CN104023075A - Internet online secret acquisition system and method - Google Patents

Internet online secret acquisition system and method Download PDF

Info

Publication number
CN104023075A
CN104023075A CN201410267265.8A CN201410267265A CN104023075A CN 104023075 A CN104023075 A CN 104023075A CN 201410267265 A CN201410267265 A CN 201410267265A CN 104023075 A CN104023075 A CN 104023075A
Authority
CN
China
Prior art keywords
online
control program
internet
data
implanted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410267265.8A
Other languages
Chinese (zh)
Inventor
吴志雄
游建友
许辉奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Linewell Software Co Ltd
Original Assignee
Linewell Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Linewell Software Co Ltd filed Critical Linewell Software Co Ltd
Priority to CN201410267265.8A priority Critical patent/CN104023075A/en
Publication of CN104023075A publication Critical patent/CN104023075A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides an Internet online secret acquisition system and method. The method includes the following steps that first, data access is performed after a specified object Internet access line is found, and an object data packet is acquired; second, the acquired object data packet is restored, and the Internet access characteristics of the object are analyzed according to the restored data; third, a corresponding remote control program implanting scheme is made according to the Internet access characteristics of the object, and a remote control program is implanted into the object; fourth, through the interactive return function of the implanted remote control program, required data of the object are monitored and acquired; fifth, voice data carried by the specified object line are acquired through recording. The invention further provides the Internet online secret acquisition system. Through analysis and restoration of the acquired data packet, the remote control program implanting scheme is made, and thus key object data are acquired. The Internet online secret acquisition system and method have the advantages that communication without IP addresses is adopted, and thus the imperceptibility and the safety performance are high; the system and method are closer to the object, small in data handling amount and highly targeted.

Description

The online close system and method for getting in a kind of the Internet
Technical field
The present invention relates to the online close system and method for getting in a kind of the Internet.
Background technology
Along with the develop rapidly of Internet technology, China's netizen's quantity is doubled and redoubled.The application of the Internet has also been extended to social every aspect, as: internet dating, Internet chat, the networking telephone, Web bank, online payment, online music, network audio-video, online game, the online securities, shopping at network, microblogging etc.Along with the new application of network is, emerge in an endless stream, network crime means are also made a lot of variety, and make network security work also run into unprecedented challenge.At present, hitting under the strong fright of the illegal acts such as political class, network gambling, network defraud comprehensively, the website of a large amount of illegal acts starts to transfer encrypted transmission (HTTPS) to from plain code transmission (HTTP), these a large amount of clues that network security department was grasped in early stage are all accused interruption, hit the action of illegal act also along with being absorbed in predicament.
Summary of the invention
The technical problem to be solved in the present invention, be to provide a kind of the Internet the online close system and method for getting, by obtaining object data bag, and packet feature is analyzed, reduced, thereby formulate corresponding control program far away and implant scheme, realize obtaining of object data, for network security department obtains important information, bring great convenience.
One of the technical problem to be solved in the present invention, is to provide a kind of the Internet online close access method, specifically comprises the steps:
Step 1, find appointed object online circuit to carry out data access, and obtain object data bag;
The object data bag that step 2, reduction are obtained, and according to the data analysis object online feature of reduction;
Step 3, according to object online feature, formulate corresponding control program far away and implant scheme, and far control program is implanted in object computer;
The mutual retransmission function of the control program far away that step 4, utilization are implanted, monitors and obtains required object computer data.
Further, described object online feature comprises: object computer software environment, object internet behavior and object online custom.
Further, described step 3 is further specially: according to object online feature, make corresponding control program far away and implant scheme, and under the prerequisite without IP address communication, utilize Session Hijack, session insertion and session blocking-up intervention techniques to create private communication passage, by this private communication passage, far control program is implanted in object computer afterwards.
Further, described method also comprises: step 5, by recording, obtain the speech data that appointed object circuit carries.
Two of the technical problem to be solved in the present invention, is to provide a kind of the Internet the online close system of getting, and comprising:
Obtain platform, find appointed object online circuit to carry out data access, and obtain object data bag;
Original platform also, the object data bag that reduction is obtained, and according to the data analysis object online feature of reduction;
Implant platform, according to object online feature, formulate corresponding control program far away and implant scheme, and far control program is implanted in object computer;
Interaction platform, the mutual retransmission function of the control program far away that utilization is implanted, monitors and obtains required object computer data.
Further, described object online feature comprises: object computer software environment, object internet behavior and object online custom.
Further, described implantation platform is further specially: according to object online feature, make corresponding control program far away and implant scheme, and under the prerequisite without IP address communication, utilize Session Hijack, session insertion and session blocking-up intervention techniques to create private communication passage, by this private communication passage, far control program is implanted in object computer afterwards.
Further, described system also comprises an assistance platform, by recording, obtains the speech data that appointed object circuit carries.
Tool of the present invention has the following advantages: communication of the present invention is carried out under without IP address, and this makes the disguise of implantation strong, and fail safe is also higher; In getting close process, be all to carry out targetedly far control program to implant, data processing amount is little, with strong points, and disposal ability and efficiency are all improved.
Accompanying drawing explanation
The present invention is further illustrated in conjunction with the embodiments with reference to the accompanying drawings.
Fig. 1 is the flowchart of online close access method one preferred embodiment in the Internet of the present invention.
Fig. 2 is the online close structured flowchart of getting system one preferred embodiment in the Internet of the present invention.
Embodiment
Please refer to shown in Fig. 1, a preferred embodiment of the online close access method in the Internet of the present invention, comprises the steps:
Step 1, find appointed object online circuit to carry out data access, and obtain object data bag, described object data bag can be the packet of the agreements such as HTTP uploads, HTTP download, FTP, SMTP, POP3; When obtaining, can also arrange some business functions, as obtain setting, data query, authentication challenge, real-time tracking etc.;
The object data bag that step 2, reduction are obtained, and according to the data analysis object online feature of reduction, wherein object online feature comprises the software environment of object computer, as operating system version, patch, browser information etc.; The internet behavior of object, as the website URL of frequent access, chat tool, converter tools etc.; The online custom of object, as the often online period, whether antivirus software etc. is installed;
Step 3, according to above-mentioned object online feature, make corresponding control program far away and implant scheme, and under the prerequisite without IP address communication, utilize Session Hijack, session insertion and session blocking-up intervention techniques to create private communication passage, by this private communication passage, far control program is implanted in object computer afterwards; Because implantation process adopts without IP address communication, this makes mutual process not need to be fixed the support of IP server, and the disguise of implantation is strong, safe;
The data interaction retransmission function of the control program far away that step 4, utilization are implanted, monitors and obtains object computer data, after tasks carrying is complete, just destroys the control program far away of implanting;
Step 5, by recording, obtain the speech data that appointed object circuit carries; This step also provides the download function of common tool, the download of softwares such as browser, input method, window pick-up.
Please refer to shown in Fig. 2, the online close preferred embodiment of getting system in the Internet of the present invention, comprising:
Obtain platform, find appointed object online circuit to carry out data access, and obtain object data bag, described object data bag can be the packet of the agreements such as HTTP uploads, HTTP download, FTP, SMTP, POP3; When obtaining, can also arrange some business functions, as obtain setting, data query, authentication challenge, real-time tracking etc.;
Original platform also, the object data bag that reduction is obtained, and according to the data analysis object online feature of reduction, wherein object online feature comprises the software environment of object computer, as operating system version, patch, browser information etc.; The internet behavior of object, as the website URL of frequent access, chat tool, converter tools etc.; The online custom of object, as the often online period, whether antivirus software etc. is installed;
Implant platform, according to above-mentioned object online feature, make corresponding control program far away and implant scheme, and under the prerequisite without IP address communication, utilize Session Hijack, session insertion and session blocking-up intervention techniques to create private communication passage, by this private communication passage, far control program is implanted in object computer afterwards; Because implantation process adopts without IP address communication, this makes mutual process not need to be fixed the support of IP server, and the disguise of implantation is strong, safe;
Interaction platform, the data interaction retransmission function of the control program far away that utilization is implanted, monitors and obtains object computer data, after tasks carrying is complete, just destroys the control program far away of implanting;
Assistance platform, obtains by recording the speech data that appointed object circuit carries; This platform also provides the download function of common tool, the download of softwares such as browser, input method, window pick-up.
Although more than described the specific embodiment of the present invention; but being familiar with those skilled in the art is to be understood that; our described specific embodiment is illustrative; rather than for the restriction to scope of the present invention; those of ordinary skill in the art are in equivalent modification and the variation done according to spirit of the present invention, all should be encompassed in the scope that claim of the present invention protects.

Claims (8)

1. the online close access method in the Internet, is characterized in that: comprise the steps:
Step 1, find appointed object online circuit to carry out data access, and obtain object data bag;
The object data bag that step 2, reduction are obtained, and according to the data analysis object online feature of reduction;
Step 3, according to object online feature, formulate corresponding control program far away and implant scheme, and far control program is implanted in object computer;
The mutual retransmission function of the control program far away that step 4, utilization are implanted, monitors and obtains required object computer data.
2. the online close access method in a kind of the Internet as claimed in claim 1, is characterized in that: described object online feature comprises: object computer software environment, object internet behavior and object online custom.
3. the online close access method in a kind of the Internet as claimed in claim 1, it is characterized in that: described step 3 is further specially: according to object online feature, make corresponding control program far away and implant scheme, and under the prerequisite without IP address communication, utilize Session Hijack, session insertion and session blocking-up intervention techniques to create private communication passage, by this private communication passage, far control program is implanted in object computer afterwards.
4. the online close access method in a kind of the Internet as claimed in claim 1, is characterized in that: described method also comprises:
Step 5, by recording, obtain the speech data that appointed object circuit carries.
5. the online close system of getting in the Internet, is characterized in that: comprising:
Obtain platform, find appointed object online circuit to carry out data access, and obtain object data bag;
Original platform also, the object data bag that reduction is obtained, and according to the data analysis object online feature of reduction;
Implant platform, according to object online feature, formulate corresponding control program far away and implant scheme, and far control program is implanted in object computer;
Interaction platform, the mutual retransmission function of the control program far away that utilization is implanted, monitors and obtains required object computer data.
6. the online close system of getting in a kind of the Internet as claimed in claim 5, is characterized in that: described object online feature comprises: object computer software environment, object internet behavior and object online custom.
7. the online close system of getting in a kind of the Internet as claimed in claim 5, it is characterized in that: described implantation platform is further specially: according to object online feature, make corresponding control program far away and implant scheme, and under the prerequisite without IP address communication, utilize Session Hijack, session insertion and session blocking-up intervention techniques to create private communication passage, by this private communication passage, far control program is implanted in object computer afterwards.
8. the online close system of getting in a kind of the Internet as claimed in claim 5, is characterized in that: described system also comprises an assistance platform, by recording, obtains the speech data that appointed object circuit carries.
CN201410267265.8A 2014-06-16 2014-06-16 Internet online secret acquisition system and method Pending CN104023075A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410267265.8A CN104023075A (en) 2014-06-16 2014-06-16 Internet online secret acquisition system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410267265.8A CN104023075A (en) 2014-06-16 2014-06-16 Internet online secret acquisition system and method

Publications (1)

Publication Number Publication Date
CN104023075A true CN104023075A (en) 2014-09-03

Family

ID=51439644

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410267265.8A Pending CN104023075A (en) 2014-06-16 2014-06-16 Internet online secret acquisition system and method

Country Status (1)

Country Link
CN (1) CN104023075A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101431521A (en) * 2008-11-26 2009-05-13 北京网康科技有限公司 Anti-Trojan network security system and method
CN102045220A (en) * 2010-12-09 2011-05-04 国都兴业信息审计***技术(北京)有限公司 Wooden horse monitoring and auditing method and system thereof
CN102333042A (en) * 2011-10-31 2012-01-25 深信服网络科技(深圳)有限公司 Method, security gateway and system for preventing data leakage
CN102594825A (en) * 2012-02-22 2012-07-18 北京百度网讯科技有限公司 Method and device for detecting intranet Trojans
CN103475663A (en) * 2013-09-13 2013-12-25 无锡华御信息技术有限公司 Trojan recognition method based on network communication behavior characteristics

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101431521A (en) * 2008-11-26 2009-05-13 北京网康科技有限公司 Anti-Trojan network security system and method
CN102045220A (en) * 2010-12-09 2011-05-04 国都兴业信息审计***技术(北京)有限公司 Wooden horse monitoring and auditing method and system thereof
CN102333042A (en) * 2011-10-31 2012-01-25 深信服网络科技(深圳)有限公司 Method, security gateway and system for preventing data leakage
CN102594825A (en) * 2012-02-22 2012-07-18 北京百度网讯科技有限公司 Method and device for detecting intranet Trojans
CN103475663A (en) * 2013-09-13 2013-12-25 无锡华御信息技术有限公司 Trojan recognition method based on network communication behavior characteristics

Similar Documents

Publication Publication Date Title
Ianelli et al. Botnets as a vehicle for online crime
JP6527590B2 (en) System and method for detecting covert channel network intrusion based on offline network traffic
US8819819B1 (en) Method and system for automatically obtaining webpage content in the presence of javascript
US8813214B1 (en) Method and system for providing secure peer-to-peer file transfers
Ali et al. Zombiecoin: Powering next-generation botnets with bitcoin
US20110107077A1 (en) Obscuring form data through obfuscation
AU2015409179B2 (en) Machine-driven crowd-disambiguation of data resources
EP2817730A1 (en) System and method for context specific website optimization
CN103297270A (en) Application type recognition method and network equipment
WO2008084729A1 (en) Application linking virus and dns attacking sender detecting device, its method, and program
US8789177B1 (en) Method and system for automatically obtaining web page content in the presence of redirects
WO2015179767A1 (en) User privacy protection method and system
Stone-Gross et al. Peering through the iframe
JP7378071B2 (en) E-mail encrypted attachment file detoxification system and detoxification method using the same
CN103561040A (en) File downloading method and system
CN104010001B (en) In mobile terminal, the method and system connecting communication is carried out in similar networking request
CN104079611A (en) Method for preventing cross-site request forgery, related device and system
CN101179382A (en) Login method and system
CN110347902A (en) A kind of data capture method, apparatus and system
WO2020091809A1 (en) Systems and methods for authenticated parameterized application installation and launch
Qwasmi et al. simulation of ddos attacks on p2p networks
CN103209161B (en) A kind of access request processing method and processing device
Steggink et al. Detection of peer-to-peer botnets
CN104023075A (en) Internet online secret acquisition system and method
US9160765B1 (en) Method for securing endpoints from onslaught of network attacks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140903