Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Weak command detection system and realization method and WEB platform

A detection system, weak password technology, applied in transmission systems, electrical components, digital data authentication, etc., can solve problems such as loss of enterprises and users, and achieve the effect of avoiding and solving risks

Inactive Publication Date: 2017-12-01
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the login password is breached or lost, it will bring serious losses to the enterprise and users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Weak command detection system and realization method and WEB platform
  • Weak command detection system and realization method and WEB platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be further described in detail below in conjunction with examples, but the embodiments of the present invention are not limited thereto.

[0031] see figure 1 as shown, figure 1 It shows a flow chart of weak password detection according to an embodiment of the present invention, a method for implementing weak password detection based on a WEB platform, belonging to a cloud security vulnerability detection platform, and integrating a weak password detection script in a vulnerability detection engine. The user logs in to the cloud security vulnerability detection platform, enters the detection target such as the URL, domain name or IP to be detected, selects the weak password detection item in the detection configuration, and after clicking detection, the system will adjust the weak password detection script in the vulnerability detection engine , for detection. The weak password detection script is mainly used to obtain user information, anal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a weak command detection system, and a realization method and a WEB platform. The method comprises the following steps: acquiring user information; judging whether the acquired user information is encrypted; if the user information is unencrypted, regarding that the detected target has the weak command risk; if the user information is encrypted, judging an encryption way of the user information, and blasting the password of the user according to the encryption way, if the password of the user is successfully blasted by brute force, regarding that the detected target has the weak command risk; if the password of the user cannot be blasted by the brute force, enabling a detection engine module to call a collision attack module to perform the collision attack; regarding that the detected target has the weak command risk under the situation that the attack is successful. By using the method disclosed by the invention, the user can immediately find the weak command risk of the detected target and the brought potential hazard, thereby evading and solving the risk.

Description

technical field [0001] The invention relates to the field of computer software information technology, in particular to a cloud security loophole detection platform for weak password detection related to login entries under website systems, domain names, and IPs of enterprises or users. Background technique [0002] With the advent of the information age, corporate and personal information and data have become the most valuable assets. Therefore, the data protection of enterprises and individual users has become an important research topic and technical means. The login passwords of the user names of various servers in the mobile computer room in the enterprise, the login passwords of the system database, the email passwords of senior leaders, the login passwords of the users' private accounts, etc. are directly related to the information of the enterprise and users. Once the login password is breached or lost, it will bring serious losses to the enterprise and users. Acco...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08G06F21/46
CPCG06F21/46H04L63/08H04L63/083H04L67/02
Inventor 张小青
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products