【正文】
中南大學(xué)本科生畢業(yè)論文(設(shè)計(jì))題 目木馬程序設(shè)計(jì)及植入技術(shù)畢業(yè)設(shè)計(jì)(論文)原創(chuàng)性聲明和使用授權(quán)說(shuō)明原創(chuàng)性聲明本人鄭重承諾:所呈交的畢業(yè)設(shè)計(jì)(論文),是我個(gè)人在指導(dǎo)教師的指導(dǎo)下進(jìn)行的研究工作及取得的成果。盡我所知,除文中特別加以標(biāo)注和致謝的地方外,不包含其他人或組織已經(jīng)發(fā)表或公布過(guò)的研究成果,也不包含我為獲得 及其它教育機(jī)構(gòu)的學(xué)位或?qū)W歷而使用過(guò)的材料。對(duì) 本研究提供過(guò)幫助和做出過(guò)貢獻(xiàn)的個(gè)人或集體,均已在文中作了明確的說(shuō)明并表示了謝意。作 者 簽 名: 日 期: 指導(dǎo)教師簽名: 日 期: 使用授權(quán)說(shuō)明本人完全了解 大學(xué)關(guān)于收集、保存、使用畢業(yè)設(shè)計(jì)(論文)的規(guī)定,即:按照學(xué)校要求提交畢業(yè)設(shè)計(jì)(論文)的印刷本和電子版本;學(xué)校有權(quán)保存畢業(yè)設(shè)計(jì)(論文)的印刷本和電子版,并提供目錄檢索與閱覽服務(wù);學(xué)??梢圆捎糜坝?、縮印、數(shù)字化或其它復(fù)制手段保存論文;在不以贏利為目的前提下,學(xué)??梢怨颊撐牡牟糠只蛉?jī)?nèi)容。作者簽名: 日 期: 學(xué)位論文原創(chuàng)性聲明本人鄭重聲明:所呈交的論文是本人在導(dǎo)師的指導(dǎo)下獨(dú)立進(jìn)行研究所取得的研究成果。除了文中特別加以標(biāo)注引用的內(nèi)容外,本論文不包含任何其他個(gè)人或集體已經(jīng)發(fā)表或撰寫(xiě)的成果作品。對(duì)本文的研究做出重要貢獻(xiàn)的個(gè)人和集體,均已在文中以明確方式標(biāo)明。本人完全意識(shí)到本聲明的法律后果由本人承擔(dān)。作者簽名: 日期: 年 月 日學(xué)位論文版權(quán)使用授權(quán)書(shū)本學(xué)位論文作者完全了解學(xué)校有關(guān)保留、使用學(xué)位論文的規(guī)定,同意學(xué)校保留并向國(guó)家有關(guān)部門(mén)或機(jī)構(gòu)送交論文的復(fù)印件和電子版,允許論文被查閱和借閱。本人授權(quán) 大學(xué)可以將本學(xué)位論文的全部或部分內(nèi)容編入有關(guān)數(shù)據(jù)庫(kù)進(jìn)行檢索,可以采用影印、縮印或掃描等復(fù)制手段保存和匯編本學(xué)位論文。涉密論文按學(xué)校規(guī)定處理。作者簽名: 日期: 年 月 日導(dǎo)師簽名: 日期: 年 月 日摘 要 黑客技術(shù)是當(dāng)今最火熱的一個(gè)領(lǐng)域,近年來(lái),黑客攻擊層出不窮,對(duì)網(wǎng)絡(luò)安全構(gòu)成了極大的威脅。木馬是黑客的主要攻擊手段之一,它通過(guò)滲透進(jìn)入對(duì)方主機(jī)系統(tǒng),從而實(shí)現(xiàn)對(duì)目標(biāo)主機(jī)的遠(yuǎn)處操作, 破壞力相當(dāng)之大。本文綜合了木馬的發(fā)展過(guò)程,木馬的類(lèi)型,分析了各種木馬的特點(diǎn),揭示了木馬的隱藏方法、特點(diǎn),及木馬的通信方式。本文簡(jiǎn)要分析了Windows操作系統(tǒng)的安全機(jī)制,防火墻,防病毒軟件的工作原理和木馬防范的方法,重點(diǎn)研究了一個(gè)木馬的設(shè)計(jì)及Visual C++的實(shí)現(xiàn)。本文設(shè)計(jì)的不是通常木馬C/S結(jié)構(gòu),它旨在發(fā)送鍵盤(pán)記錄的文件,所以它有兩個(gè)重點(diǎn)部分,本地信息收集部分,以及信息發(fā)送部分。信息收集主要是實(shí)現(xiàn)被植入機(jī)器的記事本程序的鍵盤(pán)記錄,當(dāng)記事本的程序運(yùn)行時(shí),程序中的鍵盤(pán)鉤子就開(kāi)始工作,并且記錄下鍵盤(pán)上的記錄。在信息發(fā)送部分,本文采用了發(fā)送的形式,這樣雖然比較原始,但是這種方式可以避免頻繁地打開(kāi)端口。同時(shí)本文在木馬隱藏部分也做了不少工作。在Win9x與Windows NT方面都做的不錯(cuò)。在Win9x下將木馬注冊(cè)為系統(tǒng)服務(wù),并且使其在進(jìn)程中消失,在Windows NT中,使得其足夠能夠迷惑系統(tǒng)管理員。木馬運(yùn)行后將自動(dòng)將自身復(fù)制到系統(tǒng)目錄下,并且將其命名為一個(gè)類(lèi)似系統(tǒng)文件的名字,使得管理員在眾多的系統(tǒng)文件中,不敢輕易刪除文件。為了盡量防止殺毒軟件和防火墻警報(bào),并且努力避免被系統(tǒng)管理員的察覺(jué),減少被發(fā)現(xiàn)的概率,在通信部分,采用嚴(yán)格控制郵件發(fā)送的次數(shù)和時(shí)間發(fā)送郵件的辦法,并且在發(fā)送郵件前殺死防火墻進(jìn)程,使其逃避防火墻的報(bào)警。關(guān)鍵詞[:,小四號(hào)加粗宋體,英文同] 計(jì)算機(jī)安全, 木馬 , 鍵盤(pán)鉤子, Email, 進(jìn)程隱藏ABSTRACTThe hacker technology nowadays is the angriest field. In recent years, the hacker’s attacks appear endlessly. it is a great threat to work’s security. The Trojan horse is one of the hacker39。s main attack means, that illegally gains access to another host puter system and to obtain secret information or monitor special operations .so it is quiet serious.This text prehensive evolution of Trojan horse and the type of Trojan horse, it also analyses the characteristics of different Trojan horse and announce the method and characteristics of hiding , and the munication way of the Trojan horse.This text has analyzed the security mechanism of Windows operating system and the principle of the fire wall[firewall,后同] and antivirus software briefly , and make a key research on the design of a Trojan horse and realization with Microsoft Visual C++. This text doesn’t designs the usually structure of C/S, aiming at sending the file that the keylog is written down, so it has two key parts, one of them is part of local information gathering keyboard information , the other part is sending information. Information gathering is mainly to realize the notepad keyboard record of the puter which Trojan horse has been planted into 。[標(biāo)點(diǎn)統(tǒng)一英文]when the procedure[進(jìn)程用 process 好些,后邊相關(guān)改下] of the notepad being performed , the keyboard hook in the procedure begins to work, and record the keyboard. In the part of sending information, this text has used the form of sending , though it seems to be more primitive , it is able to avoid of opening the port frequently.At the same time,this text made much effort on the part of Trojan horse hiding. What has been done in Win9x and Windows NT is very well. Register the hobbyhorse for the service of the system under Win9x, and make it disappeared in process, in Windows NT , turn its process name into SVCHOST. EXE[小寫(xiě)] , which is able to confuse the system manager.The Trojan horse will be copied to the systematic catalogue automatically after the hobbyhorse is operated, and will be named as similar one of the systematic files ,which make administrators dare not to delete the file easily among the numerous systematic file .To avoid antivirus software and fire wall’s alarm , the perception of the system manager, and to decrease probability of being percepted Trojan horse .[前面的句子有問(wèn)題,連不上]In munication part, it controls the number of times and time of sending s strictly .Before sending Emails ,it kills the fire wall process , so that it can escape from the alarm of fire wall .KEYWORDS[:] Computer[ ]Security, Trojan[ ]horse, KeyLog, Email, Process[ ]Hiding[英文單詞間都空一格,標(biāo)點(diǎn)緊跟單詞,后空一格較美觀(guān),統(tǒng)一一下吧] 目錄第一章 緒論 .....................................................................................................................1 計(jì)算機(jī)安全背景 ..................................................1 木馬的研究背景 ..................................................1 木馬的產(chǎn)生背景 ..............................................................................................1 木馬的發(fā)展過(guò)程 ...............................................................................................2 木馬的未來(lái) .......................................................................................................2 WINDOWS 安全機(jī)制 ................................................3 研究?jī)?nèi)容與本文所做的工作 ........................................3 本課題的設(shè)計(jì)目的及意義 ..........................................4 論文的組織 ......................................................5第二章 木馬程序的總體設(shè)計(jì)及關(guān)鍵技術(shù)分析 .............................................................6 程序設(shè)計(jì)環(huán)境 ....................................................6 方案分析及基本思想 ..............................................6 程序總體結(jié)構(gòu) ....................................................7 木馬程序的主體部分 ......................................................................................9 WINDOWS 鍵盤(pán)事件監(jiān)控原理 .........................................................................10 電子郵件實(shí)現(xiàn)原理 ........................................................................................11 關(guān)鍵技術(shù) .......................................................15 MFC................................................................................