Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Experiment 4 of Network Security Technology

2025-04-11 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Experiment 4 * Technical experiment

Experimental goal

This experiment learns the use of Glacier remote control software. through experiments, we can understand the difference between * * and computer viruses, and be familiar with the principles and methods of using * * to network * *.

Technical principle

L * program is a popular virus file at present. unlike ordinary viruses, it does not reproduce itself, nor does it deliberately infect other files. It attracts users to download and execute by disguising itself. It provides the seeder with a door to open the computer of the seeded person, so that the seeder can destroy and steal the files of the seeded person at will, and even remotely control the computer of the seeded person. * is somewhat similar to the remote control software often used in computer networks, but because the remote control software is well-intentioned, it is usually not hidden; * on the contrary, it is intended to achieve stealing remote control.

L it refers to controlling another computer through a specific program (* program). * there are usually two executable programs: one is the client, that is, the control side, and the other is the server, that is, the controlled side. It is the server part that is implanted into the seeded computer, and * uses the controller to access the computer that runs the server. After running the server that runs the program, one or more ports on the victim's computer will be opened, so that the victim can use these open ports to enter the computer system, and there will be no guarantee of security and personal privacy. The designers of *. Once the * * service is run and connected by the control side, the control side will enjoy most of the operation rights of the server, such as adding passwords to the computer, browsing, moving, copying, deleting files, modifying the registry, changing the computer configuration, and so on.

With the development of virus writing technology, * * programs pose a growing threat to users, especially some * * programs use extremely cunning means to hide themselves, making it difficult for ordinary users to detect after poisoning.

The steps of the experiment:

1. Install and use Glacier *

2. Observe the characteristics and system characteristics of glaciers.

Experimental equipment

PC 2; switch; network cable

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report