Method and system for rapidly detecting enterprise intranet equipment SSH weak password

An enterprise intranet and weak password technology, applied in the field of information security, can solve the problems of complex intranet environment, low efficiency, and difficulty in detecting weak SSH passwords, so as to reduce risks and improve detection efficiency.

Inactive Publication Date: 2018-12-07
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a method and system for quickly detecting SSH weak passwords of enterprise intranet devices, aiming to solve the problems of difficult SSH weak password detection and low efficiency caused by th...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for rapidly detecting enterprise intranet equipment SSH weak password
  • Method and system for rapidly detecting enterprise intranet equipment SSH weak password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to clearly illustrate the technical features of the present solution, the present invention will be described in detail below through specific implementations and in conjunction with the accompanying drawings. The following disclosure provides many different embodiments or examples for implementing different structures of the present invention. In order to simplify the disclosure of the present invention, the components and settings of specific examples are described below. In addition, the present invention may repeat reference numbers and / or letters in different examples. This repetition is for the purpose of simplification and clarity, and does not in itself indicate the relationship between the various embodiments and / or settings discussed. It should be noted that the components illustrated in the drawings are not necessarily drawn to scale. The present invention omits descriptions of well-known components and processing techniques and processes to avo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for rapidly detecting an enterprise intranet equipment SSH weak password. The method comprises the following steps that S1, port scanning is performed on the enterprise intranet; S2, weak password auditing is performed on the port scanning result; and S3, secondary verification and filtering are performed on the equipment of which the audit result is abnormal. The IP address range of each mechanism is accurate to the C section through full IP range pin detection of the enterprise intranet, then port scanning is performed on the enterprise intranet by using zmap and weak password auditing and secondary verification are performed on the scanning result so that the SSH weak password of various types of equipment in the enterprise intranet can be rapidly discovered, the problems of difficult detection and low efficiency of the SSH weak password caused by the complex intranet environment and high number of active IPs can be solved, the weak password detection efficiency of the intranet equipment can be enhanced and the risk that the attacker remotely logs in the enterprise intranet for attack can be reduced.

Description

Technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for rapidly detecting weak SSH passwords of enterprise intranet devices. Background technique [0002] SSH (Secure Shell, Secure Shell Protocol) service is formulated by the IETF's Network Working Group; SSH is a security protocol based on the application layer and the transport layer. SSH is currently a more reliable protocol designed to provide security for remote login sessions and other network services. Using the SSH protocol can effectively prevent information leakage in the remote management process. SSH was originally a program on UNIX systems, and then quickly expanded to other operating platforms. SSH can compensate for loopholes in the network when used correctly. [0003] But when the host on the network provides SSH service, if the user uses a weak password, the attacker can load a dictionary file to guess the password. Once the attacker...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/08H04L63/14H04L63/1408H04L63/1441
Inventor 牛彬
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products