摘要
木马技术是网络安全的重要方面,也是网络攻防中获取信息的重要途径。从本质上讲,木马就是一个网络服务程序,由客户端进行控制,来执行某些特定的命令。但是由于其应用场合的特殊性,使得木马的设计实现在很多方面有别于普通的服务程序,其中最主要的是隐藏技术、控制手段和信息获取等三方面,本文将从这些方面着重讨论Linux环境下的木马技术。
Trojan horse technology is an important part in the research of network security, and it is also an important way to get the important information from the network. The Trojan horse is essentially a network program that works as a server in the hacked host computer, and can be controlled by the client to execute some command in the host. But because the working environment is special, the Trojan horse has much more difference from other ordinary network program and must be designed specially. It mainly include that the Trojan should consider the way of hiding, controled way and information gotten. This paper will discusse the Trojan horse technology in the Linux environment from three aspects.
出处
《微计算机信息》
北大核心
2006年第03X期31-33,共3页
Control & Automation
基金
国家自然科学基金项目(60272035)
关键词
木马
LINUX
统安全
内核入侵
Trojan horse
Linux
system security
kernel hacking