Website weak password detecting method

A weak password and website technology, applied in the field of electronic information security, can solve the problems of low missed detection rate, high missed detection rate, low scanning efficiency and accuracy rate, etc., to achieve low missed detection rate, short detection time, and occupation of website systems The effect of less resources

Active Publication Date: 2014-06-25
STATE GRID CORP OF CHINA +1
View PDF3 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] The invention provides a method for detecting website weak passwords, which solves the technical problems of low scanning efficiency and accuracy, high missed detection rate, and high pressure on scanned websites in the existing weak password scanning methods. It realizes the efficient and accurate detection of weak passwords on the website, and has a low rate of missed detection, and produces less pressure on the monitored website.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Website weak password detecting method
  • Website weak password detecting method
  • Website weak password detecting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] In Embodiment 1, a detection method for website weak passwords is provided, please refer to Figure 1-Figure 3 , the method includes:

[0041] S10, automatically scan the website based on the scheduling task, and obtain user information of the website, wherein the user information includes: a user name, a password, and an encryption method of the password;

[0042] S20. Based on the encryption method, encrypt the weak password in the weak password dictionary to obtain the encrypted weak password;

[0043] S30, matching the encrypted weak password with the password to obtain the weak password password and the normal password;

[0044] S40. Perform verification and simulate login based on the weak password and the user name corresponding to the weak password.

[0045] Wherein, in the embodiment of the present application, after the step of verifying and simulating login based on the weak password and the user name corresponding to the weak password, it also includes:

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a website weak password detecting method which comprises the steps of conducting automatic scanning on a website based on a dispatching task to acquire user information of the website, wherein the user information comprises the user name, the code and the encryption method of the code; encrypting a weak password in a weak password dictionary based on the encryption method to acquire an encrypted weak password; matching the encrypted weak password with the code to acquire a weak password code and a normal code; conducting simulated login verification based on the weak password code and the user name corresponding to the weak password code. According to the method, weak password detection is efficiently and accurately conducted on the website, the omission ratio is low, and pressure on the website to be monitored is low.

Description

technical field [0001] The invention relates to the technical field of electronic information security, in particular to a method for detecting weak website passwords. Background technique [0002] Today, with the gradual acceleration of enterprise informationization, the importance of information system passwords can be imagined. The password is equivalent to the key to enter the house. When others have a key to enter your home, think about your safety, your property, and your privacy. Because weak passwords can be easily guessed or cracked by others, it is very dangerous if you use weak passwords, like leaving your house keys under the mat at the door of your house. [0003] Traditional weak password scanning tools generally use exhaustive simulated logins to crack, and traditional weak password scanning uses weak password dictionary tables to detect through exhaustive methods. The specific process is as follows: [0004] First, generate the user-password according to t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46H04L12/26
CPCG06F21/46
Inventor 刘姗梅柴继文
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products