This article introduces the model and the method of website intrusion forensic pointing at hackers attack and webpage Trojan , including IIS log analysis. By analyzing and comparing with the actual case, this article introduces how to implement the website intrusion forensic. This article takes a good reference effect on the work of website intrusion forensic.%文章针对黑客攻击网站以及网页挂马介绍了网站入侵取证的模式和方法(包括IIS日志分析)。通过对实际案例的分析、比较,详细描述了如何开展日常的入侵取证工作。文章对同行业的入侵取证工作具有较好的借鉴和参考作用。
展开▼