Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device, electronic equipment, and storage medium for remotely obtaining evidence from a server

A technology of server and forensics server, which is applied in the field of information security and can solve problems such as inability to achieve anonymous forensics

Active Publication Date: 2021-09-28
EVERSEC BEIJING TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method requires remote server password information, which cannot achieve the effect of anonymous forensics

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device, electronic equipment, and storage medium for remotely obtaining evidence from a server
  • Method, device, electronic equipment, and storage medium for remotely obtaining evidence from a server
  • Method, device, electronic equipment, and storage medium for remotely obtaining evidence from a server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the technical problems solved by the embodiments of the present disclosure, the technical solutions adopted and the technical effects achieved clearer, the technical solutions of the embodiments of the present disclosure will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only Some of the embodiments of the present disclosure are not all of the embodiments. Based on the embodiments in the embodiments of the present disclosure, all other embodiments obtained by those skilled in the art without creative work fall within the protection scope of the embodiments of the present disclosure.

[0044] It should be noted that the terms "system" and "network" in the embodiments of the present disclosure are often used interchangeably herein. The "and / or" mentioned in the embodiments of the present disclosure refers to including any and all combinations of one or more related listed items...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present disclosure discloses a method, device, electronic device, and storage medium for remotely obtaining evidence from a server. The connection password actively connects to the webpage Trojan horse; obtains predetermined log information of the server to be forensic obtained through the webpage Trojan horse; extracts attack information associated with the webpage Trojan horse according to the log information. The technical solutions of the embodiments of the present disclosure can anonymously extract the hacker attack information of the server to be obtained without knowing the login information of the server to be obtained.

Description

technical field [0001] Embodiments of the present disclosure relate to the technical field of information security, and in particular to a method, device, electronic device, and storage medium for remotely obtaining evidence from a server. Background technique [0002] Server forensics refers to the acquisition, storage, and analysis of evidence for computer intrusion and crime. Computer evidence refers to the electromagnetic records produced during the operation of the computer system to prove the facts of the case with its recorded content. Technically speaking. Server forensics is the process of scanning and cracking compromised computer systems to reconstruct intrusion events. It can be understood as "extracting evidence from the computer", that is: obtaining, storing, analyzing and presenting evidence must be credible. There are many information sources that can be used for server forensics, such as system logs, work records of firewalls and intrusion detection syste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/1425H04L63/30H04L63/308
Inventor 胡付博周忠义傅强刘新鹏
Owner EVERSEC BEIJING TECH