CN107453972B - Method and device for acquiring information - Google Patents

Method and device for acquiring information Download PDF

Info

Publication number
CN107453972B
CN107453972B CN201610371783.3A CN201610371783A CN107453972B CN 107453972 B CN107453972 B CN 107453972B CN 201610371783 A CN201610371783 A CN 201610371783A CN 107453972 B CN107453972 B CN 107453972B
Authority
CN
China
Prior art keywords
information
group
communication
acquiring
software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610371783.3A
Other languages
Chinese (zh)
Other versions
CN107453972A (en
Inventor
张建飞
梁永喜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201610371783.3A priority Critical patent/CN107453972B/en
Publication of CN107453972A publication Critical patent/CN107453972A/en
Application granted granted Critical
Publication of CN107453972B publication Critical patent/CN107453972B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/043Real-time or near real-time messaging, e.g. instant messaging [IM] using or handling presence information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/185Arrangements for providing special services to substations for broadcast or conference, e.g. multicast with management of multicast group membership
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Interoperability with other network applications or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application provides a method and a device for acquiring information, wherein the method for acquiring the information comprises the following steps: acquiring a first account number of a current login communication group; acquiring pre-loading information of the first account, wherein the pre-loading information comprises: information of group members in the communication group; and acquiring the information of the group members in the group according to the preloading information. The method can improve the breadth, depth and timeliness of the acquired information.

Description

Method and device for acquiring information
Technical Field
The present application relates to the field of internet technologies, and in particular, to a method and an apparatus for acquiring information.
Background
Many illegal persons will organize the group chatting mode through Instant Messaging (IM) software to perform illegal activities like brushing list, robbery, brushing points, cash-out, weeding wool, etc. The personnel organization is very fluid, personnel information is difficult to obtain, the tracing difficulty is high, and necessary information clues are difficult to provide for case investigation.
In the related art, the general steps of acquiring information of such persons are: applying for an IM account number and adding the IM account number into a group to be obtained, monitoring and recording chat records of the group through an automatic crawler technology, and obtaining specific information of personnel, such as contact information, activity content and the like, from recorded data through natural language processing.
However, the above-mentioned method of acquiring information can only acquire information already published in the group chat log, and the acquired information has a great limitation.
Disclosure of Invention
The present application is directed to solving, at least to some extent, one of the technical problems in the related art.
Therefore, an object of the present application is to provide a method for acquiring information, which can avoid the limitation of acquiring information from published chat records only, thereby improving the breadth, depth and timeliness of acquiring information.
Another object of the present application is to propose an apparatus for acquiring information.
In order to achieve the above object, an embodiment of the present application in a first aspect provides a method for acquiring information, including: acquiring a first account number of a current login communication group; acquiring pre-loading information of the first account, wherein the pre-loading information comprises: information of group members in the communication group; and acquiring the information of the group members in the group according to the preloading information.
According to the method for acquiring the information, provided by the embodiment of the first aspect of the application, the limitation that the information is only acquired from the published chatting records can be avoided by acquiring the information from the preloaded information, so that the breadth, the depth and the timeliness of the acquired information can be improved.
In order to achieve the above object, an embodiment of a second aspect of the present application provides an apparatus for acquiring information, including: the first acquisition module is used for acquiring a first account currently logging in the communication group; a second obtaining module, configured to obtain pre-loading information of the first account, where the pre-loading information includes: information of group members in the communication group; and the third acquisition module is used for acquiring the information of the group members in the group according to the preloading information.
According to the device for acquiring information, the information is acquired in the pre-loaded information, so that the limitation that the information is acquired only from published chatting records can be avoided, and the breadth, depth and timeliness of the acquired information can be improved.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic flowchart of a method for acquiring information according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a method for acquiring information according to another embodiment of the present application;
fig. 3 is a schematic flowchart of a method for acquiring information according to another embodiment of the present application;
fig. 4 is a schematic flowchart of a method for acquiring information according to another embodiment of the present application;
fig. 5 is a schematic flowchart of a method for acquiring information according to another embodiment of the present application;
fig. 6 is a schematic structural diagram of an apparatus for acquiring information according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an apparatus for acquiring information according to another embodiment of the present application;
fig. 8 is a schematic structural diagram of an apparatus for acquiring information according to another embodiment of the present application.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar modules or modules having the same or similar functionality throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present application and are not to be construed as limiting the present application. On the contrary, the embodiments of the application include all changes, modifications and equivalents coming within the spirit and terms of the claims appended hereto.
For a better understanding of the present application, some terms referred to in the present application will be described first.
Defining:
dynamic debugging: the dynamic behavior of the program is analyzed by using a debugging function provided by a program language or a special debugging tool. The general program language and the debugging tool provide debugging functions of checking a main memory and a register; a breakpoint is set, i.e., when execution is to a specific statement or the value of a specific variable is changed, the program stops execution so as to analyze the state of the program at that time. The operation mechanism of the program can be known through the method.
Static analysis, also known as static code analysis, is a method of debugging a computer program by examining source code or code obtained by reverse analysis, without executing the program. The method can analyze and understand the code structure, and can understand the logic of the program function realization through the analysis of the code.
Communication group: is a combination of something of the same character. In many existing ways, such as social software, IM software, social networking sites, etc., each group sets a certain theme and related organization rules.
Communication software: the software where the communication group is located is, for example, the social software, the IM software, the social network site, and the like. In the embodiment of the present application, IM software is taken as an example.
Among them, IM software is for example: tencent QQ, Yixin, WeChat, nailing, Baidu HI, Feixin, Yixin, Aliwangwang, Jingdongdong, Feiyi, yy, Skype, Google Talk, icq, FastMsg, parox, etc.
Fig. 1 is a flowchart illustrating a method for acquiring a user according to an embodiment of the present application.
Referring to fig. 1, the method of the present embodiment includes:
s11: and acquiring a first account number of the current login communication group.
For example, after the user runs the IM software, the user may log in the IM software using an available account, and after logging in, join the currently processed communication group, where the account currently logged in the communication group may be referred to as a first account.
In some embodiments, the IM software may be executed in a debug mode by a debugger, so that the relevant flow is executed during the execution of the IM software executed in the debug mode.
In some embodiments, the IM software may be executed in a normal manner, for example, a click command of the user to the IM software is received, and the IM software is executed according to the click command. After the IM software is run in a normal manner, a preset code may be injected into the IM software that has already been run, so as to execute the relevant process through the preset code, wherein the injecting of the preset code into the IM software that is running may specifically be in a HOOK manner. See the following description for details.
In addition, an available account in the IM software can be applied, and the IM software can be logged in through the available account.
After logging in the IM software using the available account, the currently logged-in account may be used to join the predetermined group of information to be acquired, for example, the currently logged-in account is used to send an application join request to the group of information to be acquired, and after the group of information to be acquired agrees automatically or after manual approval, the currently logged-in account is added to the group of information to be acquired.
S12: acquiring pre-loading information of the first account, wherein the pre-loading information comprises: information of group members in the communication group.
In order to improve user experience, when the IM software is running, some information related to the currently logged-in account may be preloaded from the local disk and/or from the server via the network, for example, account information of the currently logged-in account (for example, personal information such as gender and age, and the account is status information such as online, offline and stealth), social relationship information such as friends of the currently logged-in account, joined groups and group members, and the like. In addition, the preloaded information also includes information of other users who have social relations with the currently logged-in account, for example, information of friends of the currently logged-in account or group members in the added group.
The above information is not limited to contact information such as account number (e.g. QQ number), phone number, etc., and may also include: IP address, port number, etc.
In addition, typically, the preloaded information is stored encrypted on the local disk and transmitted encrypted when transmitted over the network. However, during the IM operation, the preloaded information is decrypted into plaintext and stored in the memory. And all or part of information can be displayed according to the requirements of the use scene in the IM operation process. For example, friends or group members typically exhibit an account number, nickname, avatar, or the like.
S13: and acquiring the information of the group members in the group according to the preloading information.
Since the preloaded information of the first account includes information of group members of the communication group, the information of the group members in the communication group can be acquired from the preloaded information.
In addition, when acquiring information of group members in the communication group, information of all group members may be acquired, or information of some group members required in the group may be acquired as needed.
Wherein, the information of each group member may include: account number, nickname, contact means, IP address, port number, etc.
As shown above, the above-mentioned flow can be executed by running IM software in a debugging manner, or by injecting preset code into the running IM software. Corresponding embodiments may be as follows.
In some embodiments, referring to fig. 2, the method of obtaining information may include:
s21: the IM software is run in a debug mode through a debugger.
Compared with the operation mode of common IM software, the IM software is operated in a debugging mode, and one or more items of reading, processing and outputting of the specified information can be carried out in the operation process of the IM software.
Specifically, in this embodiment, the IM software running in the debug mode may execute the following process:
s22: logging in IM software using the first account number.
After the IM software is started, the IM software can be logged in by using a pre-applied available account, and the account for logging in the IM software can be referred to as a first account.
S23: and joining a communication group in the IM software by using the first account.
Wherein the joined communication group is a group for which information acquisition is required.
For example, communication group a may be joined if it is desired to obtain information about group members in communication group a.
In addition, if there are a plurality of groups that need to acquire information, each communication group that needs to acquire information may be sequentially taken as a currently processed communication group, and may be sequentially added to the currently processed communication group.
S24: after a first account is used to join the communication group, acquiring pre-loading information of the first account, wherein the pre-loading information comprises: information of group members in the group.
S25: and acquiring information of group members in the communication group in the preloading information.
In some embodiments, referring to fig. 3, the method of obtaining information may include:
s31: the IM software is run in the normal manner.
For example, after receiving a click command of the IM software, the IM software is executed.
S32: and injecting preset code into the running IM software.
For example, by adopting a HOOK mode, when the running of the IM software is detected, preset codes are injected into the running IM software.
S33: and logging in the IM software by using the first account through a preset code.
S34: and joining a communication group in the IM software by using the first account through a preset code.
S35: after a first account is used to join the group through a preset code, acquiring the preloading information of the first account, wherein the preloading information comprises: information of group members in the communication group.
S36: and acquiring the information of the group members in the communication group from the pre-loading information through a preset code.
In the case of the scheme of operating the IM software in the debug mode, S22-S25 are performed by the IM software operating in the debug mode, and in the scheme of injecting the preset code into the IM software, S33-S36 are performed by the preset code. The specific implementation contents of the IM software executed in a debugging mode or the preset code execution can be referred to the above related description, and will not be described in detail here.
In the related art, the user information is extracted through the recorded chat records, but for the group members who do not speak, the information of the group members cannot be acquired because the chat records do not exist. In the embodiment, the information of the group members is obtained from the social relationship information of the currently logged-in account, and the information of the group members can still be obtained for the group members who do not speak, so that the information obtaining scope can be improved. In the related art, only the information such as the phone number and the account number can be extracted at most by extracting the information from the chat records, but in the embodiment, the information such as the phone number and the account number can be obtained by obtaining the information from the social relationship information, and high-quality information such as an IP address and a port number can be obtained, so that the depth of obtaining the information can be improved. In the related art, the information is extracted by extracting the information from the chat records, and the chat records can be generated only after the group members speak, but in the embodiment, the information can be acquired after the group members join the group, and the group members do not need to wait for speaking, so that the timeliness of acquiring the information can be improved. In summary, in the embodiment, the information of the group members of the communication group is acquired according to the preloaded information of the first account, so that the limitation that the information is only acquired from the published chat records can be avoided, and the breadth, depth and timeliness of acquiring the information can be improved.
Whether the IM software is run through a debugger or code is injected into the IM software, in order to obtain the preloaded information, it is necessary to determine the stored information of the preloaded information to obtain the preloaded information according to the stored information.
Fig. 4 is a flowchart illustrating a method for acquiring information according to another embodiment of the present application.
Referring to fig. 4, the method of the present embodiment includes:
s41: and performing static analysis and/or dynamic debugging on the IM software to determine the stored information of the pre-loaded information.
Static analysis and dynamic debugging are two ways to analyze software.
Static analysis is a theory and technology for analyzing software behaviors without executing software. The internal realization mechanism of the software is analyzed and researched by a reverse method, the scheduling logic of data flow and instruction flow in the software is analyzed, and the internal data structure and the encryption algorithm which can be used are analyzed. Dynamic debugging refers to analyzing the dynamic behavior of software running through a special debugging tool. The debugging function provided by the debugging tool comprises an access check main memory and a register; a breakpoint is set, i.e., when execution is to a particular statement or the value of a particular variable is changed, the software suspends execution in order to analyze the state of the software at that time.
In this embodiment, taking static analysis and dynamic debugging as an example, mutual verification is performed by combining two ways, so that a more accurate analysis result can be obtained.
The IM software is subjected to static analysis and dynamic debugging, so that the relevant information of the IM software can be analyzed, wherein one analysis result is the storage information of the preloaded information.
Further, the storage information may comprise different contents according to different storage carriers.
Specifically, when the storage carrier is a memory, the storage information includes: the storage address and data organization in the memory. Wherein, the storage address in the memory is used for indicating the storage position of the information; the data organization form is used for indicating the organization form among information, and may include: a linked list form or an array form.
When the storage carrier is a local disk, the above-mentioned storage information includes: storage address and data organization in the disk.
When the storage carrier is a data packet transmitted by a network, the storage information includes: and transmitting the identification of the header of the data packet of the preloading information.
S42: and after the IM software is operated and the IM software is logged in by using the first account, joining a communication group in the IM software by using the first account.
S43: after a first account is used to join the communication group, acquiring the preloading information of the first account according to the determined storage information, wherein the preloading information comprises: information of group members in the communication group.
After the storage information is determined, the preloading information can be acquired according to the storage information.
Specifically, when the storage carrier is a memory, the storing information includes: the memory address and the data organization form in the memory can obtain the preloading information of the plaintext from the memory according to the memory address and the data organization form in the memory.
For example, the storage address in the memory is specifically a start address, the data organization form is a linked list form, so that the information of the first position can be determined and acquired according to the start address, the next position can be determined and the information of the next position can be acquired according to the pointer in the linked list, and so on, all the preloading information can be acquired according to the pointer. Or the storage addresses in the memory specifically include a start address and an end address, and the data organization form is an array form, so that address increment can be sequentially performed from the start address to the end address, and the pre-loading information in all storage locations between the start address and the end address is acquired.
When the storage carrier is a local disk, the preloaded information stored in the local disk can be obtained in a manner similar to the processing in the memory. Different from the memory storage information, the preloading information is stored in the memory in a plaintext mode, and the preloading information in the disk is in an encrypted form, so that decryption processing is carried out after the preloading information is acquired from the disk, the decrypted preloading information is acquired, and the user information is acquired from the decrypted preloading information.
When the storage carrier is a data packet transmitted in a network, the corresponding data packet can be found according to the packet header identification, and then the preloading information is obtained from the data packet. In addition, the preloaded information included in the data packet is also typically in an encrypted form, and in this case, the preloaded information also needs to be decrypted.
The key used for decryption may be obtained by performing static analysis and/or dynamic debugging on the IM software, or in other manners.
S44: and acquiring information of group members in the communication group in the preloading information.
It is understood that some specific contents in the present embodiment that are not specifically described may be referred to the related description of the above embodiments, and are not described in detail herein.
In this embodiment, on the basis of the above embodiment, by performing static analysis and/or dynamic debugging on the IM software, the storage information of the preloaded information can be determined, and the preloaded information can be accurately obtained.
On the basis of the above embodiment, one or more groups of information to be acquired may be provided, and these groups may form a group queue.
Fig. 5 is a flowchart illustrating a method for acquiring information according to another embodiment of the present application.
In this embodiment, taking an example of running IM software in a debugging manner, taking an example of reading preloaded information from a memory, and taking an example of processing a group queue.
Referring to fig. 5, the method of the present embodiment includes:
s51: and acquiring a storage address and a data organization mode in the memory of the preloaded information through static analysis and dynamic debugging.
The storage address and the data organization mode in the memory can be obtained through a static analysis and dynamic debugging mutual verification mode.
S52: the IM software is run in a debug mode through a debugger.
S53: logging in IM software using the first account number.
S54: and loading the group queue of the information to be acquired.
The group number of the information to be acquired can be predetermined manually or the like, and the group number is formed into a group queue which is used as a file for storage, so that the group queue can be loaded.
S55: and determining a currently processed communication group from the group queue, and joining the currently processed communication group by using the first account.
The group queue may be selected as the currently processed group by selecting one group at a time in a sequential manner or a random manner.
S56: according to a memory address and a data organization mode of a memory, acquiring pre-loading information of a first account, wherein the pre-loading information comprises: information of group members in the currently processed communication group.
Specifically, the preloaded information may be obtained after it is determined that the preloaded information is loaded.
Whether the group number of the current processing exists in the memory space of the corresponding address can be judged according to the memory address of the memory, if yes, the preloading information is indicated to be loaded completely, and otherwise, the preloading information is not loaded completely.
S57: in the preloading information, information of group members in the currently processed communication group is acquired.
In addition, after the above information is acquired, the acquired information may be stored in a database or a file system.
In addition, when storing information of a plurality of groups, information of different groups may be stored in association with corresponding group numbers or the like.
S58: and judging whether the group queue has unselected communication groups, if so, repeatedly executing S55 and the subsequent steps, and otherwise, executing S59.
For example, after processing one communication group each time, that is, after performing the above-mentioned S57 corresponding to the currently processed communication group, the currently processed communication group may be deleted in the group queue, so that when the group queue is empty, it may be determined that there is no unselected communication group in the group queue.
Of course, it is understood that a marking mode may also be adopted, in the group queue, initially, each communication group is marked as unselected, and after one communication group is selected each time, the communication group may be marked as selected, so that whether an unselected communication group exists in the group queue may be determined according to the marking.
S59: and (6) ending.
It is understood that some specific contents in the present embodiment that are not specifically described may be referred to the related description of the above embodiments, and are not described in detail herein.
In this embodiment, on the basis of the above-described embodiment, by sequentially processing each communication group in the group queue, information of group members in a plurality of communication groups can be acquired.
Fig. 6 is a schematic structural diagram of an apparatus for acquiring information according to an embodiment of the present application.
Referring to fig. 6, the apparatus 60 of the present embodiment includes: a first obtaining module 601, a second obtaining module 602, and a third obtaining module 603.
A first obtaining module 601, configured to obtain a first account currently logged in to a communication group;
a second obtaining module 602, configured to obtain preloading information of the first account, where the preloading information includes: information of group members in the communication group;
a third obtaining module 603, configured to obtain information of group members in the group according to the pre-loading information.
In some embodiments, referring to fig. 7, the apparatus 60 further comprises:
the debugging and running module 604 is configured to run, through a debugger, the communication software where the communication group is located in a debugging manner.
In some embodiments, referring to fig. 8, the apparatus 60 further comprises:
a normal operation module 605, configured to operate communication software where the communication group is located;
an injection module 606, configured to inject a preset code into the communication software.
In some embodiments, referring to fig. 7 or 8, the apparatus 60 further comprises:
an analysis module 607, configured to perform static analysis and/or dynamic debugging on the IM software, and determine storage information of the preloaded information;
the second obtaining module 602 is specifically configured to: and acquiring the preloading information according to the storage information.
In some embodiments, the storing information comprises: the second obtaining module 602 is specifically configured to:
and acquiring the preloading information of the plaintext from the memory according to the storage address and the data organization form in the memory.
In some embodiments, the second obtaining module 602 is specifically configured to:
acquiring encrypted preloading information from a local disk or a data packet transmitted by a network according to the storage information;
and decrypting the encrypted preloading information to obtain the decrypted preloading information.
In some embodiments, referring to fig. 7 or 8, the apparatus 60 further comprises:
a loading module 608, configured to load a group queue, where the group queue includes a plurality of communication groups;
a selecting module 609, configured to select one communication group in the group queue as a currently processed communication group each time until there is no unselected communication group in the group queue;
a group entering module 610, configured to join the currently processed communication group using the first account.
It is understood that the apparatus of the present embodiment corresponds to the method embodiment described above, and specific contents may be referred to related descriptions in the method embodiment, and are not described in detail herein.
In this embodiment, by acquiring information from the preloaded information, the breadth, depth, and timeliness of the acquired information can be improved.
It should be noted that, in the description of the present application, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present application, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those of ordinary skill in the art that all or part of the steps carried in the method for implementing the above embodiments may be implemented by software, which may be stored in a computer-readable storage medium, and which, when executed, includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.

Claims (14)

1. A method of obtaining information, comprising:
acquiring a first account number of a current login communication group;
acquiring pre-loading information of the first account, wherein the pre-loading information comprises information of other users which are loaded from a local disk and/or a server and have social relations with the first account, and the pre-loading information is acquired by running communication software where the communication group is located in a debugging mode or injecting preset codes into the running communication software;
and acquiring the information of the group members in the communication group according to the preloading information.
2. The method of claim 1, further comprising:
and running the communication software where the communication group is located in a debugging mode through a debugger, and executing the flow through the communication software running in the debugging mode.
3. The method of claim 1, further comprising:
running the communication software in which the communication group is located;
and injecting preset codes into the communication software so as to execute the flow through the preset codes.
4. The method according to any one of claims 1-3, further comprising:
performing static analysis and/or dynamic debugging on communication software where the communication group is located, and determining storage information of the pre-loading information;
the obtaining of the pre-loading information of the first account includes:
and acquiring the preloading information according to the storage information.
5. The method of claim 4, wherein storing information comprises: the obtaining the preloading information according to the storage information comprises:
and acquiring the preloading information of the plaintext from the memory according to the storage address and the data organization form in the memory.
6. The method of claim 4, wherein the obtaining the pre-loaded information according to the stored information comprises:
acquiring encrypted preloading information from a local disk or a data packet transmitted by a network according to the storage information;
and decrypting the encrypted preloading information to obtain the decrypted preloading information.
7. The method according to any one of claims 1-3, further comprising:
loading a group queue, wherein the group queue comprises a plurality of communication groups;
selecting one communication group in the group queue as a currently processed group each time until no unselected communication groups exist in the group queue;
and using the first account to join the currently processed communication group.
8. An apparatus for obtaining information, comprising:
the first acquisition module is used for acquiring a first account currently logging in the communication group;
the second obtaining module is used for obtaining pre-loading information of the first account, the pre-loading information comprises information of other users which are loaded from a local disk and/or a server and have social relations with the first account, and the pre-loading information is obtained by running communication software where the communication group is located in a debugging mode or by injecting preset codes into the running communication software;
and the third acquisition module is used for acquiring the information of the group members in the group according to the preloading information.
9. The apparatus of claim 8, further comprising:
and the debugging operation module is used for operating the communication software where the communication group is located in a debugging mode through a debugger.
10. The apparatus of claim 8, further comprising:
the common operation module is used for operating the communication software where the communication group is located;
and the injection module is used for injecting preset codes into the communication software.
11. The apparatus of any one of claims 8-10, further comprising:
the analysis module is used for carrying out static analysis and/or dynamic debugging on the communication software where the communication group is located and determining the storage information of the pre-loading information;
the second obtaining module is specifically configured to: and acquiring the preloading information according to the storage information.
12. The apparatus of claim 11, wherein the stored information comprises: the second obtaining module is specifically configured to:
and acquiring the preloading information of the plaintext from the memory according to the storage address and the data organization form in the memory.
13. The apparatus of claim 11, wherein the second obtaining module is specifically configured to:
acquiring encrypted preloading information from a local disk or a data packet transmitted by a network according to the storage information;
and decrypting the encrypted preloading information to obtain the decrypted preloading information.
14. The apparatus of any one of claims 8-10, further comprising:
the device comprises a loading module, a sending module and a receiving module, wherein the loading module is used for loading a group queue, and the group queue comprises a plurality of communication groups;
a selection module, configured to select one communication group in the group queue as a currently processed group each time until there is no unselected communication group in the group queue;
and the group entering module is used for joining the currently processed communication group by using the first account.
CN201610371783.3A 2016-05-30 2016-05-30 Method and device for acquiring information Active CN107453972B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610371783.3A CN107453972B (en) 2016-05-30 2016-05-30 Method and device for acquiring information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610371783.3A CN107453972B (en) 2016-05-30 2016-05-30 Method and device for acquiring information

Publications (2)

Publication Number Publication Date
CN107453972A CN107453972A (en) 2017-12-08
CN107453972B true CN107453972B (en) 2020-11-13

Family

ID=60485711

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610371783.3A Active CN107453972B (en) 2016-05-30 2016-05-30 Method and device for acquiring information

Country Status (1)

Country Link
CN (1) CN107453972B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110083363B (en) * 2019-04-22 2022-04-01 珠海网博信息科技股份有限公司 Method for intercepting wireless data packet in Linux kernel dynamic injection mode

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102325098A (en) * 2011-09-15 2012-01-18 北京神州泰岳软件股份有限公司 Group information acquisition method and system
CN104022944A (en) * 2014-06-27 2014-09-03 北京奇虎科技有限公司 Method and device for carrying out instant messaging based on game platform terminal
CN104052657A (en) * 2014-06-27 2014-09-17 北京奇虎科技有限公司 Method and device for implementing instant messaging

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9076147B2 (en) * 2002-09-18 2015-07-07 Advenix, Corp. Systems and methods for online marketing and advertising on e-mail systems
DE202008007109U1 (en) * 2008-05-27 2009-10-08 Daas, Kamal Lattice support structure

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102325098A (en) * 2011-09-15 2012-01-18 北京神州泰岳软件股份有限公司 Group information acquisition method and system
CN104022944A (en) * 2014-06-27 2014-09-03 北京奇虎科技有限公司 Method and device for carrying out instant messaging based on game platform terminal
CN104052657A (en) * 2014-06-27 2014-09-17 北京奇虎科技有限公司 Method and device for implementing instant messaging

Also Published As

Publication number Publication date
CN107453972A (en) 2017-12-08

Similar Documents

Publication Publication Date Title
US11307969B2 (en) Methods for improved web application testing using remote headless browsers and devices thereof
Joorabchi et al. Real challenges in mobile app development
US8458798B2 (en) Detection of vulnerabilities in computer systems
US9665473B2 (en) Smart tester application for testing other applications
Sgaras et al. Forensics acquisition and analysis of instant messaging and VoIP applications
CN106294094B (en) Test method, client, server and system of game server
WO2018031921A1 (en) Detecting scripted or otherwise anomalous interactions with social media platform
CN107436844B (en) Method and device for generating interface use case aggregate
US10585566B2 (en) Reproducing state of source environment when image was screen captured on a different computing device using resource location, resource navigation and positional metadata embedded in image
US11811824B2 (en) Security system for detecting malicious actor's observation
CN104079409A (en) Account login method and device
US20160070555A1 (en) Automated tenant upgrades for multi-tenant services
CN108173747B (en) Information interaction method and device
Sharma et al. Enhanced forensic process for improving mobile cloud traceability in cloud-based mobile applications
CN112559348B (en) Test analysis method, system, equipment and medium based on jacoco
CN111522749B (en) Page testing method and device, readable storage medium and electronic equipment
US10180900B2 (en) Recordation of user interface events for script generation
Davis et al. Forensic investigation of instant messaging services on linux OS: Discord and Slack as case studies
CN108924159A (en) The verification method and device in a kind of message characteristic identification library
CN107453972B (en) Method and device for acquiring information
CN115398431A (en) User information violation acquisition detection method and related equipment
Salem et al. An experimental approach for locating WhatsApp digital forensics artefacts on Windows 10 and the cloud
Krause et al. Pushed by Accident: A {Mixed-Methods} Study on Strategies of Handling Secret Information in Source Code Repositories
Chen et al. Forensic analysis of email on android volatile memory
Mulazzani New challenges in digital forensics: online storage and anonymous communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1247458

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant