CN109033770A - A kind of Hewlett-Packard's printer default username password detection method based on python - Google Patents
A kind of Hewlett-Packard's printer default username password detection method based on python Download PDFInfo
- Publication number
- CN109033770A CN109033770A CN201810745078.4A CN201810745078A CN109033770A CN 109033770 A CN109033770 A CN 109033770A CN 201810745078 A CN201810745078 A CN 201810745078A CN 109033770 A CN109033770 A CN 109033770A
- Authority
- CN
- China
- Prior art keywords
- printer
- python
- hewlett
- packard
- address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Abstract
Hewlett-Packard's printer default username password detection method based on python that the invention discloses a kind of, it includes: S1: inputting IP address section to be scanned, port numbers, reads the default parameters file of Hewlett-Packard's printer;S2: according to IP address section, port numbers, port scan is carried out using python, obtains specified address port opening status;S3: according to the IP address filtered out, corresponding url access link is generated;S4: url access link is accessed one by one using python, and obtains access webpage information;S5: according to the webpage information in step S4, judge that printer whether there is default username password hidden danger, and show record result.The default account name password that the present invention can simply, quickly detect Hewlett-Packard's printer in certain IP or network sector address whether there is, and avoids passing through the network printer in time and the file private leakage of a state or party secret occurs.
Description
Technical field
The present invention relates to printer detection technique field, especially a kind of Hewlett-Packard's printer default user based on python
Name password detection method.
Background technique
The network printer is the indispensable office network equipment of current major medium-sized and small enterprises' normal office work, but for big
For medium-sized enterprise, there are data, and shared or private not to be allowed to let out again between different departments or individual (especially department head)
Situation, especially as Corporate Finance, audit, occurrences in human life etc. grasp the department of company's core key information.Currently, it generally uses both at home and abroad
The network printer be concentrated mainly on Hewlett-Packard, Canon, Deng Ji large manufacturer of Fuji brand product, and the default of these printers is stepped on
Employ name in an account book password and be disclosed, most enterprises are often ignored modification or set again when using the network printer
Login username password is set, and printed information can all have record and retention in printer, this results in any in consolidated network
Terminal, which can pass through Telnet and access the network printer, carries out the information inquiry such as operation and data, thus in consolidated network
Different departments in (inside firewall or allow address of outside access), there are data privates to divulge a secret for the person-to-person network printer
Danger, once and the core concerning security matters data of core department of company is illegally grasped, suffer heavy losses.
Therefore, the present invention is programmed based on python from problem above, proposes a kind of Hewlett-Packard's printer default username
Password detection method.
Summary of the invention
In view of the above drawbacks of the prior art, Hewlett-Packard's printing based on python that it is an object of the invention to provide a kind of
Machine default username password detection method can simply, quickly detect the silent of Hewlett-Packard's printer in certain IP or network sector address
Name in an account book of admitting what one has said or done password whether there is, and avoids passing through the network printer in time and the file private leakage of a state or party secret occurs.
It is realized the purpose of the present invention is technical solution in this way, a kind of Hewlett-Packard's printer default based on python
User name password detection method, it includes:
S1: inputting IP address section to be scanned, port numbers, reads the default parameters file of Hewlett-Packard's printer;
S2: according to IP address section, port numbers, carrying out port scan using python, obtains the open feelings of specified address port
Condition;
S3: according to the IP address filtered out, corresponding url access link is generated;
S4: url access link is accessed one by one using python, and obtains access webpage information;
S5: according to the webpage information in step S4, judge that printer whether there is default username password hidden danger, and show
Record result.
Further, the step S2 further includes having:
S21: using the order line calling module in python, according to the IP address after screening, nmap fingerprint is carried out to it
Detection;
S22: according to nmap fingerprint detection as a result, filtering out the IP address in fingerprint comprising Hewlett-Packard's Printer Information.
Further, the step S4 further includes having:
S41: according to webpage information, Hewlett-Packard's printer model, logging state is obtained and logs in required input parameter;
S42: according to printer model and logging in required parameter, the known default username password provided using manufacturer,
Printer sign-on access is carried out using requests module in python.
Further, IP address section to be scanned in step S1 includes: 10.185.10.0/24 and port numbers 22-23,
80 and 443.
By adopting the above-described technical solution, the present invention has the advantage that: the present invention is based on python programmings, can
Simply, the default account name password for quickly detecting Hewlett-Packard's printer in certain IP or network sector address whether there is, and avoid in time
The file private leakage of a state or party secret occurs by the network printer.And code of the present invention is simple, and required running environment is of less demanding, operation
Process is quick, and operating process is easy, can in time, efficiently complete whether Hewlett-Packard's printer inside network segment uses default username close
The detection of code avoids passing through the core data private leakage of a state or party secret of network printer generation well.
Other advantages, target and feature of the invention will be illustrated in the following description to a certain extent, and
And to a certain extent, based on will be apparent to those skilled in the art to investigating hereafter, Huo Zheke
To be instructed from the practice of the present invention.
Detailed description of the invention
Detailed description of the invention of the invention is as follows:
Fig. 1 is the flow diagram of Hewlett-Packard's printer default username password detection method based on python.
Specific embodiment
Present invention will be further explained below with reference to the attached drawings and examples.
Embodiment 1: as shown in Figure 1;A kind of Hewlett-Packard's printer default username password detection method based on python, it
Include:
S1: inputting IP address section to be scanned, port numbers, reads the default parameters file of Hewlett-Packard's printer;If used
After the success of default username password login, the page after login directly can configure the page comprising printer system, such as
Parameters such as ' setting ' ' LaserJet ' ' administrator ' can all occur in the page, while can join to printer
Number setting, history of printing data are checked.
The step S4 further includes having:
IP address section to be scanned includes in step S1: 10.185.10.0/24 and port numbers 22-23,80 and 443.
S2: according to IP address section, port numbers, carrying out port scan using python, obtains the open feelings of specified address port
Condition;
The step S2 further includes having:
S21: using the order line calling module in python, according to the IP address after screening, nmap fingerprint is carried out to it
Detection;
S22: according to nmap fingerprint detection as a result, filtering out the IP address in fingerprint comprising Hewlett-Packard's Printer Information.
S3: according to the IP address filtered out, corresponding url access link is generated;
S4: url access link is accessed one by one using python, and obtains access webpage information;
S41: according to webpage information, Hewlett-Packard's printer model, logging state is obtained and logs in required input parameter;
S42: according to printer model and logging in required parameter, the known default username password provided using manufacturer,
Printer sign-on access is carried out using requests module in python.
S5: according to the webpage information in step S4, judge that printer whether there is default username password hidden danger, and show
Record result.
The present invention is based on python programmings, can simply, quickly detect Hewlett-Packard's printer in certain IP or network sector address
Default account name password whether there is, avoid passing through in time the network printer occur the file private leakage of a state or party secret.And the present invention
Code is simple, and required running environment is of less demanding, and operational process is quick, and operating process is easy, can in time, efficiently complete network segment
Whether internal Hewlett-Packard's printer uses the detection of default username password, avoids passing through the core of network printer generation well
The data private leakage of a state or party secret.
Embodiment 2: as shown in Figure 1;A kind of Hewlett-Packard's printer default username password detection method based on python, it
Include:
The network sector address (such as: 10.185.10.0/24) and printer for needing to scan by order line input are common
Port numbers (such as: 22-23,80,443), call masscan, nmap to sweep in python using os module in python script
Tool is retouched, network address, the quick detection of port are carried out, position network printer position and obtains printer essential information.Meanwhile benefit
Default username password detection is carried out to the network printer with requests module.By above procedure, can be obtained in the short time
All Hewlett-Packard's network printers address in the network segment is taken, and realizes the quick inspection that whether there is default username password to it
It surveys.Specific step is as follows:
Firstly, user by prompt input need the IP that detects or network sector address (network segment address and subnet mask) and
(scan address and port are all provided with default value to the port numbers for needing to scan, i.e., reading specified file content, user can pass through
Modification formulates file content default parameters is arranged, it is not necessary to input same or similar parameter every time, save the time);
Subsequently, based on the network sector address of input and port, the order line command of os module offer is utilized in python
Function calls masscan to open to the port scan in network segment, checks open-ended situation;
Then, according to network segment inner port opening status, filter out that there may be the open addresses ip of printer (especially
22-23,80,443 printer well known port ports), it prepares for nmap fingerprint recognition;
Then, nmap tool is called in python, and fingerprint recognition is opened to the address ip after screening, obtains corresponding network
Facility information (the network service including unlatching, the information such as hardware device used);
Then, according to nmap scanning result, Hewlett-Packard's printer apparatus corresponds to ip within the scope of further screening scan address
Address, and format is linked according to url, generate its url link;
Then, it using requests module in python, accesses to the url link of generation, by crawling webpage number
According to obtaining corresponding printer model, logging state and log in the input information such as parameter;
Then, according to information such as the printer model parameter of acquisition, logging states, the default account name provided using manufacturer
Password is submitted login parameters to cease, is detected using requests;
Finally, the page info after being attempted according to sign-on access, it is silent with the presence or absence of printer to judge that url links corresponding ip
The case where recognizing unmodified user name password or resetting, and the testing result for the hidden danger that will be present is shown in order line.
The present invention is based on python programmings, can simply, quickly detect Hewlett-Packard's printer in certain IP or network sector address
Default account name password whether there is, avoid passing through in time the network printer occur the file private leakage of a state or party secret.And the present invention
Code is simple, and required running environment is of less demanding, and operational process is quick, and operating process is easy, can in time, efficiently complete network segment
Whether internal Hewlett-Packard's printer uses the detection of default username password, avoids passing through the core of network printer generation well
The data private leakage of a state or party secret.
It should be understood that the part that this specification does not elaborate belongs to the prior art.Finally, it is stated that above
Embodiment is only used to illustrate the technical scheme of the present invention and not to limit it, although having carried out in detail referring to preferred embodiment to the present invention
Illustrate, those skilled in the art should understand that, can with modification or equivalent replacement of the technical solution of the present invention are made,
Without departing from the objective and range of the technical program, it is intended to be within the scope of the claims of the invention.
Claims (4)
1. a kind of Hewlett-Packard's printer default username password detection method based on python, which is characterized in that the method tool
Steps are as follows for body:
S1: inputting IP address section to be scanned, port numbers, reads the default parameters file of Hewlett-Packard's printer;
S2: according to IP address section, port numbers, port scan is carried out using python, obtains specified address port opening status;
S3: according to the IP address filtered out, corresponding url access link is generated;
S4: url access link is accessed one by one using python, and obtains access webpage information;
S5: according to the webpage information in step S4, judge that printer whether there is default username password hidden danger, and show record
As a result.
2. Hewlett-Packard's printer default username password detection method based on python, feature exist as described in claim 1
In the step S2 further includes having:
S21: using the order line calling module in python, according to the IP address after screening, nmap fingerprint detection is carried out to it;
S22: according to nmap fingerprint detection as a result, filtering out the IP address in fingerprint comprising Hewlett-Packard's Printer Information.
3. Hewlett-Packard's printer default username password detection method based on python, feature exist as described in claim 1
In the step S4 further includes having:
S41: according to webpage information, Hewlett-Packard's printer model, logging state is obtained and logs in required input parameter;
S42: according to printer model and logging in required parameter, the known default username password provided using manufacturer,
Printer sign-on access is carried out using requests module in python.
4. Hewlett-Packard's printer default username password detection method based on python, feature exist as described in claim 1
In IP address section to be scanned includes in step S1: 10.185.10.0/24 and port numbers 22-23,80 and 443.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810745078.4A CN109033770A (en) | 2018-07-09 | 2018-07-09 | A kind of Hewlett-Packard's printer default username password detection method based on python |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810745078.4A CN109033770A (en) | 2018-07-09 | 2018-07-09 | A kind of Hewlett-Packard's printer default username password detection method based on python |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109033770A true CN109033770A (en) | 2018-12-18 |
Family
ID=64640669
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810745078.4A Pending CN109033770A (en) | 2018-07-09 | 2018-07-09 | A kind of Hewlett-Packard's printer default username password detection method based on python |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109033770A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110266562A (en) * | 2019-07-01 | 2019-09-20 | 四川新网银行股份有限公司 | The method of network application system identity authentication function detected automatically |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090055910A1 (en) * | 2007-08-20 | 2009-02-26 | Lee Mark C | System and methods for weak authentication data reinforcement |
CN103368978A (en) * | 2013-08-02 | 2013-10-23 | 公安部第三研究所 | System and method for achieving leak application and communication safety detection of smart mobile terminal |
CN104751047A (en) * | 2013-12-31 | 2015-07-01 | 北京新媒传信科技有限公司 | Weak password scanning method and device |
CN106603507A (en) * | 2016-11-29 | 2017-04-26 | 哈尔滨安天科技股份有限公司 | Method and system for automatically completing network security self checking |
CN108009428A (en) * | 2017-11-30 | 2018-05-08 | 郑州云海信息技术有限公司 | A kind of security configuration detection method for openstack |
CN108200106A (en) * | 2018-04-02 | 2018-06-22 | 浙江九州量子信息技术股份有限公司 | A kind of Internet of Things safety detection means of defence |
-
2018
- 2018-07-09 CN CN201810745078.4A patent/CN109033770A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090055910A1 (en) * | 2007-08-20 | 2009-02-26 | Lee Mark C | System and methods for weak authentication data reinforcement |
CN103368978A (en) * | 2013-08-02 | 2013-10-23 | 公安部第三研究所 | System and method for achieving leak application and communication safety detection of smart mobile terminal |
CN104751047A (en) * | 2013-12-31 | 2015-07-01 | 北京新媒传信科技有限公司 | Weak password scanning method and device |
CN106603507A (en) * | 2016-11-29 | 2017-04-26 | 哈尔滨安天科技股份有限公司 | Method and system for automatically completing network security self checking |
CN108009428A (en) * | 2017-11-30 | 2018-05-08 | 郑州云海信息技术有限公司 | A kind of security configuration detection method for openstack |
CN108200106A (en) * | 2018-04-02 | 2018-06-22 | 浙江九州量子信息技术股份有限公司 | A kind of Internet of Things safety detection means of defence |
Non-Patent Citations (1)
Title |
---|
何金栋: "Web中间件弱口令检测系统的设计和实现", 《通讯世界》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110266562A (en) * | 2019-07-01 | 2019-09-20 | 四川新网银行股份有限公司 | The method of network application system identity authentication function detected automatically |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109525558B (en) | Data leakage detection method, system, device and storage medium | |
JP5982575B2 (en) | Security scan based on dynamic taint | |
EP2132675B1 (en) | System and method for providing application penetration testing | |
Eronen et al. | An expert system for analyzing firewall rules | |
US20060041936A1 (en) | Method and apparatus for graphical presentation of firewall security policy | |
JP2013520719A (en) | Web service real-time vulnerability diagnosis and result information service system | |
JP2008135029A (en) | Web application assessment based on intelligent generation of attack string | |
CN103023699B (en) | A kind of network restoration method and system | |
CN112906010B (en) | Automatic attack testing method and automatic safety testing method based on same | |
JP2002534877A (en) | Method and apparatus for checking security vulnerabilities of network equipment | |
CN109977673B (en) | Vulnerability repairing method and system based on web website system security | |
Antrobus et al. | Simaticscan: Towards a specialised vulnerability scanner for industrial control systems | |
KR20190010956A (en) | intelligence type security log analysis method | |
US8677469B2 (en) | Firewall device | |
CN109033770A (en) | A kind of Hewlett-Packard's printer default username password detection method based on python | |
CN110768949B (en) | Vulnerability detection method and device, storage medium and electronic device | |
CN111193733A (en) | Gateway system based on intranet microservice architecture | |
CN110837646A (en) | Risk investigation device of unstructured database | |
CN113868669A (en) | Vulnerability detection method and system | |
CN109889514A (en) | A kind of certification scan method and web application scanning system | |
Shahriar et al. | OCL fault injection-based detection of LDAP query injection vulnerabilities | |
Anderson | Introduction to nessus | |
CN114629711B (en) | Method and system for detecting special Trojan horse on Windows platform | |
CN116015800A (en) | Scanner identification method and device, electronic equipment and storage medium | |
Duraisamy et al. | A server side solution for protection of web applications from cross-site scripting attacks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181218 |