CN111212419A - Wireless password detection method - Google Patents

Wireless password detection method Download PDF

Info

Publication number
CN111212419A
CN111212419A CN201911303190.3A CN201911303190A CN111212419A CN 111212419 A CN111212419 A CN 111212419A CN 201911303190 A CN201911303190 A CN 201911303190A CN 111212419 A CN111212419 A CN 111212419A
Authority
CN
China
Prior art keywords
password detection
password
task
slave
configuration information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911303190.3A
Other languages
Chinese (zh)
Inventor
郑姜
蒋红刚
李飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Winicssec Technologies Co Ltd
Original Assignee
Beijing Winicssec Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Winicssec Technologies Co Ltd filed Critical Beijing Winicssec Technologies Co Ltd
Priority to CN201911303190.3A priority Critical patent/CN111212419A/en
Publication of CN111212419A publication Critical patent/CN111212419A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a wireless password detection method, which comprises the following steps: when request information of a plurality of password detection slave machines is received, sending a configuration information acquisition instruction to each password detection slave machine; and distributing a password detection task to the password detection slave machine according to the received configuration information of the password detection slave machine. The invention uses the password detection host to distribute the password detection tasks to the plurality of the password detection slave machines, so that the password detection is performed by a plurality of devices according to different task distributions, thereby improving the efficiency of the password detection.

Description

Wireless password detection method
Technical Field
The invention relates to the field of wireless communication, in particular to a wireless password detection method.
Background
The wireless network is widely applied to the aspects of daily life, the network is greatly convenient for people to use, the problem of network safety is considered when the wireless network is used, a user can set a relatively complex password, and the user cannot use the wireless network when forgetting to set the password.
In the related art, the detection mode of the wireless password is usually to detect by using a single device, and because the data detection amount of the wireless password is large, the password detection is performed by using the single device, so that the password detection efficiency is influenced.
Disclosure of Invention
Therefore, the technical problem to be solved by the present invention is to overcome the problem of low detection efficiency of the password detection method in the prior art, so as to provide a wireless password detection method and apparatus.
According to a first aspect, an embodiment of the present invention provides a wireless password detection method, including the following steps: when request information of a plurality of password detection slave machines is received, sending a configuration information acquisition instruction to each password detection slave machine; and distributing a password detection task to the password detection slave machine according to the received configuration information of the password detection slave machine.
With reference to the first aspect, in a first implementation manner of the first aspect, the allocating a password detection task to the password detection slave according to the received configuration information of the password detection slave includes: according to the received configuration information of the password detection slave machine, scoring the password detection slave machine; and distributing the password detection task to the password detection slave machine according to the grading result.
With reference to the first implementation manner of the first aspect, in a second implementation manner of the first aspect, after the allocating a password detection task to the password detection slave according to the received configuration information of the password detection slave, the method further includes: receiving the number of executed password detection tasks; and determining the progress of the password detection task according to the number of the executed password detection tasks.
With reference to the first aspect, in a third implementation manner of the first aspect, after the distributing a password detection task to the password detection slave according to the received configuration information of the password detection slave, the method further includes: receiving an execution result of a password detection task; and when the information that the password detection task is successful is received, sending a command for stopping the password detection task to the password detection slave.
With reference to the second implementation manner of the first aspect, in a fourth implementation manner of the first aspect, after the distributing a password detection task to the password detection slave according to the received configuration information of the password detection slave, the method further includes: when the information that the password detection task of any password detection slave fails is received, the password detection task is distributed to the password detection slave again according to the progress of the password detection task.
With reference to the third implementation manner of the first aspect, in a fifth implementation manner of the first aspect, after the distributing a password detection task to the password detection slave according to the received configuration information of the password detection slave, the method further includes: and updating the password detection state information.
According to a second aspect, an embodiment of the present invention provides a wireless password detection method, including the following steps: broadcasting request information and an IP address; when a configuration information acquisition instruction is received, transmitting configuration information; and when the password detection task is received, executing the password detection task according to the target detection method.
With reference to the second aspect, in a first implementation manner of the second aspect, after the sending the configuration information when the configuration information obtaining instruction is received, the method further includes: and uploading the number of the executed password detection tasks and the execution result of the password detection tasks according to the target interval duration.
With reference to the second aspect, in a second implementation manner of the second aspect, after the sending the configuration information when the configuration information obtaining instruction is received, the method further includes: and when receiving a command of stopping the password detection task, stopping executing the password detection task.
With reference to the second aspect, in a third implementation manner of the second aspect, when the password detection task is received, the performing the password detection task according to the target detection method includes: acquiring the state of the router equipment to be detected in the password detection task; when the router device to be detected starts the WPS function, a first target cracking method is used for executing a password detection task; when the WPS function is not started by the router device to be detected, whether the router to be detected is accessed to an external device is judged; when the router to be detected is accessed to external equipment, a second target cracking method is used for executing a password detection task according to the acquired data packet; and when the router to be detected does not access the external equipment, executing a password detection task by using a third target cracking method.
According to a third aspect, an embodiment of the present invention provides a wireless password detection apparatus, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the steps of the first aspect or any one of the first aspect, or the wireless password detection method according to any one of the second aspect or the second aspect when executing the program.
According to a fourth aspect, an embodiment of the present invention provides a storage medium, on which computer instructions are stored, and the instructions, when executed by a processor, implement the steps of the first aspect or any of the first aspect, or the wireless password detection method according to any of the second aspect or the second aspect.
The technical scheme of the invention has the following advantages:
1. according to the wireless password detection method provided by the embodiment of the invention, the configuration information of each password detection slave machine is acquired by the password detection host machine, the password detection task is distributed according to the configuration information, and the passwords are detected by using a plurality of password detection slave machines, so that the password detection efficiency is improved.
2. The hardware configuration information of the slave computer detected according to each password provided by the invention comprises the CPU main frequency, the memory size and the memory frequency, so that the password detection host can more reasonably distribute the password detection task according to the hardware performance of the slave computer detected according to the password, and the password detection efficiency is further improved.
3. The password detection host receives the password detection task completion number of each password detection slave machine within a certain time interval, determines the password detection task progress, is favorable for better controlling the overall completion progress, is convenient for a user to check the progress, and is also convenient for the password detection host to redistribute the password detection tasks.
4. In the embodiment, when any one of the password detection slave machines completes all the distributed password detection tasks and does not detect a correct password, the master machine allocates the tasks to the password detection slave machines again according to the progress of the password detection tasks, so that the utilization rate of each password detection slave machine is improved, and the efficiency of the overall password detection is further improved.
5. According to the method, the equipment state of the router is obtained, different password cracking methods are executed aiming at different equipment states, when the WPS function is started by the router, a PIN (personal identification number) is cracked in a combined mode, when the router is not started, according to the condition that a client side is connected with the router or not connected with the router, the router is cracked in an offline packet capturing cracking mode and an exhaustive cracking mode according to a password dictionary, and for PIN code cracking, PIN codes can be obtained only by executing 11010 attempts, so that the cracking task amount is reduced, and the cracking efficiency is improved; as the PIN cracking and the handshake cracking are in an off-line cracking mode, the problem that target equipment is paralyzed due to too large data volume in the cracking process can be effectively solved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of a specific example of a wireless password detection method according to an embodiment of the present invention;
fig. 2 is a flowchart of a specific example of a wireless password detection method according to an embodiment of the present invention;
fig. 3 is a schematic block diagram of a specific example of a wireless password detection device in the embodiment of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc., indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of description and simplicity of description, but do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; the two elements may be directly connected or indirectly connected through an intermediate medium, or may be communicated with each other inside the two elements, or may be wirelessly connected or wired connected. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
In addition, the technical features involved in the different embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
The embodiment of the application provides a wireless password detection method, which can be used for any terminal or server capable of performing password detection. As shown in fig. 1, the method comprises the steps of:
s110: when request information of a plurality of password detection slave machines is received, a configuration information acquisition instruction is sent to each password detection slave machine.
Illustratively, the password detection host and the password detection slave can be PC terminals with WIFI modules, or mobile terminals with WIFI modules, and the password detection host and the password detection slave including the communication module can communicate through a local area network established by an available router. After the multiple password detection slave machines are accessed to the router, the IP addresses of the multiple password detection slave machines are broadcasted in the local area network, and after the password detection host machine detects the IP addresses of the password detection slave machines, a configuration information acquisition instruction is sent to each password detection slave machine, wherein the configuration information acquisition instruction can be used for acquiring the inherent hardware configuration information of each password detection slave machine, such as CPU main frequency, memory size and memory frequency; or obtaining the current running state of each password detection slave, such as the current remaining memory size, the CPU master frequency, and the like. The embodiment of the present application does not limit what kind of configuration information is obtained, and those skilled in the art can determine the configuration information according to needs.
S120: and distributing a password detection task to the password detection slave machine according to the received configuration information of the password detection slave machine.
For example, the mode of allocating the password detection task to the password detection slave machine may be that each password detection slave machine is scored according to the received configuration information of the password detection slave machine, and the ratio of the score of each password detection slave machine to the total score of all the password detection slave machines is used as the standard of allocating the password detection task amount; the configuration information with the highest importance level in the received configuration information of the password detection slave is sorted, and the password detection task is allocated to the password detection slave according to the sorting result, for example, the configuration information with the highest importance level is the CPU master frequency, and the configuration information is sorted from high to low according to the size of the CPU master frequency, and the task is allocated according to the sorting result. The allocation mode of the password detection task is not limited in the embodiment of the application, and can be determined by a person skilled in the art according to needs.
According to the wireless password detection method provided by the embodiment of the invention, the configuration information of each password detection slave machine is acquired by the password detection host machine, the password detection task is distributed according to the configuration information, and the passwords are detected by using a plurality of password detection slave machines, so that the password detection efficiency is improved.
As an alternative embodiment of the present application, S120 includes:
firstly, the password detection slave is scored according to the received configuration information of the password detection slave.
Exemplarily, taking the hardware configuration information of each password detection slave machine acquired by the configuration information acquisition instruction, as an example, the configuration information is the CPU master frequency, the memory size, and the memory frequency, the CPU master frequency, the memory size, and the memory frequency are multiplied to obtain a scoring result, and a specific calculation manner of the scoring is shown in table 1, for example.
TABLE 1
CPU main frequency Memory size Memory frequency Scoring
3.0GHz 8GB 1333MHz 3×8×1333
And secondly, distributing a password detection task to the password detection slave according to the grading result.
Illustratively, the score of each password detection slave machine is used as a numerator, the scores of all the password detection slave machines are added to be used as a denominator, the task proportion allocated to the current password detection slave machine is calculated, and the password detection master machine allocates the password detection tasks according to the task proportion.
For example, if the scoring results of three slave cryptographic detectors are S1, S2, and S3, respectively, the ratio of tasks allocated by the first machine is:
Figure BDA0002322386370000081
x represents a task allocation ratio; s1, S2, and S3 are the scoring results of three slaves, respectively.
Specifically, for example, as shown in table 2, assuming that the total number of the password detection tasks is 100, the password detection slave 1 is assigned to 78 tasks, the password detection slave 2 is assigned to 18 tasks, and the password detection slave 3 is assigned to 4 tasks according to the scoring computer task ratio in the table.
TABLE 2
Figure BDA0002322386370000082
Figure BDA0002322386370000091
According to the hardware configuration information of each password detection slave machine provided by the embodiment, the password detection host machine can more reasonably allocate the password detection tasks according to the hardware performance of the password detection slave machine, the password detection slave machine with high performance allocates more password detection tasks, the password detection slave machine with low performance allocates less password detection tasks, and the password detection efficiency is further improved.
As an optional embodiment of the present application, S120 includes, after:
first, the number of executed password detection tasks is received.
Illustratively, in the process of executing password detection, the password detection master receives the number of executed password detection tasks sent by the password detection slave.
Secondly, determining the progress of the password detection task according to the number of the executed password detection tasks.
For example, the overall password detection task progress may be determined according to the number of executed password detection tasks returned by each password detection slave, by adding the number of executed tasks returned by each password detection slave, and comparing the sum of the obtained number of executed tasks of each password detection master with the total number of password detection tasks, thereby determining the password detection task progress. Taking the data in table 2 as an example, assuming that after 5 seconds, the message returned by the password detection slave 1 completes 20 tasks, the message returned by the password detection slave 2 completes 5 tasks, and the message returned by the password detection slave 3 completes 1 task, the master displays that the overall task progress is (20+5+ 1)/100-26%.
The password detection host determines the password detection task progress according to the password detection task completion number of the received password detection slave machines, so that the password detection host is favorable for better controlling the overall completion progress, is convenient for a user to check the progress, and is also convenient for the password detection host to redistribute the password detection tasks.
As an optional embodiment of the present application, S120 includes, after: and receiving an execution result of the password detection task, and sending a command for stopping the password detection task to the password detection slave when receiving the information that the password detection task is successful.
For example, the execution result of the password detection task received by the password detection host may be success of the password detection task and failure of the password detection task. The password detection task successfully indicates that any password detection slave machine detects a correct wireless password; the failure of the password detection task indicates that the correct wireless passwords are not detected when all the password detection slave machines execute all the distributed detection tasks. When the password detection host receives a message that the password detection task sent by any one password detection slave machine is successful, the password detection host acquires and stores the wireless password successfully detected by the password detection slave machine, and simultaneously sends a command for stopping the password detection task to the rest of the password detection slave machines.
As an optional embodiment of the present application, S120 further includes:
and when the information that the password detection task of any password detection slave fails is received, the password detection task is distributed to the password detection slave again according to the progress of the password detection task.
Illustratively, the failure of the detection task of any one of the password detection slaves indicates that the correct wireless password is not detected when any one of the password detection slaves has completed all the allocated password detection tasks. When one password detection slave machine sends information that the password detection task fails to the password detection master machine, the master machine redistributes the password detection task to each password detection slave machine according to the current password detection task progress, and the distribution mode can be still distributed according to the configuration information of each password detection slave machine.
According to the method provided by the embodiment, when any one password detection slave machine completes all the distributed password detection tasks and does not detect the correct password, the password detection master machine distributes the tasks to the password detection slave machines again according to the progress of the password detection tasks, so that the utilization rate of each password detection slave machine is improved, and the efficiency of the whole password detection is further improved.
As an optional embodiment of the present application, S120 further includes: and updating the password detection state information.
Illustratively, when any password detection slave machine detects a correct wireless password, the password detection master machine updates the password detection state to be that the password detection is successful, and displays a message of successful password detection and the detected password for a user to view; when all the password detection tasks are executed and the correct password is not detected yet, the password detection host updates the password detection state and displays a password detection task failure message to inform a user of the failure of the password detection. The embodiment enables the user to clearly know the password detection state information.
The embodiment of the application provides a wireless password detection method, which can be used for any terminal or server capable of performing password detection. As shown in fig. 2, the method comprises the steps of:
s210, broadcasting request information and an IP address.
Illustratively, the request message may be a request message of broadcasting the router from the password detection slave to the router, and after the router responds to the request message of the password detection slave, the password detection slave accesses the router, and the password detection slave broadcasts its own IP address in a local area network established by the router for the password detection master to discover and send a configuration message acquisition instruction.
S220, when the configuration information acquisition instruction is received, the configuration information is sent.
Illustratively, the configuration information sent according to the configuration information acquisition instruction may be inherent hardware configuration information of the password detection slave, including a CPU master frequency, a memory size, and a memory frequency; or the current running state of the slave machine, such as the current residual memory size, the CPU master frequency, etc., may be detected by the password. The embodiment of the present application does not limit what kind of configuration information is sent, and those skilled in the art can determine the configuration information according to needs.
And S230, when the password detection task is received, executing the password detection task according to the target detection method.
Illustratively, the target detection method for performing the password detection task may be an exhaustive trial method according to a password dictionary, a combined detection method of a PIN code, or a data packet capture detection method. The target detection method is not limited in the embodiments of the present application, and can be determined by those skilled in the art as needed.
According to the wireless password detection method provided by the embodiment of the invention, the configuration information is sent to the password detection host by each password detection slave machine, the password detection task distributed by the password detection host is received, and the passwords are detected by a plurality of password detection slave machines, so that the password detection efficiency is improved; and the number of the password detection slave machines is expandable, so that the expandability of the password detection system is improved.
As an optional embodiment of the present application, S220 further includes: and uploading the number of the executed password detection tasks and the execution result of the password detection tasks according to the target interval duration.
Illustratively, the target interval duration may be 5 seconds, and the execution result of the password detection task may be success of the password detection task and failure of the password detection task. The password detection task successfully indicates that any password detection slave machine detects a correct wireless password; the failure of the password detection task indicates that the correct wireless passwords are not detected when all the password detection slave machines execute all the distributed detection tasks. The target interval duration is not limited in the embodiments of the present application, and can be determined by those skilled in the art as needed.
In the embodiment, the password detection slave machine uploads the number of executed password detection tasks and the execution result of the password detection tasks to the password detection host machine within the target interval, so that the password detection host machine can monitor the task state and the detection result of each password detection slave machine.
As an optional embodiment of the present application, S220 further includes: and when receiving a command of stopping the password detection task, stopping executing the password detection task. The embodiment is beneficial to saving computer resources.
As an optional embodiment of the present application, after S230, the method further includes:
firstly, the state of the router equipment to be detected in the password detection task is obtained.
For example, the router device state may be whether to turn on the WPS function, and the obtaining manner may be monitoring by using an airtrack-ng suite, first checking, through the check function, services that may have an influence on the airtrack-ng suite, closing the services that may have an influence by using an airon-ng check kill, secondly, starting a monitor monitoring mode on a wlan0 network card, and finally enabling the airtrack-ng to scan surrounding wireless signals to obtain a scan result list, where a router in the WPS column that is not empty is a device that indicates that the WPS function is turned on. The embodiment of the application does not limit how to obtain the state of the router device to be detected in the password detection task, and a person skilled in the art can determine the state as required.
And secondly, when the router device to be detected starts the WPS function, executing the password detection task by using a first target cracking method.
Illustratively, the first target cracking method can be used for cracking the PIN code through combination, wherein the PIN code is an identification code consisting of 8 pure digits and is divided into three parts, the first 4 digits are a first part, the 5 th to 7 th digits are a second part, and the last 1 digit is a third part. The verification of the first part is not associated with the second part, and the last 1 bit is a check code calculated according to the first part and the second part, so that the three parts can be cracked separately. The first part is cracking: the first 4 bits are 0000-; and the second part is cracked: positions 5-7 are 000-999 for a total of 1000 combinations; and the third part is cracked. The eighth parity check code is calculated according to the following formula: if the first 7 bits of the PIN code are ABCDEFG respectively; the check code is 10-mod (3 × (a + C + E + G) + B + D + F),10), and if the check code is 10, it is 0. In this way, the PIN code can be obtained in a maximum of 11010 attempts.
And thirdly, when the WPS function is not started by the router device to be detected, judging whether the router to be detected is accessed to the external device.
For example, the manner of judging whether the router to be detected is accessed to the external device may be to obtain traffic statistical data of background data of the router, judge whether the external device is accessed according to the traffic statistical data, and when the traffic data indicates that the external device is currently accessed, when the traffic data does not indicate that the external device is not currently accessed; or, by obtaining the client list in the DHCP server, when the client list is not empty, it indicates that an external device is currently accessed, and when the client list is empty, it indicates that no external device is currently accessed. The embodiment of the application does not limit the manner of judging whether the router to be detected is accessed to the external device, and a person skilled in the art can determine the manner according to needs.
And then, when the router to be detected is accessed into the external equipment, executing the password detection task by using a second target cracking method according to the acquired data packet.
Illustratively, according to the acquired data packet, the performing of the password detection task by using the second target cracking method specifically includes: the password detection slave unit obtains a service set identifier SSID from the first handshake packet, provides a pre-shared key PSK through a password dictionary, and obtains a PMK through calculation of the PMK (SHA-1) (SSID, PSK) by using the service set identifier SSID and the pre-shared key PSK; acquiring a random number SNonce sent to the router by the client and a random number ANonce generated by the client from the captured second handshake packet between the router and the client, and generating a PTK by utilizing the PMK, the AP _ MAC (AA), the STATION _ MAC (SA), the SNonce and the ANonce; PTK — SHA1_ PRF (PMK, len (PMK)), "Pairwise KEY expansion", MIN (AA, SA) | Max (AA, SA) | MIN (ANonce, SNonce) | Max (ANonce, SNonce)) extracts the first 16 bytes of this PTK to form a MIC KEY; analyzing ANonce sent by the router in the grabbing of the handshake packet for the third time, and generating a PTK in the same way; extracting the first 16 bytes of the PTK to form an MIC KEY, and obtaining an MIC value by using the MIC HMAC _ MD5(MIC Key, 16, 802.1x data); acquiring 802.1x data and an MIC value sent by a client in the grabbing of the fourth handshake packet, sending the 802.1x data and the MIC value to a router, and calculating the MIC by using MIC KEY and MIC-HMAC _ MD5(MIC Key, 16, 802.1x data). if the MIC' is equal to the MIC sent by the STATION, the PSK provided by a password dictionary in the first handshake is the secret KEY; if not, the PSK is not a key, and the next PSK calculation is carried out.
And finally, when the router to be detected does not access the external equipment, executing the password detection task by using a third target cracking method.
Illustratively, the third target cracking method is an exhaustive trial method according to a password dictionary, and the method specifically includes: and selecting the password from the password dictionary, and performing password detection by directly establishing connection with the router until a password which is successfully connected is found or all passwords cannot be successfully connected.
According to the method, the equipment state of the router is obtained, different password cracking methods are executed aiming at different equipment states, when the WPS function is started by the router, a PIN (personal identification number) is cracked in a combined mode, when the router is not started, according to the condition that a client side is connected with the router or not connected with the router, the router is cracked in an offline packet capturing cracking mode and an exhaustive cracking mode according to a password dictionary, and for PIN code cracking, PIN codes can be obtained only by executing 11010 attempts, so that the cracking task amount is reduced, and the cracking efficiency is improved; as the PIN cracking and the handshake cracking are in an off-line cracking mode, the problem that target equipment is paralyzed due to too large data volume in the cracking process can be effectively solved.
The present embodiment provides a wireless password detection apparatus, which may be present in any terminal or server capable of performing password detection, and the present embodiment takes the terminal as an example, and the terminal is used as a password detection master, and the password detection master may be in communication connection with a plurality of password detection slaves. The device includes:
the password detection slave machine comprises a configuration information acquisition module, a configuration information acquisition module and a password detection module, wherein the configuration information acquisition module is used for sending a configuration information acquisition instruction to each password detection slave machine when receiving request information of a plurality of password detection slave machines; the specific implementation is shown in this embodiment S110, which is not described herein again.
The task allocation module is used for allocating a password detection task to the password detection slave machine according to the received configuration information of the password detection slave machine; the specific implementation is shown in this embodiment S120, which is not described herein again.
As an optional embodiment of the present application, the task allocation module includes:
the scoring module is used for scoring the password detection slave according to the received configuration information of the password detection slave; the specific implementation manner is shown in the corresponding part of the method of the embodiment, and is not described herein again.
And the task allocation submodule is used for allocating the password detection task to the password detection slave according to the grading result. The specific implementation manner is shown in the corresponding part of the method of the embodiment, and is not described herein again.
As an optional embodiment of the present application, the task allocation module includes:
and the task quantity receiving module is used for receiving the executed password detection task quantity. The specific implementation manner is shown in the corresponding part of the method of the embodiment, and is not described herein again.
And the task progress determining module is used for determining the progress of the password detection task according to the number of the executed password detection tasks. The specific implementation manner is shown in the corresponding part of the method of the embodiment, and is not described herein again.
As an optional embodiment of the present application, the task allocation module includes:
and the task execution result receiving module is used for receiving the execution result of the password detection task. The specific implementation manner is shown in the corresponding part of the method of the embodiment, and is not described herein again.
And the task stopping instruction sending module is used for sending a password detection task stopping instruction to the password detection slave machine when receiving the information that the password detection task is successful. The specific implementation manner is shown in the corresponding part of the method of the embodiment, and is not described herein again.
As an optional embodiment of the present application, the task allocation module includes:
and the task redistribution module is used for redistributing the password detection task to the password detection slave according to the password detection task progress when receiving the information that the password detection task of any password detection slave fails. The specific implementation manner is shown in the corresponding part of the method of the embodiment, and is not described herein again.
As an optional embodiment of the present application, after the task allocation module, the method further includes:
and the state sending module is used for updating the password detection state information. The specific implementation manner is shown in the corresponding part of the method of the embodiment, and is not described herein again.
The present embodiment provides a wireless password detection apparatus, which may be present in any terminal or server capable of performing password detection, where the terminal is taken as an example in the present embodiment of the application, and the terminal is taken as a password detection slave, and the password detection slave may be in communication connection with a password detection host. The device includes:
and the information broadcasting module is used for broadcasting the request information and the IP address. The specific implementation is shown in this embodiment S210, which is not described herein again.
And the configuration information sending module is used for sending the configuration information when receiving the configuration information acquisition instruction. The specific implementation is shown in this embodiment S220, which is not described herein again.
And the task execution module is used for executing the password detection task according to the target detection method when the password detection task is received. The specific implementation is shown in this embodiment S230, which is not described herein again.
As an optional embodiment of the present application, after configuring the information sending module, the method further includes:
and the execution result uploading module is used for uploading the number of the executed password detection tasks and the execution result of the password detection tasks according to the target interval duration. The specific implementation manner is shown in the corresponding part of the method of the embodiment, and is not described herein again.
As an optional implementation manner of the present application, after configuring the information sending module, the method further includes:
and the task stop execution module is used for stopping executing the password detection task when receiving the password detection task stop instruction. The specific implementation manner is shown in the corresponding part of the method of the embodiment, and is not described herein again.
For an optional implementation manner of the present application, the task execution module includes:
and the router state acquisition module is used for acquiring the state of the router equipment to be detected in the password detection task. The specific implementation manner is shown in the corresponding part of the method of the embodiment, and is not described herein again.
And the first target cracking method execution module is used for executing the password detection task by utilizing the first target cracking method when the router device to be detected starts the WPS function. The specific implementation manner is shown in the corresponding part of the method of the embodiment, and is not described herein again.
And the equipment access judging module is used for judging whether the router to be detected is accessed to the external equipment or not when the WPS function is not started by the equipment to be detected. The specific implementation manner is shown in the corresponding part of the method of the embodiment, and is not described herein again.
The second target cracking method execution module is used for executing the password detection task by using a second target cracking method according to the acquired data packet when the router to be detected is accessed to the external equipment; the specific implementation manner is shown in the corresponding part of the method of the embodiment, and is not described herein again.
The third target cracking method execution module is used for executing the password detection task by using a third target cracking method when the router to be detected does not access the external equipment; the specific implementation manner is shown in the corresponding part of the method of the embodiment, and is not described herein again.
The embodiment of the present application further provides a wireless password detection device, as shown in fig. 3, a processor 310 and a memory 320, where the processor 310 and the memory 320 may be connected by a bus or other means.
Processor 310 may be a Central Processing Unit (CPU). The Processor 310 may also be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, or any combination thereof.
The memory 320 is a non-transitory computer readable storage medium, and can be used to store non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the wireless password detection method in the embodiment of the present invention. The processor executes various functional applications and data processing of the processor by executing non-transitory software programs, instructions, and modules stored in the memory.
The memory 320 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created by the processor, and the like. Further, the memory may include high speed random access memory, and may also include non-transitory memory, such as at least one disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, memory 320 may optionally include memory located remotely from the processor, which may be connected to the processor via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The one or more modules are stored in the memory 320 and, when executed by the processor 310, perform a wireless password detection method as in the embodiment shown in fig. 1.
The details of the electronic device may be understood with reference to the corresponding related description and effects in the embodiment shown in fig. 1, and are not described herein again.
The embodiment also provides a computer storage medium, wherein the computer storage medium stores computer executable instructions, and the computer executable instructions can execute the wireless password detection method in any method embodiment. The storage medium may be a magnetic Disk, an optical Disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a Flash Memory (Flash Memory), a Hard Disk (Hard Disk Drive, abbreviated as HDD), a Solid State Drive (SSD), or the like; the storage medium may also comprise a combination of memories of the kind described above.
It should be understood that the above examples are only for clarity of illustration and are not intended to limit the embodiments. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. And are neither required nor exhaustive of all embodiments. And obvious variations or modifications therefrom are within the scope of the invention.

Claims (10)

1. A wireless password detection method is characterized by comprising the following steps:
when request information of a plurality of password detection slave machines is received, sending a configuration information acquisition instruction to each password detection slave machine;
and distributing a password detection task to the password detection slave machine according to the received configuration information of the password detection slave machine.
2. The method of claim 1, wherein the allocating the password detection task to the password detection slave according to the received configuration information of the password detection slave comprises:
according to the received configuration information of the password detection slave machine, scoring the password detection slave machine;
and distributing the password detection task to the password detection slave machine according to the grading result.
3. The method according to claim 1, wherein after the distributing the password detection task to the password detection slave according to the received configuration information of the password detection slave, the method further comprises:
receiving the number of executed password detection tasks;
and determining the progress of the password detection task according to the number of the executed password detection tasks.
4. The method according to claim 1, wherein after the distributing the password detection task to the password detection slave according to the received configuration information of the password detection slave, the method further comprises:
receiving an execution result of a password detection task;
and when the information that the password detection task is successful is received, sending a command for stopping the password detection task to the password detection slave.
5. The method according to claim 3, wherein after the password detection slave is assigned with the password detection task according to the received configuration information of the password detection slave, the method further comprises:
when the information that the password detection task of any password detection slave fails is received, the password detection task is distributed to the password detection slave again according to the progress of the password detection task.
6. The method according to claim 4, wherein after the distributing the password detection task to the password detection slave according to the received configuration information of the password detection slave, the method further comprises:
and updating the password detection state information.
7. A wireless password detection method is characterized by comprising the following steps:
broadcasting request information and an IP address;
when a configuration information acquisition instruction is received, transmitting configuration information;
and when the password detection task is received, executing the password detection task according to the target detection method.
8. The method of claim 7, wherein after sending the configuration information when receiving the configuration information obtaining instruction, the method further comprises:
and uploading the number of the executed password detection tasks and the execution result of the password detection tasks according to the target interval duration.
9. The method of claim 7, wherein after sending the configuration information when receiving the configuration information obtaining instruction, the method further comprises:
and when receiving a command of stopping the password detection task, stopping executing the password detection task.
10. The method of claim 7, wherein when receiving the password detection task, performing the password detection task according to the target detection method comprises:
acquiring the state of the router equipment to be detected in the password detection task;
when the router device to be detected starts the WPS function, a first target cracking method is used for executing a password detection task;
when the WPS function is not started by the router device to be detected, whether the router to be detected is accessed to an external device is judged;
when the router to be detected is accessed to external equipment, a second target cracking method is used for executing a password detection task according to the acquired data packet;
and when the router to be detected does not access the external equipment, executing a password detection task by using a third target cracking method.
CN201911303190.3A 2019-12-17 2019-12-17 Wireless password detection method Pending CN111212419A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911303190.3A CN111212419A (en) 2019-12-17 2019-12-17 Wireless password detection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911303190.3A CN111212419A (en) 2019-12-17 2019-12-17 Wireless password detection method

Publications (1)

Publication Number Publication Date
CN111212419A true CN111212419A (en) 2020-05-29

Family

ID=70787229

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911303190.3A Pending CN111212419A (en) 2019-12-17 2019-12-17 Wireless password detection method

Country Status (1)

Country Link
CN (1) CN111212419A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102045159A (en) * 2010-12-30 2011-05-04 北京锐安科技有限公司 Decryption processing method and device thereof
CN103701629A (en) * 2013-11-27 2014-04-02 北京神州泰岳软件股份有限公司 Weak password analysis method and system
CN104077542A (en) * 2014-07-10 2014-10-01 南威软件股份有限公司 Password cracking system and method
CN104615945A (en) * 2015-02-04 2015-05-13 中国电子科技集团公司第三十研究所 Code cracking method and system based on multiple GPU cracking devices
CN106130957A (en) * 2016-06-08 2016-11-16 山东师范大学 Police long-range WiFi network investigation evidence-obtaining system based on Fructus Rubi group and method thereof
CN107689869A (en) * 2016-08-05 2018-02-13 华为技术有限公司 The method and server of user password management
CN109120679A (en) * 2018-07-27 2019-01-01 平安科技(深圳)有限公司 Method for allocating tasks and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102045159A (en) * 2010-12-30 2011-05-04 北京锐安科技有限公司 Decryption processing method and device thereof
CN103701629A (en) * 2013-11-27 2014-04-02 北京神州泰岳软件股份有限公司 Weak password analysis method and system
CN104077542A (en) * 2014-07-10 2014-10-01 南威软件股份有限公司 Password cracking system and method
CN104615945A (en) * 2015-02-04 2015-05-13 中国电子科技集团公司第三十研究所 Code cracking method and system based on multiple GPU cracking devices
CN106130957A (en) * 2016-06-08 2016-11-16 山东师范大学 Police long-range WiFi network investigation evidence-obtaining system based on Fructus Rubi group and method thereof
CN107689869A (en) * 2016-08-05 2018-02-13 华为技术有限公司 The method and server of user password management
CN109120679A (en) * 2018-07-27 2019-01-01 平安科技(深圳)有限公司 Method for allocating tasks and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
姜秀柱: "《计算机网络》", 31 July 2010, 中国矿业大学出版社, pages: 242 *

Similar Documents

Publication Publication Date Title
TWI705349B (en) Terminal authentication processing, authentication method, device and system
EP3046394B1 (en) Message processing method and mme selection method and device
US9986431B2 (en) Method and apparatus for direct communication key establishment
US11778458B2 (en) Network access authentication method and device
CN108683690B (en) Authentication method, user equipment, authentication device, authentication server and storage medium
EP3338472A1 (en) Method and apparatus for direct communication key establishment
KR102102741B1 (en) Method, device and system for authenticating to a mobile network, and server to authenticate devices to a mobile network
CN113423105B (en) Network connection method and device
CN112672351A (en) Wireless local area network authentication method and device, electronic equipment and storage medium
CN106713522B (en) Wireless fidelity Wi-Fi connection method and mobile terminal
JP2023165679A (en) Device for remotely managing apparatuses, method, and program therefor
US20160065543A1 (en) Communication system, management server, server, concentrator, and encryption setting method
CN110769482B (en) Method and device for network connection of wireless equipment and wireless router equipment
CN110071950B (en) Information transmission method, transfer device, terminal, controlled device and storage medium
CN109906452B (en) Authentication method, authentication equipment and authentication system
CN111212419A (en) Wireless password detection method
US20160323744A1 (en) Authentication and association method and system
CN110572857A (en) Network connection processing method and device
CN108702705B (en) Information transmission method and equipment
CN114338132A (en) Secret-free login method, client application, operator server and electronic equipment
JP2023553593A (en) Device management method using blockchain network, related devices and computer programs
CN110381505B (en) Method and device for accessing network hard disk video recorder
US20200195533A1 (en) Triggering packet capture based on detecting a sequence anomaly
CN107548058B (en) Equipment access method and intelligent terminal
CN113891385B (en) Method, device and equipment for detecting link state of network equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination