摘要: This article introduces the model and the method of website intrusion forensic pointing at hackers attack and webpage Trojan , including IIS log analysis. By analyzing and comparing with the actual case, this article introduces how to implement the websit