Research based on Kali about Anti-Virus Trojan TechnologyAbstract:In today's society,the rapid development of information technology,the open Internet notonly brings great convenience to people,but also quickly spread malicious code.Hackers use maliciousprograms to attack and hide in people's computers,stealing,destroying,extorting the victim'sinformation data,or monitoring the user's behavior.The confrontation between virus and antivirus isthe most intense and largest game in the field of computer security,and this is also where theconfrontation breaks out in the field of computer security.In this paper,through research on theprinciple mechanism of anti-virus software and anti-killing technology,based on the tools of kali linuxoperating system,and from a practical perspective,three anti-killing remote control Trojans have beenproduced and are currently the two most popular domestic giants Tested under antivirus softwarefrom security vendors,they are 360 Security Guard and Tencent Security Manager.Under the shell command of obtaining the target computer,the permission boundary ofpost-penetration testing in the presence of antivirus software was explored.The experimental results show that the three anti-killing Trojans made in this article can effectivelybypass anti-virus software such as 360 security guards and Tencent security housekeeper,and canobtain considerable target aircraft information in post-penetration testing.Keywords:Security,kali linux,anti-virus,post-penetration testing
暂无评论内容