首先介绍了传统的木马隐藏方法,由于传统方法主要集中于本地进程的隐藏,对木 马两端之间通信隐藏涉及甚少,而本文所采用的基于ICMP的连接技术能够穿越防火墙,实现通信连接的隐藏。 关键词:特洛伊木马;隐藏;ICMP Abstract:First, the concealing technology of Trojan horse is introduced,as the traditional method mainly focus on the hiding of local process,seldom involves the communication concealing between the two sides of Trojan horse.But the method of technology based on ICMP mentioned in this paper can penetrate firewall,can realize the hiding of communication. Keywords:Trojan horse;concealing technology;ICMP