CN114338072A - Remote login permission detection method for Root account of power distribution automation terminal - Google Patents

Remote login permission detection method for Root account of power distribution automation terminal Download PDF

Info

Publication number
CN114338072A
CN114338072A CN202111315199.3A CN202111315199A CN114338072A CN 114338072 A CN114338072 A CN 114338072A CN 202111315199 A CN202111315199 A CN 202111315199A CN 114338072 A CN114338072 A CN 114338072A
Authority
CN
China
Prior art keywords
power distribution
account
terminal
remote
distribution terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111315199.3A
Other languages
Chinese (zh)
Other versions
CN114338072B (en
Inventor
周云高
汤雍
王肖瑜
吴栋萁
张绮华
李晋
孙冉冉
宋晓阳
江灏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
Ningbo Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo Power Supply Co of State Grid Zhejiang Electric Power Co Ltd filed Critical Ningbo Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority to CN202111315199.3A priority Critical patent/CN114338072B/en
Publication of CN114338072A publication Critical patent/CN114338072A/en
Application granted granted Critical
Publication of CN114338072B publication Critical patent/CN114338072B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides a remote login permission detection method for a Root account of a power distribution automation terminal, which relates to the technical field of network security and comprises the following steps: connecting the terminal carrying the detection tool into a network of a power distribution terminal; scanning remote connection ports of the power distribution terminal, and detecting the safety of all the remote connection ports; acquiring an account password of a secure remote connection power distribution terminal, inputting the account password into a detection tool, and trying to remotely log in the power distribution terminal in a Root authority; remotely logging the account password in the power distribution terminal with a common authority, and checking whether the account password is logged in successfully; and checking the parameter values of the parameters related to the remote login in the power distribution terminal system file. The method solves the problems that when the equipment authority is analyzed manually, the number of the equipment and the number of the ports are too large, the detection, recording and management of all the equipment by operation and maintenance personnel are very complicated, and the workload is huge.

Description

Remote login permission detection method for Root account of power distribution automation terminal
Technical Field
The invention relates to the technical field of network security, in particular to a remote login permission detection method for a Root account of a power distribution automation terminal.
Background
Distribution automation terminals (hereinafter referred to as distribution terminals) are widely applied to power equipment such as distribution network substations, switching stations, ring main units, column switches, distribution transformers, box-type transformers and the like, are protected, monitored and controlled, and are connected with a main station through a communication network to complete the whole distribution network automation management function. When a master station or a communication network is attacked in a penetration mode, a power distribution terminal is an important attention target of hackers, and the damage caused by the attack is enlarged by acquiring the authority of the power distribution terminal to carry out more attacks. In the face of such security threats, a layer of protection measures can be added to the authority limit of the power distribution terminal access. However, in the actual power industry, various devices are too many, so that management holes are easily caused, and the authority management of the power distribution terminal is neglected, so that a great amount of devices are attacked to obtain the risk of authority.
The Root account, i.e., the "Root" account, is the most privileged account on all Unix-like systems. The account enables the user to perform all aspects of system management including adding accounts, changing user passwords, checking log files, installing software, etc. No security restrictions are placed on the "root" account, which means that any actions can be performed by the user. The system assumes that the user knows what he is doing and will execute exactly as the command is issued-no questions asked. Therefore, Root rights should not be used easily. The protection devices on the attacked equipment are all protected from behaviors obviously threatening virus protection, attack methods and the like, the behaviors with Root authority can be selectively released, or only the occurrence of threats can be reminded, but the handling operation is handed to a privileged account, and a hacker has the Root authority after remotely logging in, so that the protection devices can be easily closed, or a hacker tool is utilized to disable the protection devices.
For such situations, operation and maintenance personnel need to regularly detect the intranet, and know the situation of each device. At present, the detection mode of the power distribution terminal is very limited, and more, various traditional network detection tools are utilized to perform manual analysis on the detection result. The Root remote login condition of the power distribution terminal can be manually checked. The detection personnel can check the opening condition of the remote connection power distribution terminal by using the traditional port scanning tool. Then, the detection personnel remotely log in the power distribution terminal by using the common account and check the system file to detect whether the Root account authority remotely-logged power distribution terminal is forbidden or not.
The Chinese patent with the application number of CN201710847088.4 discloses an automatic detection method for the security of MySQL database configuration, firstly acquiring the version information of the MySQL database; detecting MySQL user account number authority, and prompting a security risk if the user is a Root user and a user capable of remotely logging in exists; a security risk is prompted if a non-administrator user has privileges. The invention provides a method for checking whether to obtain Root authority or remote login authority after user accounts with different authorities log in, but the security of a remote login port is not detected, and whether a system starts related authorities or not can not be accurately judged.
The method mainly provides an efficient scheme for the remote login forbidden detection of the Root account of the power distribution terminal, automatically detects and gives a result, and gives a mode for operation and maintenance personnel to simply and conveniently find the equipment authority management problem. This scheme intuitively detects permission patency by attempting to telnet with a Root account. The equipment ports are then scanned to detect an open condition of the power distribution terminal remote connection. And (4) giving the condition whether the remote connection of the Root account is opened or not by looking at the parameters of the system file. The found problems are output to operation and maintenance personnel, and can be corrected and managed in time.
Disclosure of Invention
The method mainly provides an efficient scheme for the remote login forbidden detection of the Root account of the power distribution terminal, automatically detects and gives a result, and gives a mode for operation and maintenance personnel to simply and conveniently find the equipment authority management problem.
In order to achieve the purpose, the invention provides the following technical scheme:
a remote login permission detection method for a Root account of a distribution automation terminal comprises the following steps:
s1, connecting the terminal with the detection tool into the network of the power distribution terminal;
s2, scanning remote connection ports of the power distribution terminal, and detecting the safety of all the remote connection ports;
s3, obtaining an account password of the safe remote connection power distribution terminal, inputting the account password into a detection tool, trying to remotely log in the power distribution terminal with Root authority, and checking whether the account password is logged in successfully; if the login fails, the account password is regarded as a common account password for subsequent verification;
s4, remotely logging the account password in the power distribution terminal with a common authority, and checking whether the account password is logged in successfully;
and S5, checking the parameter values of the parameters related to the remote login in the power distribution terminal system file.
Preferably, in step S2, the manner of scanning the remote connection port of the power distribution terminal for detection is as follows: the detection tool respectively sends data packets to all remote connection ports of the power distribution terminal and checks data returned by the power distribution terminal to detect the opening condition of each remote connection port;
if the risk remote connection port is opened, the detection result is unqualified; if the risk remote connection port is not opened; the output is qualified.
Preferably, the transmitted data packets are data packets of a TCP protocol or a UDP protocol.
Preferably, the opening of each remote connection port is detected by,
the returned data comprises effective TCP connection or UDP connection in the power distribution terminal system, whether the risk remote connection port is successfully connected or not is observed, the risk remote connection port is opened if the risk remote connection port is successfully connected, and the risk remote connection port is not opened if the risk remote connection port is not connected.
Preferably, in step S3, when the account password attempts to remotely log in to the power distribution terminal with Root authority, a Root log-in request is sent to the power distribution terminal; if the login is successful, the detection is unqualified.
Preferably, the opening of each remote connection port is detected by,
and the detection personnel remotely logs in the power distribution terminal by using the common account and checks the parameter values of the parameters related to remote login in the system file of the power distribution terminal.
Preferably, when the parameter value is Yes and the parameter value is effective, the detection result is unqualified; and if the parameter value is other values or the parameter is not effective, the detection result is qualified.
Preferably, the path of the system file is/etc/ssh/sshd _ config, and the parameter is a permittologin.
Compared with the prior art, the invention has the following advantages:
the invention provides a remote login permission detection method for a Root account of a power distribution automation terminal. The user needs to provide Root or common access account of the power distribution terminal, and the subsequent process will automatically detect and output the final result. The problem of when the current manual work carries out the analysis to the result, equipment quantity and port quantity are too much, and the condition that the operation and maintenance personnel detected, recorded and managed all equipment will be very complicated, and work load is huge is solved.
Drawings
FIG. 1 is a flow chart of power distribution terminal root account telnet disabling detection in accordance with the present invention;
fig. 2 is a schematic diagram of the interaction process of the detection tool with the power distribution terminal in the present invention.
Detailed Description
In order to make the purpose and technical solution of the embodiments of the present invention clearer, the technical solution of the present invention will be clearly and completely described below with reference to the embodiments of the present invention.
In the description of the present application, it is to be understood that the terms "length," "upper," "lower," "vertical," "horizontal," "top," "bottom," "inner," "outer," etc. indicate orientations or positional relationships based on those illustrated in the drawings, which are merely for convenience in describing the present application and to simplify the description, and are not intended to indicate or imply that the referenced device or element must have a particular orientation, be constructed and operated in a particular orientation, and thus should not be considered limiting of the present application.
As shown in fig. 1 and fig. 2, a remote login permission detection method for a Root account of a distribution automation terminal includes the following steps:
s1, connecting the terminal carrying the detection tool into a network of the power distribution terminal, so that the detection tool can access the power distribution terminal for subsequent detection;
s2, scanning remote connection ports of the power distribution terminal, and detecting the safety of all the remote connection ports;
s3, obtaining an account password of the safe remote connection power distribution terminal, inputting the account password into a detection tool, trying to remotely log in the power distribution terminal with Root authority, and checking whether the account password is logged in successfully; if the login fails, the account password is regarded as a common account password for subsequent verification;
s4, remotely logging the account password in the power distribution terminal with a common authority, and checking whether the account password is logged in successfully;
and S5, checking the parameter values of the parameters related to the remote login in the power distribution terminal system file.
Because there are several kinds of remote connections at present and do not encrypt the communication, can also comparatively simple carry on the right-raising after the login of ordinary account, thus bypass the authority management, reach the effect that Root authority logs in, such kind of remote connection will receive the management and control strictly. Therefore, in step S2, the method for scanning the remote connection port of the power distribution terminal for detection is as follows: the detection tool respectively sends data packets to all remote connection ports of the power distribution terminal and checks data returned by the power distribution terminal to detect the opening condition of each remote connection port;
if an unsafe remote connection port is opened by detection, the detection result is unqualified; if the remote connection port is not opened; the output is qualified.
The transmitted data packet is a data packet of a TCP protocol or a UDP protocol. The TCP protocol is a connection-oriented, reliable, byte stream-based transport layer communication protocol, and data can be smoothly transmitted only by establishing a connection between a detection tool and a power distribution terminal before transmission. TCP and UDP (user datagram protocol) are two of the most common data transfer protocols, and both use a method of setting a listening port to complete data transfer. The returned data comprises effective TCP connection or UDP connection in the power distribution terminal system, whether the risk remote connection port is successfully connected or not is observed, the risk remote connection port is opened if the risk remote connection port is successfully connected, and the risk remote connection port is not opened if the risk remote connection port is not connected.
In step S3, the operation and maintenance personnel provides an uncertain right account password, and may provide an incorrect account password, or may log in but not know whether there is Root right. Therefore, when the operation and maintenance personnel provide the account password, the operation and maintenance personnel try to log in with the Root authority, send a login request to the power distribution terminal, judge the state of the account password through whether the login is successful, and most intuitively detect whether the remote login with the Root authority is available. The results returned will have two possibilities: and the login is failed due to the fact that the authority is not opened, and the Root authority is opened and successfully logged in. If the login is successful, the provided account password has Root authority and can be remotely logged in, the detection is unqualified, and the login is failed, so that the account password can be a common account password or an error account password, and the next test needs to be carried out continuously.
In step S4, after login with Root authority fails, subsequent authentication is performed with normal account login. If the login fails, the operation and maintenance personnel provides wrong account passwords and needs to provide correct account passwords again for detection; if the login is successful, the account password is a correct common account password, and the system file is further consulted.
The method for checking the system file comprises the following steps: the method comprises the steps that a detection person remotely logs in a power distribution terminal through a common account, checks parameter values of parameters related to remote login in a system file of the power distribution terminal, and confirms whether remote login with Root permission is available or not from returned data.
Preferably, when the parameter value is Yes and the parameter value is valid, the terminal is allowed to remotely log in with Root authority, and the detection result is unqualified; if the parameter value is other values or the parameter is not effective, the terminal is prohibited from remote login with Root authority, and the detection result is qualified.
Preferably, the path of the system file is/etc/ssh/sshd _ config, and the parameter is a permittologin.
The above are merely embodiments of the present invention, which are described in detail and with particularity, and therefore should not be construed as limiting the scope of the invention. It should be noted that, for those skilled in the art, various changes and modifications can be made without departing from the spirit of the present invention, and these changes and modifications are within the scope of the present invention.

Claims (8)

1. A remote login permission detection method for a Root account of a distribution automation terminal is characterized by comprising the following steps:
s1, connecting the terminal with the detection tool into the network of the power distribution terminal;
s2, scanning remote connection ports of the power distribution terminal, and detecting the safety of all the remote connection ports;
s3, obtaining an account password of the safe remote connection power distribution terminal, inputting the account password into a detection tool, trying to remotely log in the power distribution terminal with Root authority, and checking whether the account password is logged in successfully; if the login fails, the account password is regarded as a common account password for subsequent verification;
s4, remotely logging the account password in the power distribution terminal with a common authority, and checking whether the account password is logged in successfully;
and S5, checking the parameter values of the parameters related to the remote login in the power distribution terminal system file.
2. The distribution automation terminal Root account remote login permission detection method according to claim 1, characterized in that:
in step S2, the method for scanning the remote connection port of the power distribution terminal for detection is as follows: the detection tool respectively sends data packets to all remote connection ports of the power distribution terminal and checks data returned by the power distribution terminal to detect the opening condition of each remote connection port;
if the risk remote connection port is opened, the detection result is unqualified; if the risk remote connection port is not opened; the output is qualified.
3. The distribution automation terminal Root account remote login permission detection method according to claim 2, characterized in that: the transmitted data packet is a data packet of a TCP protocol or a UDP protocol.
4. The distribution automation terminal Root account remote login permission detection method according to claim 2, characterized in that: the open condition of each remote connection port is detected by,
the returned data comprises effective TCP connection or UDP connection in the power distribution terminal system, whether the risk remote connection port is successfully connected or not is observed, the risk remote connection port is opened if the risk remote connection port is successfully connected, and the risk remote connection port is not opened if the risk remote connection port is not connected.
5. The distribution automation terminal Root account remote login permission detection method according to claim 1, characterized in that: in step S3, when the account password attempts to remotely log in to a power distribution terminal with Root authority, a Root login request is sent to the power distribution terminal; if the login is successful, the detection is unqualified.
6. The distribution automation terminal Root account remote login permission detection method according to claim 1, characterized in that: in step S4, the method for checking the system file includes:
and the detection personnel remotely logs in the power distribution terminal by using the common account and checks the parameter values of the parameters related to remote login in the system file of the power distribution terminal.
7. The distribution automation terminal Root account remote login permission detection method according to claim 6, characterized in that: when the parameter value is Yes and the parameter value is effective, the detection result is unqualified; and if the parameter value is other values or the parameter is not effective, the detection result is qualified.
8. The distribution automation terminal Root account remote login permission detection method according to claim 6, characterized in that: the path of the system file is/etc/ssh/sshd _ config, and the parameter is PermitRootLogin.
CN202111315199.3A 2021-11-08 2021-11-08 Remote login permission detection method for Root account of power distribution automation terminal Active CN114338072B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111315199.3A CN114338072B (en) 2021-11-08 2021-11-08 Remote login permission detection method for Root account of power distribution automation terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111315199.3A CN114338072B (en) 2021-11-08 2021-11-08 Remote login permission detection method for Root account of power distribution automation terminal

Publications (2)

Publication Number Publication Date
CN114338072A true CN114338072A (en) 2022-04-12
CN114338072B CN114338072B (en) 2023-09-22

Family

ID=81045407

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111315199.3A Active CN114338072B (en) 2021-11-08 2021-11-08 Remote login permission detection method for Root account of power distribution automation terminal

Country Status (1)

Country Link
CN (1) CN114338072B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105703925A (en) * 2014-11-25 2016-06-22 上海天脉聚源文化传媒有限公司 Security reinforcement method and system for Linux system
US20160321450A1 (en) * 2013-12-25 2016-11-03 Beijing Qihoo Technology Company Limited Method and Apparatus for Managing Super User Password on Smart Mobile Terminal
US20170195349A1 (en) * 2015-12-31 2017-07-06 Deutsche Telekom Ag Platform for protecting small and medium enterprises from cyber security threats
CN107590253A (en) * 2017-09-19 2018-01-16 郑州云海信息技术有限公司 A kind of automated detection method for MySQL database configuration security
CN111049817A (en) * 2019-12-05 2020-04-21 紫光云(南京)数字技术有限公司 Automatic deployment method for improving remote login security of elastic cloud host
CN111628973A (en) * 2020-05-09 2020-09-04 深信服科技股份有限公司 Remote login control method and device, computer equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160321450A1 (en) * 2013-12-25 2016-11-03 Beijing Qihoo Technology Company Limited Method and Apparatus for Managing Super User Password on Smart Mobile Terminal
CN105703925A (en) * 2014-11-25 2016-06-22 上海天脉聚源文化传媒有限公司 Security reinforcement method and system for Linux system
US20170195349A1 (en) * 2015-12-31 2017-07-06 Deutsche Telekom Ag Platform for protecting small and medium enterprises from cyber security threats
CN107590253A (en) * 2017-09-19 2018-01-16 郑州云海信息技术有限公司 A kind of automated detection method for MySQL database configuration security
CN111049817A (en) * 2019-12-05 2020-04-21 紫光云(南京)数字技术有限公司 Automatic deployment method for improving remote login security of elastic cloud host
CN111628973A (en) * 2020-05-09 2020-09-04 深信服科技股份有限公司 Remote login control method and device, computer equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
丁琳;: "电力系统网络中UDP端口的攻击与防护", no. 10 *
唐芸;周学君;: "网络扫描技术与安全防御策略研究", no. 04 *

Also Published As

Publication number Publication date
CN114338072B (en) 2023-09-22

Similar Documents

Publication Publication Date Title
US11595396B2 (en) Enhanced smart process control switch port lockdown
US11652809B2 (en) System and method for securely changing network configuration settings to multiplexers in an industrial control system
RU2523927C2 (en) Checking configuration modification for ied
CN114598540B (en) Access control system, method, device and storage medium
Carter et al. Cyber security assessment of distributed energy resources
CN103903187A (en) Fast detection method for potential safety hazards of power distribution automation system information
CN107222508B (en) Security access control method, device and system
CN111277607A (en) Communication tunnel module, application monitoring module and mobile terminal security access system
Erdődi et al. Attacking power grid substations: An experiment demonstrating how to attack the scada protocol iec 60870-5-104
CN114338072B (en) Remote login permission detection method for Root account of power distribution automation terminal
CN110808848A (en) Power data network security test method
Robinson et al. A cyber-defensive industrial control system with redundancy and intrusion detection
Chan et al. Defining attack patterns for industrial control systems
CN114338085B (en) Method for improving information security and networking efficiency of microgrid system
GB2568145A (en) Poisoning protection for process control switches
CN102857508B (en) A kind of method of Radius certification
CN116318873B (en) Remote security terminal management method and system for hardware equipment of Internet of things
Biham et al. K7: A Protected Protocol for Industrial Control Systems that Fits Large Organizations
CN117395241A (en) System and method for safely and remotely debugging machine
CN114244589A (en) Intelligent firewall and method based on AAA authentication and authorization information
Merry et al. Survivable Systems Analysis of the North American Power Grid Communications Infrastructure.
Lemaire et al. Secure remote access to industrial control systems with mobile devices
CN112465322A (en) User management device applied to substation automation system
GB2567556A (en) Enhanced smart process control switch port lockdown
Kong et al. Architecturing a secured network: Communications and setting up a secure VPN channel

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant