The Study of Computer Penetration Technology and Experimental Scenario Creation in a Virtual Environment

碩士 === 國防大學理工學院 === 資訊工程碩士班 === 104 === We now live in an era of information explosion and computer devices play an essential part of people’s lives. It is not only making information delivery easier, but also changing our lifestyle completely. Due to the popularization of computers, information...

Full description

Bibliographic Details
Main Authors: TSAI,MENG-DIAN, 蔡孟典
Other Authors: LU,YI-BIN
Format: Others
Language:zh-TW
Published: 2016
Online Access:http://ndltd.ncl.edu.tw/handle/82843220170321011547
id ndltd-TW-104CCIT0394003
record_format oai_dc
spelling ndltd-TW-104CCIT03940032017-08-27T04:29:55Z http://ndltd.ncl.edu.tw/handle/82843220170321011547 The Study of Computer Penetration Technology and Experimental Scenario Creation in a Virtual Environment 虛擬訓練環境下主機滲透技術研究與場景建置 TSAI,MENG-DIAN 蔡孟典 碩士 國防大學理工學院 資訊工程碩士班 104 We now live in an era of information explosion and computer devices play an essential part of people’s lives. It is not only making information delivery easier, but also changing our lifestyle completely. Due to the popularization of computers, information security incidents increased year by year. The scope of information security threats ranged from individuals to national government departments. In such a tough environment, how to strengthen information security measures becomes an urgent issue worldwide. The purpose of this thesis is to build up a server-based virtual training system which allows users practicing information security attack and defense technology through the scene. We first discuss host penetration techniques, information theft techniques, and experimental environment building technology. Then, through technical aespect, we introduce how to use experiment tools such as rainbow tables descrambler, Nmap scan tool and Metasploit to execute remote intrusion and steal data. Finally, we explain in detail how to construct a complete virtual network environment, create experimental scenarios, and implement host penetration technology in this environment. Keywords: Host Penetration, Rainbow Table, Nmap, Metasploit LU,YI-BIN 陸儀斌 2016 學位論文 ; thesis 80 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國防大學理工學院 === 資訊工程碩士班 === 104 === We now live in an era of information explosion and computer devices play an essential part of people’s lives. It is not only making information delivery easier, but also changing our lifestyle completely. Due to the popularization of computers, information security incidents increased year by year. The scope of information security threats ranged from individuals to national government departments. In such a tough environment, how to strengthen information security measures becomes an urgent issue worldwide. The purpose of this thesis is to build up a server-based virtual training system which allows users practicing information security attack and defense technology through the scene. We first discuss host penetration techniques, information theft techniques, and experimental environment building technology. Then, through technical aespect, we introduce how to use experiment tools such as rainbow tables descrambler, Nmap scan tool and Metasploit to execute remote intrusion and steal data. Finally, we explain in detail how to construct a complete virtual network environment, create experimental scenarios, and implement host penetration technology in this environment. Keywords: Host Penetration, Rainbow Table, Nmap, Metasploit
author2 LU,YI-BIN
author_facet LU,YI-BIN
TSAI,MENG-DIAN
蔡孟典
author TSAI,MENG-DIAN
蔡孟典
spellingShingle TSAI,MENG-DIAN
蔡孟典
The Study of Computer Penetration Technology and Experimental Scenario Creation in a Virtual Environment
author_sort TSAI,MENG-DIAN
title The Study of Computer Penetration Technology and Experimental Scenario Creation in a Virtual Environment
title_short The Study of Computer Penetration Technology and Experimental Scenario Creation in a Virtual Environment
title_full The Study of Computer Penetration Technology and Experimental Scenario Creation in a Virtual Environment
title_fullStr The Study of Computer Penetration Technology and Experimental Scenario Creation in a Virtual Environment
title_full_unstemmed The Study of Computer Penetration Technology and Experimental Scenario Creation in a Virtual Environment
title_sort study of computer penetration technology and experimental scenario creation in a virtual environment
publishDate 2016
url http://ndltd.ncl.edu.tw/handle/82843220170321011547
work_keys_str_mv AT tsaimengdian thestudyofcomputerpenetrationtechnologyandexperimentalscenariocreationinavirtualenvironment
AT càimèngdiǎn thestudyofcomputerpenetrationtechnologyandexperimentalscenariocreationinavirtualenvironment
AT tsaimengdian xūnǐxùnliànhuánjìngxiàzhǔjīshèntòujìshùyánjiūyǔchǎngjǐngjiànzhì
AT càimèngdiǎn xūnǐxùnliànhuánjìngxiàzhǔjīshèntòujìshùyánjiūyǔchǎngjǐngjiànzhì
AT tsaimengdian studyofcomputerpenetrationtechnologyandexperimentalscenariocreationinavirtualenvironment
AT càimèngdiǎn studyofcomputerpenetrationtechnologyandexperimentalscenariocreationinavirtualenvironment
_version_ 1718518995814973440