CN109246111A - A kind of detection method and device of network equipment telnet weak passwurd - Google Patents
A kind of detection method and device of network equipment telnet weak passwurd Download PDFInfo
- Publication number
- CN109246111A CN109246111A CN201811089223.4A CN201811089223A CN109246111A CN 109246111 A CN109246111 A CN 109246111A CN 201811089223 A CN201811089223 A CN 201811089223A CN 109246111 A CN109246111 A CN 109246111A
- Authority
- CN
- China
- Prior art keywords
- network equipment
- password
- weak
- telnet
- weak password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/08—Protocols specially adapted for terminal emulation, e.g. Telnet
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Abstract
The present invention provides a kind of detection method and device of network equipment telnet weak passwurd, it is previously provided with multiple weak password dictionaries, each weak password dictionary is according to different types of network equipments configuration, the detection method includes: to carry out password match test respectively to each network equipment with the port telnet respectively, the password match test includes: selection weak password dictionary corresponding with the type of the network equipment every time, login matching is carried out using the weak password log-on message in selected weak password dictionary, if logining successfully, then there are weak passwords for the network equipment, the weak password log-on message includes weak password, or user name and weak password.This kind of detection method greatly improves the efficiency of detection corporate intranet equipment weak passwurd, reduces attacker's Telnet corporate intranet and then implements the risk of attack.
Description
Technical field
The present invention relates to computer and network technology, in particular to a kind of detection method of network equipment telnet weak passwurd
And device.
Background technique
With the continuous development of computer and network technology, corporate intranet is also continuously available universal, each electronics in enterprise
The equipment that equipment is increasingly becoming network connection, and telnet be internet remote login service standard agreement and main side
Formula, the network equipment with the port telnet have the ability of distance host work.
Currently, there is a large amount of network equipment to be capable of providing telnet service inside enterprises especially large enterprise,
And if there are the weak passwurds that telnet is logged in for these equipment, can there is very big security risk.And enterprises are detected one by one
The telnet of the network equipment, which is logged in, whether there is weak passwurd, be it is very time-consuming and inefficient, especially have on corporate intranet
It when compared with multiple network equipment, requires a great deal of time and is detected, so that the poor operability of routine inspection weak passwurd.
Summary of the invention
In view of this, the purpose of the present invention is to provide the detection methods and dress of a kind of network equipment telnet weak passwurd
It sets, improves the detection efficiency of telnet weak passwurd.
To achieve the above object, the present invention has following technical solution:
A kind of detection method of network equipment telnet weak passwurd, is previously provided with multiple weak password dictionaries, each weak password
Dictionary includes: according to different types of network equipments configuration, the detection method
Password match test is carried out respectively to each network equipment with the port telnet respectively, each password match
Test includes: selection weak password dictionary corresponding with the type of the network equipment, using in selected weak password dictionary
Weak password log-on message carry out login matching, if logining successfully, there are weak password, the weak passwords to step on for the network equipment
Recording information includes weak password or user name and weak password.
Optionally, each network equipment is provided with condition code, and described document information is used to identify the type of the network equipment, often
One condition code corresponds to a weak password dictionary;It is described to select weak password dictionary packet corresponding with the type of the network equipment
It includes:
Weak password dictionary corresponding with the type of the network equipment is selected by the condition code of the network equipment.
Optionally, each network equipment is the network equipment with login setting, before carrying out the detection method,
Further include:
Being obtained ahead of time has the network equipment for logging in setting in preset IP address.
Optionally, being obtained ahead of time has the network equipment for logging in setting in preset IP address, comprising:
Telnet is carried out to each network equipment in preset IP address by preset log-on message and logs in test;
If login returns the result to need password or needing user name and password login, it is determined that the network equipment is with stepping on
Record the network equipment of setting.
Optionally, before carrying out the detection method, further includes:
The scanning of the port telnet is carried out to the network equipment within the scope of preset IP address, and there is the port telnet to determine
Each network equipment.
Optionally, the preset IP address range includes C sector address.
A kind of detection device of network equipment telnet weak passwurd, comprising:
Multiple weak password dictionaries, each weak password dictionary is according to different types of network equipments configuration;
Matching unit, for carrying out password match test respectively to each network equipment with the port telnet respectively, often
The secondary password match test includes: selection weak password dictionary corresponding with the type of the network equipment, using selected
Weak password dictionary in weak password log-on message carry out login matching, if logining successfully, there are weak close for the network equipment
Code, the weak password log-on message includes weak password or user name and weak password.
Optionally, further includes:
Target device determination unit has the network equipment for logging in setting for being obtained ahead of time in preset IP address.
Optionally, in the target device determination unit, being obtained ahead of time has the network for logging in setting in preset IP address
Equipment, comprising:
Telnet is carried out to each network equipment in preset IP address by preset log-on message and logs in test;
If login returns the result to need password or needing user name and password login, it is determined that the network equipment is with stepping on
Record the network equipment of setting.
Optionally, further includes:
Scanning element, for carrying out the scanning of the port telnet to the network equipment within the scope of preset IP address, with determination
Each network equipment with the port telnet.
The detection method and device of network equipment telnet weak passwurd provided by the embodiments of the present application, according to different types of
The network equipment is pre-configured with out multiple weak password dictionaries;It is corresponding according to its type to each network equipment with the port telnet
Weak password dictionary carries out password match test respectively, finds out the network in corporate intranet environment with telnet weak passwurd and sets
It is standby.In this kind of method, corresponding different weak password dictionary is previously provided with for the different types of network equipment, different is weak
The weak password scale of password dictionary is different, and some type of network equipment can configure the weak password dictionary of small-scale, examine
Matched number can be reduced in survey, thus, the efficiency of detection corporate intranet equipment weak passwurd is greatly improved, reduces and attacks
The person's of hitting Telnet corporate intranet and then the risk for implementing attack.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the present invention
Some embodiments for those of ordinary skill in the art without creative efforts, can also basis
These attached drawings obtain other attached drawings.
Fig. 1 shows a kind of detection method process of the network equipment telnet weak passwurd provided according to embodiments of the present invention
Schematic diagram;
Fig. 2 shows a kind of detection device of network equipment telnet weak passwurd of offer according to embodiments of the present invention compositions
Schematic diagram.
Specific embodiment
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, with reference to the accompanying drawing to the present invention
Specific embodiment be described in detail.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, but the present invention can be with
Implemented using other than the one described here other way, those skilled in the art can be without prejudice to intension of the present invention
In the case of do similar popularization, therefore the present invention is not limited by the specific embodiments disclosed below.
Currently, there is a large amount of network equipment to be capable of providing telnet service inside enterprises especially large enterprise,
And if there are the weak passwurds that telnet is logged in for these equipment, can there is very big security risk.And enterprises are detected one by one
The telnet of the network equipment, which is logged in, whether there is weak passwurd, be it is very time-consuming and inefficient, especially have on corporate intranet
It when compared with multiple network equipment, requires a great deal of time and is detected, so that the poor operability of routine inspection weak passwurd.
Based on this, the detection method that the embodiment of the present application provides a kind of network equipment telnet weak passwurd is existing to solve
The lower technical problem of Intranet equipment telnet weak passwurd efficiency is detected in technology one by one.
In the detection method, password match test is carried out respectively to each network equipment with the port telnet respectively,
In the test of each password match, weak password dictionary corresponding with the type of the network equipment is all selected, login matching is carried out,
To determine whether the login of network equipment telnet is weak password.It is pre- for the different types of network equipment in this kind of method
It is first provided with corresponding different weak password dictionary, the weak password scale of different weak password dictionaries is different, some type of net
Network equipment can configure the weak password dictionary of small-scale, can reduce matched number in the detection, thus, greatly improve
The efficiency of detection corporate intranet equipment weak passwurd reduces attacker's Telnet corporate intranet and then implements the wind of attack
Danger.
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, will implement below to the application
Term involved in example is briefly described.
Telnet, that is, telnet agreement is ICP/IP protocol (Transmission Control Protocol/
Internet Protocol, transmission control protocol/Internet Protocol) one of agreement, it be Internet Tele log in
The standard agreement and major way of service.It provides a kind of side for completing distance host work on the local computer for user
Formula.Terminal user may be connected to remote server by using telnet program on computers.Such as: if terminal uses
Person inputs order in telnet program, then these orders will be run on the remote server, just as directly in server
It is inputted on console the same.
Weak passwurd be it is a kind of be easy to be guessed by others to or the password that cracks of the tool of being cracked, such as " 123 ", " abc "
Deng.Because such password is easy to be cracked by others, to make the computer risk of user, therefore recommended user does not make
With.
It is understood that different type equipment is with corresponding weak password dictionary with pre- before carrying out the detection method
First configured.In addition, each network equipment with the port telnet has also been obtained ahead of time.The application in order to better understand
Technical solution and technical effect, be described in detail below with reference to specific embodiment.
It is shown in Figure 1, in step S101, preset multiple weak password dictionaries.
Wherein, weak password is the password that user is arranged with weak passwurd;Weak password dictionary, which refers to, may be configured to weak password
Various weak passwurds set.In specific application, selecting for weak password dictionary entry can follow fewer but better principle, and
And the range that the different corresponding weak passwords of device type is covered is not also identical.
It can be according to specific circumstances that the weak password dictionary of different scales, the application is arranged in the equipment of different types
In embodiment, the entry in weak password dictionary may include following information: the default username and password of equipment, initially install it is close
Code, such as the user of VIOS default and password are padmin:padmin in IBM virtualized environment;Common administrator username with
Combination of common TOP weak password, such as common administrator username such as root, admin etc. in network, it is weak close in TOP 20
Code such as 123456, password;Password and public code with corporate environment characteristic etc., such as some enterprise staffs are liked
Use the lowercase of company's English name as password;Some specific usernames and the identical combination of password, such as root:root,
Admin:admin etc..
In fact, usually there will be multiple network device type in large enterprise, according to the class of the different network equipments
Type can configure different weak password dictionaries, and entry is determined according to specific device type in these weak password dictionaries,
Distinct device type corresponds to the weak password dictionary of different scales.There may be plurality of devices in corporate intranet, such as have exchange
The equipment such as machine, router, video monitoring machine, IP phone, serial server, printer, scanner, video conference device, according to
It needs to be a type of network equipment by some or certain several device definitions, it can be according to the network security of the network equipment
The characteristics of importance, log-on message and/or quantity determine the type of the network equipment, and corresponding weak password dictionary.
In a specific example, interchanger, router are large number of in Intranet, and to the important of network security
Property it is higher, and use limited user's name, such as user name is mostly admin/cisco etc., in this way, can be by interchanger, road
By device as the same type of network equipment, special weak password dictionary, the weak password word of the type network equipment are set for it
It can only include its distinctive user name in allusion quotation, in this way, the quantity of entry in weak password dictionary can be effectively reduced, improve detection
Efficiency.In addition, printer, scanner, video conference device etc. are very low to the importance of network security in Intranet, then can incite somebody to action
As the same type of network equipment, this kind of equipment does not need to carry out weak password detection these equipment, that is, does not have to corresponding weak
Password dictionary.Other equipment such as IP phone, serial server etc. with certain internet security and have corresponding log in
The characteristics of information, then can be using these equipment as a type of network equipment, respectively these equipment setting is corresponding
Weak password dictionary.
The type of the network equipment can be distinguished to each network equipments configuration condition code in advance, condition code is for identifying network
Identical condition code is arranged in the type of equipment, the same type of network equipment, and each condition code corresponds to and different weak password words
Allusion quotation.Condition code can be arbitrary identifier, such as condition code can be number or letter or their combination.It can incite somebody to action
The condition code that multiple weak password dictionaries of configuration correspond to its network equipment is saved.
S102 carries out the scanning of the port telnet to the network equipment within the scope of preset IP address, has with determination
Each network equipment of the port telnet.
Wherein, each network equipment in enterprise has its corresponding IP address (Internet Protocol
Address, internet protocol address), and user can set out the net for needing to carry out telnet port scan in advance according to actual needs
Network equipment, these network equipments are in certain IP address range, then these network equipments are within the scope of preset IP address
The network equipment.Telnet port scan is carried out to these network equipments, to determine in these network equipments with telnet
The network equipment of port.
Wherein, preset IP address range may include C sector address, if the IP address range of each mechanism is accurate to C sections,
The IP address range for needing to scan can then be reduced significantly.Wherein, by being to preset IP address range application ping order
IP address range can be accurate to C sections.IP address range after saving the reduction in case be called later.Wherein, calling
Method such as uses the target address space (- w parameter) to call.Wherein, the corresponding network of IP address range after the reduction is set
For as the network equipment for needing to carry out telnet port scan.
In specific application, the mode for carrying out telnet port scan can be to be carried out using software, application tool etc.
Scanning is illustrated for using zmap tool to carry out telnet port scan below:
Firstly, carrying out telnet port scan to the network equipment within the scope of preset IP address using zmap tool.
Wherein, carrying out port scan using zmap tool has the advantages that scanning speed is fast and rate of false alarm is lower, still
The scanning speed needs of zmap tool are set according to enterprise practical environment, are not that The faster the better for speed.When in general headquarters' range
Interior or when for the same local area network, the scanning speed of zmap tool can be fast.Divide when being that strange land is either transnational
When branch structure, due to being attached by only having the special line of several million bandwidth mostly between them, scanning speed cannot
More than the special line speed.Therefore, it can be scanned for general headquarters with setting high-speed, low speed can be set for branch and swept
It retouches.
Then, the scanning result of zmap tool is saved.
Wherein, the scanning result of zmap tool is the collection of the corresponding IP address of the network equipment of the open port telnet
It closes, which is saved.Preserving type, which for example can be, is output to file for result by setting sweep parameter
In telnet_hosts_found.txt.Wherein, the corresponding network equipment of all IP address is to have in the scanning result
Each network equipment of the port telnet.
S103, being obtained ahead of time has the network equipment for logging in setting in preset IP address.
The network equipment with the port telnet usually has following 3 kinds of telnet login scenarios: (1) user is not set steps on
The user name and password of record, as long as inputting arbitrary login username and password or not needing in input log-on message connection
It can be logged in;(2) password of login is only arranged in user, the user name of not set login only needs to input the close of login
Code can be logged in;(3) username and password of login is arranged in user simultaneously, that is, need to input simultaneously the user name of login with
Password just can be carried out login.In the application, there is the network equipment for logging in setting to refer to and need login password or need user name
And the network equipment of password login.,
(1) kind login scenarios under the network equipment be there are the network equipment of telnet weak passwurd, (2) and (3)
The network equipment under kind login scenarios is to whether there is telnet for this kind of network equipment with the network equipment for logging in setting
Weak passwurd, the step of can passing through below, are further verified.In this way, then straight for not having the network equipment for logging in and being arranged
Connecing may determine that as with weak password, it is only necessary to the detection to having the network equipment for logging in setting to carry out weak password, thus, it reduces
The quantity of the network equipment of weak password matching test, further increases detection efficiency.
In the embodiment of the present application, it can determine whether the network equipment in preset IP address has by the method for pretest
There is login to be arranged, specifically:
Firstly, carrying out telnet to each network equipment in preset IP address by preset log-on message logs in test.
Preset log-on message can be the arbitrary username and password being randomly provided;Input the username and password pair
The corresponding each network equipment of each preset IP address carries out telnet and logs in trial.
Secondly, returning the result if logging in need password or needing user name and password login, it is determined that the network equipment is
With the network equipment for logging in setting.
In specific application, the network equipment for logging in each IP address of trial for carrying out telnet, foundation is logged in
Returning the result for attempting makes the following judgment: if the network equipment logs in not successfully, judging the net according to the situation of login
Whether network equipment needs to input login username simultaneously and login password is logged in, if so, illustrating the network equipment needs
It inputs login username simultaneously and login password is logged in, the whole in preset IP address is met into the network under such situation
The corresponding IP address of equipment is saved to needing while inputting login username and network equipment file that login password is logged in
In.It is logged in, is then expired the whole in preset IP address if it is not, then illustrating that the network equipment only needs to input login password
The corresponding IP address of the network equipment under such situation of foot is saved to the network equipment for only needing to input login password and being logged in
In file.Wherein, the network equipment under the two kinds of situations logged in not successfully is belonged to the network equipment for logging in setting.
And it is believed that the network equipment inputs arbitrary login username and password if the network equipment successfully logs in
As long as not needing to be logged in input log-on message connection, therefore the network equipment is determined as with telnet
The network equipment of weak passwurd, and the whole in preset IP address is met into the corresponding IP address of the network equipment under such situation and is protected
It deposits into the file of the network equipment with telnet weak passwurd, then without carrying out the matched inspection of weak password to the network equipment
It surveys.
S104 carries out password match test, each network equipment to each network equipment with the port telnet respectively respectively
For with the network equipment for logging in setting.
For having whether the network equipment for logging in setting there is telnet weak passwurd then to need further to verify, due to
It include only to need to input login password and needs while inputting login username and password two with the network equipment for logging in setting
Kind situation, therefore the network equipment under two kinds of situations is tested as follows respectively.
The network equipment that telnet login is carried out for only needing to input login password, first according to the types of network equipment
Condition code select corresponding weak password dictionary.Then it is successively logged in using each weak password in the weak password dictionary
Matching, if some password login success in input weak password dictionary, illustrate the network equipment there are telnet weak password,
The corresponding IP address of the network equipment is saved into the file of the network equipment with telnet weak passwurd.It is right in the method
Each network equipment that is with the port telnet and only needing to input login password login is detected, and by all weak passwords
The corresponding IP address of the network equipment for logging in successful match is saved into the file of the network equipment with telnet weak passwurd.
The network equipment of progress telnet is logged in for needing while inputting login username and login password, to weak password
Each of dictionary user name all successively carries out login matching using each weak password in the weak password dictionary, it may be assumed that circulation
Ground all successively carries out login using each weak password in the weak password dictionary to each of weak password dictionary user name
Match.If some user name and weak password in input weak password dictionary login successfully, that is, illustrate that the network equipment exists
Telnet weak password then saves the corresponding IP address of the network equipment to the file of the network equipment with telnet weak passwurd
In.In the method to the port telnet and need while inputting login username and network that password is logged in
Equipment is detected, and all corresponding IP address of the network equipment for inputting user name and weak password login successful match are saved
Into the file of the network equipment with telnet weak passwurd.
The detection method of the network equipment telnet weak passwurd of the embodiment of the present application is described in detail above, this
Outside, referring to fig. 2, application the present embodiment additionally provides a kind of composition signal of the detection device of network equipment telnet weak passwurd
Figure, the device include:
Multiple weak password dictionaries 201, each weak password dictionary is according to different types of network equipments configuration;
Matching unit 204, for carrying out password match test respectively to each network equipment with the port telnet respectively,
The password match test includes: selection weak password dictionary corresponding with the type of the network equipment every time, using selected
The weak password log-on message in weak password dictionary selected carries out login matching, if logining successfully, there are weak for the network equipment
Password, the weak password log-on message include weak password or user name and weak password.
In a kind of implementation of the present embodiment, each network equipment is provided with condition code, and described document information is used for
The type of the network equipment is identified, each condition code corresponds to a weak password dictionary;Then in matching unit 204, the selection and institute
The corresponding weak password dictionary of type for stating the network equipment includes:
Weak password dictionary corresponding with the type of the network equipment is selected by the condition code of the network equipment.
In a kind of implementation of the present embodiment, further includes:
Target device determination unit 203 has the network equipment for logging in setting for being obtained ahead of time in preset IP address.
In a kind of implementation of the present embodiment, in the target device determination unit 203, default IP is obtained ahead of time
There is the network equipment for logging in setting in location, comprising:
Telnet is carried out to each network equipment in preset IP address by preset log-on message and logs in test;
If login returns the result to need password or needing user name and password login, it is determined that the network equipment is with stepping on
Record the network equipment of setting.
In a kind of implementation of the present embodiment, further includes:
Scanning element 202, for carrying out the scanning of the port telnet to the network equipment within the scope of preset IP address, with true
Surely with each network equipment of the port telnet.
In a kind of implementation of the present embodiment, the preset IP address range includes C sector address.
In this way, the embodiment of the present application is pre-configured with out multiple weak password dictionaries according to the different types of network equipment;To tool
There is each network equipment of the port telnet to carry out password match test respectively according to the corresponding weak password dictionary of its type, finds out
With the network equipment of telnet weak passwurd in corporate intranet environment.It is pre- for the different types of network equipment in this kind of method
It is first provided with corresponding different weak password dictionary, the weak password scale of different weak password dictionaries is different, some type of net
Network equipment can configure the weak password dictionary of small-scale, can reduce matched number in the detection, thus, greatly improve
The efficiency of detection corporate intranet equipment weak passwurd reduces attacker's Telnet corporate intranet and then implements the wind of attack
Danger.
The above is only a preferred embodiment of the present invention, although the present invention has been disclosed in the preferred embodiments as above, so
And it is not intended to limit the invention.Anyone skilled in the art is not departing from technical solution of the present invention ambit
Under, many possible changes and modifications all are made to technical solution of the present invention using the methods and technical content of the disclosure above,
Or equivalent example modified to equivalent change.Therefore, anything that does not depart from the technical scheme of the invention, according to the present invention
Technical spirit any simple modification, equivalent variation and modification made to the above embodiment, still fall within the technology of the present invention side
In the range of case protection.
Claims (10)
1. a kind of detection method of network equipment telnet weak passwurd, which is characterized in that multiple weak password dictionaries are previously provided with,
Each weak password dictionary includes: according to different types of network equipments configuration, the detection method
Password match test is carried out respectively to each network equipment with the port telnet respectively, every time the password match test
It include: selection weak password dictionary corresponding with the type of the network equipment, using weak in selected weak password dictionary
Password login information carries out login matching, if logining successfully, there are weak password, the weak passwords to log in letter for the network equipment
Breath includes weak password or user name and weak password.
2. detection method according to claim 1, which is characterized in that each network equipment is provided with condition code, described
Condition code is used to identify the type of the network equipment, and each condition code corresponds to a weak password dictionary;The selection and the network
The corresponding weak password dictionary of the type of equipment includes:
Weak password dictionary corresponding with the type of the network equipment is selected by the condition code of the network equipment.
3. detection method according to claim 1, which is characterized in that each network equipment is with the net for logging in setting
Network equipment, before carrying out the detection method, further includes:
Being obtained ahead of time has the network equipment for logging in setting in preset IP address.
4. detection method according to claim 3, which is characterized in that being obtained ahead of time in preset IP address has login setting
The network equipment, comprising:
Telnet is carried out to each network equipment in preset IP address by preset log-on message and logs in test;
If login returns the result to need password or needing user name and password login, it is determined that the network equipment is to set with login
The network equipment set.
5. detection method described in any one of -4 according to claim 1, which is characterized in that carry out the detection method it
Before, further includes:
The scanning of the port telnet is carried out to the network equipment within the scope of preset IP address, and there is each of the port telnet to determine
The network equipment.
6. detection method according to claim 5, which is characterized in that the preset IP address range includes C sector address.
7. a kind of detection device of network equipment telnet weak passwurd characterized by comprising
Multiple weak password dictionaries, each weak password dictionary is according to different types of network equipments configuration;
Matching unit, for carrying out password match test, each institute respectively to each network equipment with the port telnet respectively
Stating password match test includes: selection weak password dictionary corresponding with the type of the network equipment, using selected weak
Weak password log-on message in password dictionary carries out login matching, if logining successfully, there are weak password, institutes for the network equipment
Stating weak password log-on message includes weak password or user name and weak password.
8. device according to claim 7, which is characterized in that further include:
Target device determination unit has the network equipment for logging in setting for being obtained ahead of time in preset IP address.
9. device according to claim 8, which is characterized in that in the target device determination unit, be obtained ahead of time default
There is the network equipment for logging in setting in IP address, comprising:
Telnet is carried out to each network equipment in preset IP address by preset log-on message and logs in test;
If login returns the result to need password or needing user name and password login, it is determined that the network equipment is to set with login
The network equipment set.
10. the device according to any one of claim 7-9, which is characterized in that further include:
Scanning element has for carrying out the scanning of the port telnet to the network equipment within the scope of preset IP address with determination
Each network equipment of the port telnet.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811089223.4A CN109246111A (en) | 2018-09-18 | 2018-09-18 | A kind of detection method and device of network equipment telnet weak passwurd |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811089223.4A CN109246111A (en) | 2018-09-18 | 2018-09-18 | A kind of detection method and device of network equipment telnet weak passwurd |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109246111A true CN109246111A (en) | 2019-01-18 |
Family
ID=65059210
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811089223.4A Pending CN109246111A (en) | 2018-09-18 | 2018-09-18 | A kind of detection method and device of network equipment telnet weak passwurd |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109246111A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109948331A (en) * | 2019-03-26 | 2019-06-28 | 国网黑龙江省电力有限公司信息通信公司 | A kind of weak passwurd detection system and method |
CN110489962A (en) * | 2019-07-19 | 2019-11-22 | 苏州浪潮智能科技有限公司 | The method and system of user password complexity under a kind of raising operating system |
CN110635914A (en) * | 2019-09-23 | 2019-12-31 | 南京经纬信安科技有限公司 | Weak password detection method and system |
CN111488581A (en) * | 2020-03-26 | 2020-08-04 | 杭州迪普科技股份有限公司 | Weak password vulnerability detection method and device, electronic equipment and computer readable medium |
CN111859368A (en) * | 2020-07-28 | 2020-10-30 | 深圳竹云科技有限公司 | Weak password generation method, password detection method, device and electronic equipment |
CN112351003A (en) * | 2020-10-23 | 2021-02-09 | 杭州安恒信息技术股份有限公司 | Weak password detection method and device, readable storage medium and computer equipment |
CN113098823A (en) * | 2019-12-23 | 2021-07-09 | 中国移动通信集团山西有限公司 | Weak password detection method, device, equipment and medium |
CN114006773A (en) * | 2021-12-31 | 2022-02-01 | 北京微步在线科技有限公司 | Weak password judgment method, device, equipment and storage medium |
CN114978752A (en) * | 2022-06-17 | 2022-08-30 | 北京安博通金安科技有限公司 | Weak password detection method and device, electronic equipment and computer readable storage medium |
CN117473485A (en) * | 2023-12-28 | 2024-01-30 | 深圳万物安全科技有限公司 | Password detection method, password detection device, and computer-readable storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103701805A (en) * | 2013-12-26 | 2014-04-02 | 山石网科通信技术有限公司 | Method and device for detecting weak password in network |
CN103701629A (en) * | 2013-11-27 | 2014-04-02 | 北京神州泰岳软件股份有限公司 | Weak password analysis method and system |
CN104683127A (en) * | 2013-11-27 | 2015-06-03 | 北京神州泰岳软件股份有限公司 | Method and system for centrally checking weak passwords of equipment |
CN105406976A (en) * | 2014-08-29 | 2016-03-16 | 中国电信股份有限公司 | Weak password checking method and system |
US20160378974A1 (en) * | 2008-12-30 | 2016-12-29 | International Business Machines Corporation | Weak password support in a multi-user environment |
CN106411530A (en) * | 2016-10-25 | 2017-02-15 | 国家电网公司 | Weak password rapid comparison and searching method |
-
2018
- 2018-09-18 CN CN201811089223.4A patent/CN109246111A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160378974A1 (en) * | 2008-12-30 | 2016-12-29 | International Business Machines Corporation | Weak password support in a multi-user environment |
CN103701629A (en) * | 2013-11-27 | 2014-04-02 | 北京神州泰岳软件股份有限公司 | Weak password analysis method and system |
CN104683127A (en) * | 2013-11-27 | 2015-06-03 | 北京神州泰岳软件股份有限公司 | Method and system for centrally checking weak passwords of equipment |
CN103701805A (en) * | 2013-12-26 | 2014-04-02 | 山石网科通信技术有限公司 | Method and device for detecting weak password in network |
CN105406976A (en) * | 2014-08-29 | 2016-03-16 | 中国电信股份有限公司 | Weak password checking method and system |
CN106411530A (en) * | 2016-10-25 | 2017-02-15 | 国家电网公司 | Weak password rapid comparison and searching method |
Non-Patent Citations (1)
Title |
---|
IPEONX: "分享一个用于企业内部环境的SSH弱密码审计工具", 《HTTPS://WWW.FREEBUF.COM/SECTOOL/163343.HTML》 * |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109948331A (en) * | 2019-03-26 | 2019-06-28 | 国网黑龙江省电力有限公司信息通信公司 | A kind of weak passwurd detection system and method |
CN110489962A (en) * | 2019-07-19 | 2019-11-22 | 苏州浪潮智能科技有限公司 | The method and system of user password complexity under a kind of raising operating system |
CN110489962B (en) * | 2019-07-19 | 2022-05-03 | 苏州浪潮智能科技有限公司 | Method and system for improving user password complexity under operating system |
CN110635914A (en) * | 2019-09-23 | 2019-12-31 | 南京经纬信安科技有限公司 | Weak password detection method and system |
CN110635914B (en) * | 2019-09-23 | 2022-11-18 | 南京经纬信安科技有限公司 | Weak password detection method |
CN113098823A (en) * | 2019-12-23 | 2021-07-09 | 中国移动通信集团山西有限公司 | Weak password detection method, device, equipment and medium |
CN111488581A (en) * | 2020-03-26 | 2020-08-04 | 杭州迪普科技股份有限公司 | Weak password vulnerability detection method and device, electronic equipment and computer readable medium |
CN111859368A (en) * | 2020-07-28 | 2020-10-30 | 深圳竹云科技有限公司 | Weak password generation method, password detection method, device and electronic equipment |
CN112351003A (en) * | 2020-10-23 | 2021-02-09 | 杭州安恒信息技术股份有限公司 | Weak password detection method and device, readable storage medium and computer equipment |
CN114006773A (en) * | 2021-12-31 | 2022-02-01 | 北京微步在线科技有限公司 | Weak password judgment method, device, equipment and storage medium |
CN114978752A (en) * | 2022-06-17 | 2022-08-30 | 北京安博通金安科技有限公司 | Weak password detection method and device, electronic equipment and computer readable storage medium |
CN117473485A (en) * | 2023-12-28 | 2024-01-30 | 深圳万物安全科技有限公司 | Password detection method, password detection device, and computer-readable storage medium |
CN117473485B (en) * | 2023-12-28 | 2024-04-16 | 深圳万物安全科技有限公司 | Password detection method, password detection device, and computer-readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109246111A (en) | A kind of detection method and device of network equipment telnet weak passwurd | |
Herzog | Open-source security testing methodology manual | |
US7146642B1 (en) | System, method and computer program product for detecting modifications to risk assessment scanning caused by an intermediate device | |
US20010034847A1 (en) | Internet/network security method and system for checking security of a client from a remote facility | |
US20120255022A1 (en) | Systems and methods for determining vulnerability to session stealing | |
US20170331855A1 (en) | Detection and warning of imposter web sites | |
CN107332804A (en) | The detection method and device of webpage leak | |
Trabelsi | Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning | |
Chang et al. | Security implications of redirection trail in popular websites worldwide | |
CN110493253B (en) | Botnet analysis method of home router based on raspberry group design | |
Trabelsi et al. | A hands-on approach for teaching denial of service attacks: a case study | |
Dorofeev et al. | Applied aspects of security testing | |
Deeptha et al. | Website Vulnerability Scanner | |
CN112738127B (en) | Web-based website and host vulnerability detection system and method thereof | |
Franzen et al. | Looking for honey once again: Detecting RDP and SMB honeypots on the Internet | |
KR20190073481A (en) | Fingerprint determination for network mapping | |
Gregg | Certified ethical hacker (CEH) cert guide | |
IL263958A (en) | Method and system for identifying vulnerability levels in devices operated on a given network | |
CN109543419A (en) | Detect the method and device of assets security | |
Kumar et al. | Analysing Cyber Security Vulnerabilities using Click Jacking and HostHeader Injection | |
AbdelallahElhadjº et al. | An experimental sniffer detector: SnifferWall | |
Zhu et al. | Internet security protection for IRC-based botnet | |
Arun et al. | A research work on information gathering tools | |
He et al. | Network penetration testing | |
CN114598507B (en) | Attacker figure generation method and device, terminal equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190118 |