Network device telnet weak password detection method and device

A technology of network equipment and detection methods, applied in the direction of electrical components, transmission systems, etc., can solve problems such as spending a lot of time, potential safety hazards, and time consumption, and achieve the effects of reducing the risk of attacks, improving efficiency, and reducing the number of matching times

Inactive Publication Date: 2019-01-18
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, in enterprises, especially large enterprises, there are a large number of network devices that can provide telnet services, and if these devices have weak passwords for telnet login, there will be great security risks
However, it is very time-consuming and inefficient to detect whether there are weak passwords in the telnet login of the internal network devices of the enterprise one by one. Poor password operability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network device telnet weak password detection method and device
  • Network device telnet weak password detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to make the above objects, features and advantages of the present invention more comprehensible, specific implementations of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0033] In the following description, a lot of specific details are set forth in order to fully understand the present invention, but the present invention can also be implemented in other ways different from those described here, and those skilled in the art can do it without departing from the meaning of the present invention. By analogy, the present invention is therefore not limited to the specific examples disclosed below.

[0034] At present, in enterprises, especially large enterprises, there are a large number of network devices that can provide telnet services, and if these devices have weak passwords for telnet login, there will be great security risks. However, it is very time-consuming and inefficient to detect whether there...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network device telnet weak password detection method and device. A plurality of weak password dictionaries are preset, and each weak password dictionary is configured according to different types of network devices. The method comprises the steps: performing the password matching testing of each network device with a telnet port, wherein each password matching testing operation comprises the steps: selecting a weak password dictionary corresponding to the type of the network device, and adopting the weak password login information of the selected weak password dictionary for login matching. If the login is successful, the network device has a weak password, and the weak password login information includes a weak password, or a username and a weak password. The detection method greatly improves the efficiency of detecting weak passwords of the intranet devices of an enterprise, and reduces the risk that an attacker remotely logs into the intranet of the enterprise to implement the attack.

Description

technical field [0001] The invention relates to computer and network technologies, in particular to a method and device for detecting weak telnet passwords of network equipment. Background technique [0002] With the continuous development of computer and network technology, the enterprise intranet has also been popularized, and various electronic devices in the enterprise have gradually become network-connected devices, and telnet is the standard protocol and main method of Internet remote login service. Network devices have the ability to work with remote hosts. [0003] At present, in enterprises, especially large enterprises, there are a large number of network devices that can provide telnet services, and if these devices have weak passwords for telnet login, there will be great security risks. However, it is very time-consuming and inefficient to detect whether there are weak passwords in the telnet login of the internal network devices of the enterprise one by one. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L63/083H04L67/08
Inventor 牛彬
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products