need a lot of from the Internet, software development even the skills of social engineering, are woven together. Journal of "network security technology famous hacker defense" of Internet security is the classic "in the attack and defense unity and opposition to seek a breakthrough". Network security is a double-edged sword.In this paper, the Linux Kali system is more representative of several software experiments. Describes the data packet sniffer, gateway spoofing, ARP poisoning,hackers and other commonly used technology of port scanning. Use Linux Kali Python in the preparation of a similar Nmap port scanning software.In introducing the use of hacking tools at the same time described in detail themeaning of each command and involves a lot of computer network technology and the underlying principle. Hacker technology is not a simple technology, but not a discipline, it is a complex system, a person want to master all the method of attack and difficult, so we need to a powerful network security team, looking for a set of effective network attack and defense mechanism, the cloud network such as a group of special group of exposed behind the website and information system vulnerabilities of the site actually is some white hat hacker team, there’s no shortage of some of the national team, such as public security organs of the network security detachment, the author participated in network security training organized by the Public Security Bureau, benefit bandit is shallow. In the network attack and defense,we not only need to script kiddies, need to be able to from a highly comprehensive expert system, in this regard, the technical level of our country still has a long way to go.
Keywords/Search Tags:Kali Linux, hacker, sniffing, information
PDF Full Text Request
Related items