信息安全研究 ›› 2017, Vol. 3 ›› Issue (2): 116-122.

• 学术论文 • 上一篇    下一篇

基于社会工程学的漏洞分析与渗透攻击研究

康海燕   

  1. 北京信息科技大学
  • 收稿日期:2017-02-20 出版日期:2017-02-15 发布日期:2017-02-20
  • 通讯作者: 康海燕

Analysis of Information Security Vulnerabilities and Penetration Attack Based on Social Engineering

  • Received:2017-02-20 Online:2017-02-15 Published:2017-02-20

摘要: 近年来,黑客利用人的弱点(即社会工程学方法)实施网络攻击,呈现上升甚至泛滥的趋势.针对这些安全问题,(以微信为例)分析了利用社会工程学手段突破现实生活中的安全漏洞,详解了诈骗流程,模拟了渗透攻击,实现了静默安装和短信远程控制等核心技术.通过实验验证(模拟)了不法分子利用社会工程学原理进行盗取或骗取用户财产的整个过程.为防御渗透攻击(静默安装和短信远程控制)的研究提供了有力依据,同时提醒用户谨防隐私泄露和预防渗透攻击的发生.

关键词: 社会工程学, 漏洞分析, 渗透攻击, 静默安装, 隐私保护

Abstract: In recent years, the hackers took disadvantages of people (that is the social engineering methods) to implement network attack, which shows the tendency of rising flood even. According to these security problems, for example, wechat is analyzed by using social engineering method, which can simulate the infiltration attack, explain in detail the fraud process, and realize some core technology including the silent installation and SMS remote control. Experiments simulate and prove the whole process of stealing or cheating the users property by the principle of social engineering. It provides the basis for the research on the prevention and installation of silence. At the same time, it reminds the users to guard against the occurrence of privacy leaks and prevent penetration attacks.

Key words: social engineering, vulnerability analysis, penetration attack, silent installation, privacy protection