The Study of Computer Penetration Technology and Experimental Scenario Creation in a Virtual Environment
碩士 === 國防大學理工學院 === 資訊工程碩士班 === 104 === We now live in an era of information explosion and computer devices play an essential part of people’s lives. It is not only making information delivery easier, but also changing our lifestyle completely. Due to the popularization of computers, information...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2016
|
Online Access: | http://ndltd.ncl.edu.tw/handle/82843220170321011547 |
id |
ndltd-TW-104CCIT0394003 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-104CCIT03940032017-08-27T04:29:55Z http://ndltd.ncl.edu.tw/handle/82843220170321011547 The Study of Computer Penetration Technology and Experimental Scenario Creation in a Virtual Environment 虛擬訓練環境下主機滲透技術研究與場景建置 TSAI,MENG-DIAN 蔡孟典 碩士 國防大學理工學院 資訊工程碩士班 104 We now live in an era of information explosion and computer devices play an essential part of people’s lives. It is not only making information delivery easier, but also changing our lifestyle completely. Due to the popularization of computers, information security incidents increased year by year. The scope of information security threats ranged from individuals to national government departments. In such a tough environment, how to strengthen information security measures becomes an urgent issue worldwide. The purpose of this thesis is to build up a server-based virtual training system which allows users practicing information security attack and defense technology through the scene. We first discuss host penetration techniques, information theft techniques, and experimental environment building technology. Then, through technical aespect, we introduce how to use experiment tools such as rainbow tables descrambler, Nmap scan tool and Metasploit to execute remote intrusion and steal data. Finally, we explain in detail how to construct a complete virtual network environment, create experimental scenarios, and implement host penetration technology in this environment. Keywords: Host Penetration, Rainbow Table, Nmap, Metasploit LU,YI-BIN 陸儀斌 2016 學位論文 ; thesis 80 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國防大學理工學院 === 資訊工程碩士班 === 104 === We now live in an era of information explosion and computer devices play an essential part of people’s lives. It is not only making information delivery easier, but also changing our lifestyle completely. Due to the popularization of computers, information security incidents increased year by year. The scope of information security threats ranged from individuals to national government departments. In such a tough environment, how to strengthen information security measures becomes an urgent issue worldwide.
The purpose of this thesis is to build up a server-based virtual training system which allows users practicing information security attack and defense technology through the scene. We first discuss host penetration techniques, information theft techniques, and experimental environment building technology. Then, through technical aespect, we introduce how to use experiment tools such as rainbow tables descrambler, Nmap scan tool and Metasploit to execute remote intrusion and steal data. Finally, we explain in detail how to construct a complete virtual network environment, create experimental scenarios, and implement host penetration technology in this environment.
Keywords: Host Penetration, Rainbow Table, Nmap, Metasploit
|
author2 |
LU,YI-BIN |
author_facet |
LU,YI-BIN TSAI,MENG-DIAN 蔡孟典 |
author |
TSAI,MENG-DIAN 蔡孟典 |
spellingShingle |
TSAI,MENG-DIAN 蔡孟典 The Study of Computer Penetration Technology and Experimental Scenario Creation in a Virtual Environment |
author_sort |
TSAI,MENG-DIAN |
title |
The Study of Computer Penetration Technology and Experimental Scenario Creation in a Virtual Environment |
title_short |
The Study of Computer Penetration Technology and Experimental Scenario Creation in a Virtual Environment |
title_full |
The Study of Computer Penetration Technology and Experimental Scenario Creation in a Virtual Environment |
title_fullStr |
The Study of Computer Penetration Technology and Experimental Scenario Creation in a Virtual Environment |
title_full_unstemmed |
The Study of Computer Penetration Technology and Experimental Scenario Creation in a Virtual Environment |
title_sort |
study of computer penetration technology and experimental scenario creation in a virtual environment |
publishDate |
2016 |
url |
http://ndltd.ncl.edu.tw/handle/82843220170321011547 |
work_keys_str_mv |
AT tsaimengdian thestudyofcomputerpenetrationtechnologyandexperimentalscenariocreationinavirtualenvironment AT càimèngdiǎn thestudyofcomputerpenetrationtechnologyandexperimentalscenariocreationinavirtualenvironment AT tsaimengdian xūnǐxùnliànhuánjìngxiàzhǔjīshèntòujìshùyánjiūyǔchǎngjǐngjiànzhì AT càimèngdiǎn xūnǐxùnliànhuánjìngxiàzhǔjīshèntòujìshùyánjiūyǔchǎngjǐngjiànzhì AT tsaimengdian studyofcomputerpenetrationtechnologyandexperimentalscenariocreationinavirtualenvironment AT càimèngdiǎn studyofcomputerpenetrationtechnologyandexperimentalscenariocreationinavirtualenvironment |
_version_ |
1718518995814973440 |