定制论文·联系客服·网站地图·收藏本页·设为首页
计算机硕士当前位置:中国论文库 > 计算机论文 > 计算机硕士> 正文

无密码登录计算机取证系统

时间:2012-01-01作者:来源:中国论文库
字号:T|T

  【摘要】 随着科学技术的不断发展,网络和计算机的不断普及,运用网络和计算机等高科技手段进行违法犯罪活动的人也越来越多。如以传播、贩卖或敲诈勒索为目的,利用电脑破译密码进行各种金融犯

标签:

  【摘要】 随着科学技术的不断发展,网络和计算机的不断普及,运用网络和计算机等高科技手段进行违法犯罪活动的人也越来越多。如以传播、贩卖或敲诈勒索为目的,利用电脑破译密码进行各种金融犯罪;利用网络实施散布活动,侵害他人名誉权、隐私权、知识产权等,甚至散布反动言论、实施危害国家安全和分裂国家的活动等。所以如何从被加密保护的嫌疑人计算机中获取或还原出犯罪证据及有用的犯罪信息就成了安全部门的重点研究方向。本课题研究了在现场针对Windows操作系统的计算机,如何直接绕过开机登录密码进入嫌疑人的计算机,如何快速收集敏感的电子物证,如何分析和如何展示取证结果,并如何在取证后对取证现场进行恢复、消除取证痕迹、达到取证后不被发现的一系列问题做了相关的研究,并在研究之后的理论上进行实践,编写了一款演示用无密码登录取证系统。对计算机系统信息,回收站,最新使用记录,浏览器历史记录,自动完成表单,U盘插拔记录,自定义敏感文件,通信工具和邮箱等信息源进行收集分析,达到了即简单又全面高效的取证目的。从而大大减少原先要拷盘,仿真运行,破解密码再取证所要花费的时间人力和物力,使得不很熟练计算机的入也能快速的对现场计算机进行取证和分析。

  【Abstract】 With the continuous development of science and technology, and the growing popularity of Internet and computer, criminal activities by using networks and computers and other high-tech means are increasing, such as taking financial crimes by using computers to decipher the password with the purpose of spread, trafficking or extortion. using network to spread activities, infringing others’reputation, privacy, intellectual property, and so on, and even spreading reactionary speech, carrying out activities which will endanger nation’s security and separate the nation. So how to get or restore the criminal evidence and useful information from criminals’computers has become the focus of safety departments.This thesis focus on computers with Windows operation system, studying on how to bypass the boot password directly into the suspect’s computer, how to quickly collect sensitive electronic evidence, how to analyze evidence and how to display results, and how to revert site to eliminate any trace which will not let others notice their computer be entered for evidence collection. And then put the theory study into practice based on this study by writing a version of evidence collection system by logging in without passport, collecting and analyzing the computer system information, the Recycle Bin, the latest use records, browser history, auto completed forms, U disk plug record, sensitive documents, email and other communication tools, etc. This will reduce the time and work about original evidence collection method which information should be copied and under stimulant condition, decipher the passport and then collect evidence. The system will allow those who are not so excellent in operating computers collect and analyze evidence from computers on site.

  【关键词】 计算机; 电子取证; 文件搜索; 痕迹清理; 解密分析;

  【Key words】 Computer; Computer Forensics; File Search; clean up traces; Analysis and Decryption;

转贴于中国论文库 http://www.lwkoo.com

    相关阅读

    推荐论文

    热门

    最新

    推荐