Dictionary library-based host password detection method and detection system
A detection method and dictionary library technology, applied in the direction of digital data authentication, digital data protection, electronic digital data processing, etc., can solve problems such as loss and weak passwords, achieve accurate detection and early warning, ensure safe operation, and eliminate the phenomenon of weak passwords Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] Such as figure 1 As shown, the host password detection method based on the dictionary library includes the following steps:
[0025] Step A, build a weak password dictionary library:
[0026] Use the weak password dictionary with the highest usage rate in the world that has been counted, and gradually improve the weak password dictionary on the basis of the weak password dictionary to form a complete and unified weak password dictionary library.
[0027] Step B, collect the host file:
[0028] Collect the Sam ciphertext file of the Windows system and the Shadow ciphertext file of the Linux system, including the host name, host address, operating system, and system version.
[0029] Step C, read the hosts file:
[0030] Read the host file collected in step B to obtain the account name, encryption algorithm, random characters, and password ciphertext.
[0031] Step D, encrypt weak password dictionary library:
[0032] Encrypt all passwords in the weak password dictio...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
