国产精品婷婷久久久久久,国产精品美女久久久浪潮av,草草国产,人妻精品久久无码专区精东影业

windows 系統(tǒng)攻擊技術(shù)研究.doc

    
約42頁DOC格式手機(jī)打開展開

windows 系統(tǒng)攻擊技術(shù)研究,windows 系統(tǒng)攻擊技術(shù)研究 1.67萬字我自己的畢業(yè)論文,原創(chuàng)的,已經(jīng)通過校內(nèi)系統(tǒng)檢測(cè),僅在本站獨(dú)家出售,重復(fù)率低,大家放心下載使用目錄第一章 緒論11.1引 言11.2研究?jī)?nèi)容和組織結(jié)構(gòu)1第二章 windows操作系統(tǒng)概述32.1 windows操作系統(tǒng)簡(jiǎn)述32.2 windows操作系統(tǒng)使用現(xiàn)狀32.3 wi...
編號(hào):150-423047大小:2.39M
分類: 論文>通信/電子論文

內(nèi)容介紹

此文檔由會(huì)員 淘寶大夢(mèng) 發(fā)布

Windows 系統(tǒng)攻擊技術(shù)研究

1.67萬字
我自己的畢業(yè)論文,原創(chuàng)的,已經(jīng)通過校內(nèi)系統(tǒng)檢測(cè),僅在本站獨(dú)家出售,重復(fù)率低,大家放心下載使用

目 錄
第一章 緒論 1
1.1引 言 1
1.2研究?jī)?nèi)容和組織結(jié)構(gòu) 1
第二章 Windows操作系統(tǒng)概述 3
2.1 Windows操作系統(tǒng)簡(jiǎn)述 3
2.2 Windows操作系統(tǒng)使用現(xiàn)狀 3
2.3 Windows操作系統(tǒng)未來及影響 4
第三章 Windows操作系統(tǒng)攻擊技術(shù)簡(jiǎn)介 5
3.1 Windows系統(tǒng)攻擊者的攻擊流程 5
3.2 Windows系統(tǒng)攻擊者典型攻擊技術(shù) 7
3.2.1拒絕服務(wù)攻擊(Do’s) 7
3.2.2 黑客入侵 8
第四章Windows操作系統(tǒng)攻擊技術(shù)的相關(guān)實(shí)驗(yàn) 11
4.1 Windows 系統(tǒng)LC5口令破解實(shí)驗(yàn) 11
4.1.1 實(shí)驗(yàn)?zāi)康?11
4.1.2 實(shí)驗(yàn)原理 11
4.1.3 實(shí)驗(yàn)內(nèi)容 12
4.2 ARP攻擊 22
4.2.1 實(shí)驗(yàn)?zāi)康?22
4.2.2 實(shí)驗(yàn)原理 22
4.2.3 實(shí)驗(yàn)分析 22
4.2.4 IP地址沖突 25
4.3 Windows系統(tǒng)XSS攻擊 28
4.3.1 實(shí)驗(yàn)?zāi)康?28
4.3.2 實(shí)驗(yàn)原理 28
4.3.3 實(shí)驗(yàn)內(nèi)容 29
第五章 基于Windows操作系統(tǒng)攻擊的防范 30
5.1 Windows操作系統(tǒng)端口掃描 30
5.2 個(gè)人計(jì)算機(jī)維護(hù)工具 33
5.3 培養(yǎng)良好的個(gè)人計(jì)算機(jī)使用習(xí)慣 34
結(jié) 論 36
致 謝 37
參考文獻(xiàn) 38

摘要 Windows操作系統(tǒng)擁有全球最多的用戶,它已成為目前市面上的主流操作系統(tǒng),為我們的生活和工作提供了很大的便利。但是如今計(jì)算機(jī)攻擊入侵犯罪活動(dòng)越來越猖獗,Windows操作系統(tǒng)已成為眾多攻擊者所覬覦的攻擊目標(biāo),面臨的威脅包括木馬攻擊、病毒攻擊以及各種惡意攻擊。這些攻擊的危害不言而知,它們會(huì)泄露用戶的秘密信息,攻擊者通過販賣企業(yè)信息、惡意破壞等等手段為用戶帶來無限的利益損害,甚至是損害國(guó)家,地區(qū)等政治和經(jīng)濟(jì)利益。所以Windows系統(tǒng)的安全問題日益得到重視。
本論文介紹了信息安全的概念,Windows操作系統(tǒng)的安全現(xiàn)狀及其發(fā)展趨勢(shì),強(qiáng)調(diào)了其安全的重要性。同時(shí)本文將簡(jiǎn)單系統(tǒng)地講解Windows操作系統(tǒng)攻擊技術(shù),以攻擊者角度,介紹如何進(jìn)行Windows操作系統(tǒng)的攻擊。本設(shè)計(jì)選擇通過研究Windows系統(tǒng)的攻擊技術(shù)的一些攻擊技巧和原理,如LC5口令攻擊,ARP協(xié)議攻擊,xxs緩沖區(qū)溢出攻擊等研究,由淺入深的了解Windows操作系統(tǒng)的缺陷和潛在威脅。針對(duì)技巧、思路和攻擊方法設(shè)計(jì)相應(yīng)的實(shí)驗(yàn),進(jìn)而對(duì)一些典型的攻擊提出了相應(yīng)的解決方法,并采取更能強(qiáng)有力的掌握防范措施。通過這幾個(gè)實(shí)驗(yàn)提高自己對(duì)Windows系統(tǒng)原理的認(rèn)識(shí),了解這些技術(shù)細(xì)節(jié)的基礎(chǔ)上進(jìn)行相應(yīng)的防范措施以保護(hù)計(jì)算機(jī)用戶的信息安全,為使用Windows操作系統(tǒng)的用戶提供一個(gè)安全的保障。

關(guān)鍵詞: Windows系統(tǒng) 安全 攻擊技術(shù) 防范


Research on the Attack Techniques of Windows System
Abstract With the development of Internet and information technology, the great growth has appeared out in information security. This trend lead to more venture, network security issue has become the cardinal task that various kinds of online activity need to consider. At present, one of the biggest problems on network is the attack techniques of windows system. Windows operating system has the most users around the world. Obviously, it has become the mainstream operating system in the market that provides a great convenience for our life and work. But it have been targeted by a lot of attackers is a seriously problem in network security. Including Trojan attacks, virus attacks and malicious attacks. These attacks will reveal the user's secret information, and the attacker damage to the political, corporate information and economic interests of the state, region and so on. So Windows system security issues increasing attention .This paper introduced the concept of information security, security situation and developing trend of Windows operating systems. It stressed the importance of security. This article will simply learn the attack techniques systematically and explain the Windows operating system. Getting the tips, ideas and methods of attack to design appropriate experiments from the attacker perspective. Taking some attack techniques of the Windows operating system, such as LC5 password attack, Windows operating system loophole attack ,and other research, To understand of the complexity of the Windows operating system and to acquire the principles of Windows system Which is designed several technologies related to Windows system attacks experiment. In order to protect the computer user's information security with a secure protection, through the appropriate preventive measures on the basis of these technical details .By understanding the motives of attackers and attack process and reducing the system vulnerability attacks. In the end to make the corresponding preventive measures to protect the information security of computer user. To use the Windows operating system provides users with a security guarantee. I put forward my own opinion of precautionary measures on windows operating system attacking and protecting.
Key words Windows System Security Attack Techniques Prevention