Network equipment vulnerability detection method

A technology of network equipment and detection methods, which is applied in transmission systems, electrical components, etc., can solve the problems of lack of pertinence, time-consuming and labor-intensive manual detection, and few automatic detection methods of loopholes, so as to achieve accurate detection and positioning, saving search and screening the effect of time

Pending Publication Date: 2020-11-13
宋昀泽
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] In view of the prior art, there are few automatic detection methods for loopholes in network equipment such as routers and switches, and they are not targeted, and cannot detect and identify network equipment with loopholes. Manual detection is time-consuming and labor-intensive. The purpose of the present invention is to provide A detection method of network equipment vulnerability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network equipment vulnerability detection method
  • Network equipment vulnerability detection method
  • Network equipment vulnerability detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0108] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative work all belong to the protection scope of the present invention.

[0109] see figure 1 , the present invention provides a technical solution: a method for detecting network device vulnerabilities, characterized in that: the steps are:

[0110] (1) IP scanning, after the system is connected to the network, scan the IP network segment configured by the network device, obtain and record the active IP list in the network, and submit the table to the system for routing detection;

[0111] (2) routing detection, by detecting...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of network vulnerability detection, in particular to a network equipment vulnerability detection method, which comprises the following steps of: (1) IP scanning: scanning an IP network segment configured by network equipment; (2) routing detection: detecting IP addresses in an active IP list; (3) routing vulnerability scanning: judging whether the detected equipment has security weakness or not; (4) automatic vulnerability utilization: carrying out active vulnerability utilization on the network equipment with the vulnerability; (5) automatic decryption: decrypting a password detected via the vulnerability; (6) detection reporting: a complete detection report on detection results of a detected network segment is generated. Loopholes of the network equipment such as a router and a switch are automatically detected and accurately recognized, the detection time is greatly shortened, manpower and time are saved, and the safety of the network equipment is effectively improved.

Description

technical field [0001] The invention relates to the technical field of network loophole detection, and the specific field is a detection method for network equipment loopholes. Background technique [0002] With today's increasingly prominent international Internet information security issues, strengthening domestic network security management has become a top priority. At present, there are various means of network attack, and most network managers focus on the security protection of clients and servers, but ignore the security protection of network devices. At this stage, more and more vulnerabilities exist in network devices (including routers, switches, firewalls, printers), and daily managers usually ignore the security configuration and update of network devices, which makes a large number of network devices The door is wide open for attackers in the network. [0003] For now, Huawei, H3C, Cisco and other network equipment are the most widely used in the domestic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1433
Inventor 宋昀泽
Owner 宋昀泽
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products