Font Size: a A A

Research On Network Penetration Testing Based On Trojan Horse

Posted on:2014-01-06Degree:MasterType:Thesis
Country:ChinaCandidate:Z F XieFull Text:PDF
GTID:2268330401477611Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Along with the progress of the society, the rapid development of computer network technology, information level from all walks of life are continually deepening, but as the came the increasingly serious network security problems, this problem has become a hot issue in the field of the computer, it has received wide attention of scholars both at home and abroad and attract a large number of experts to the field.As a commonly used network security assessment technology, penetration testing can simulate attacks on the network system, as far as possible comprehensively detect the weak link of target network security, provide thorough penetration testing report for system administrator, assess the security situation of target network, and provide the appropriate upgrade and maintenance measures, improve the security level of target network system.Penetration testing is studied and Trojan technology is presented in this paper, on this basis, the idea of penetration testing is discussed based on the Trojan horse technology, and the design and implementation has carried on, this paper discusses the penetration testing in network security applications.This article mainly has carried on the following work:1. Penetration testing process for the four stages were analyzed, the technology used in the four stages has been analyzed.2. Studied the current Trojan technology, this paper carried the overall design for penetration testing system based Trojan horse, analysis and research the key technology used in the system, achieved a Trojan-based penetration testing system.3. Through some of the characteristics of data of target network monitored in the experiment, it is known that target network security vulnerabilities existed in the system can be well detected by penetration testing based on Trojan horse, based on this, some defensive measures have been made to improve the security of the target network.
Keywords/Search Tags:Trojan horse technology, penetration testing, network security assessment
PDF Full Text Request
Related items