基于kali的免杀木马技术研究

第1页 / 共31页

第2页 / 共31页

第3页 / 共31页

第4页 / 共31页

第5页 / 共31页

第6页 / 共31页

第7页 / 共31页

第8页 / 共31页
试读已结束,还剩23页,您可下载完整版后进行离线阅读
基于kali的免杀木马技术研究-知知文库网
基于kali的免杀木马技术研究
此内容为付费资源,请付费后查看
10
限时特惠
20
立即购买
您当前未登录!建议登陆后购买,可保存购买订单
付费资源
© 版权声明
THE END
Research based on Kali about Anti-Virus Trojan TechnologyAbstract:In today's society,the rapid development of information technology,the open Internet notonly brings great convenience to people,but also quickly spread malicious code.Hackers use maliciousprograms to attack and hide in people's computers,stealing,destroying,extorting the victim'sinformation data,or monitoring the user's behavior.The confrontation between virus and antivirus isthe most intense and largest game in the field of computer security,and this is also where theconfrontation breaks out in the field of computer security.In this paper,through research on theprinciple mechanism of anti-virus software and anti-killing technology,based on the tools of kali linuxoperating system,and from a practical perspective,three anti-killing remote control Trojans have beenproduced and are currently the two most popular domestic giants Tested under antivirus softwarefrom security vendors,they are 360 Security Guard and Tencent Security Manager.Under the shell command of obtaining the target computer,the permission boundary ofpost-penetration testing in the presence of antivirus software was explored.The experimental results show that the three anti-killing Trojans made in this article can effectivelybypass anti-virus software such as 360 security guards and Tencent security housekeeper,and canobtain considerable target aircraft information in post-penetration testing.Keywords:Security,kali linux,anti-virus,post-penetration testing
喜欢就支持一下吧
点赞14 分享
评论 抢沙发
头像
欢迎您留下宝贵的见解!
提交
头像

昵称

取消
昵称表情代码图片

    暂无评论内容