摘要
本文主要分为两个部分:第一部分主要是介绍了目前存在于计算机系统攻击中最普遍的缓冲区漏洞问题,集中阐述了其溢出原理、利用缓冲区溢出进行攻击的原理;第二部分详细介招了利用缓冲区溢出原理进行木马植入攻击的原理以及实现方式。
This paper is divided tO two parts:the first part mainly introduces the most common attack in computer system which is based on the buffer overflows.It analyses the buffer overflow principle and how to use it to attack system.The second part introduces the principle and the realization of how to use buffer overflow to insert Trojan horse to attack computer system.
出处
《微型电脑应用》
2006年第9期12-14,4,共3页
Microcomputer Applications
关键词
缓冲区
溢出
木马
Buffer
Overflow
Trojan horse