Supercharge Your Innovation With Domain-Expert AI Agents!

Method, device and equipment for monitoring weak password vulnerabilities of network equipment

A network device and weak password technology, applied in the field of network security, can solve the problem of finding weak password devices without effective measures, and achieve the effect of relieving work pressure

Pending Publication Date: 2022-01-25
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, given the huge number and wide distribution of network devices in today's network, there are no effective measures to find devices with weak passwords in the network, let alone real-time monitoring of devices that may be temporarily exposed to the Internet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and equipment for monitoring weak password vulnerabilities of network equipment
  • Method, device and equipment for monitoring weak password vulnerabilities of network equipment
  • Method, device and equipment for monitoring weak password vulnerabilities of network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] figure 1 It is a flow chart of a method for monitoring weak password vulnerabilities of network devices provided by the embodiment of the present application.

[0042] Such as figure 1 As shown, the method for monitoring weak password vulnerabilities of network equipment provided by the embodiment of the present application includes:

[0043] S101: Input a keyword of a target network device into a cyberspace surveying and mapping system to obtain address information of the target network device.

[0044] S102: Send a login request to the target network device by using the address information of the target network device and a preset weak password.

[0045] S103: If the target network device is successfully logged in, it is determined that the target network device has a weak password vulnerability.

[0046] To realize the monitoring of weak password vulnerabilities of network devices in the Internet, it is first necessary to obtain the address of the target network d...

Embodiment 2

[0062] In the foregoing embodiments, the address information of the target network device is obtained through the network space surveying and mapping system. Existing cyberspace surveying and mapping systems include sumap, fofa, zoomeye, etc. These cyberspace surveying and mapping systems all have their own search syntax, and they are pre-designed according to the type of cyberspace surveying and mapping system to call the cyberspace surveying and mapping system and input the keyword of the target network device script.

[0063] Therefore, in the embodiment of this application, figure 1 Step S101 in: Input the preset keyword of the target network device into the cyberspace surveying and mapping system to obtain the address information of the target network device, specifically including:

[0064] Input the preset keyword of the target network device into the built-in grammar corresponding to the cyberspace surveying and mapping system, and obtain the constructed query stateme...

Embodiment 3

[0098] Target network devices may include routers, firewalls, load balancers, etc. Different network devices have different access methods. On the basis of the above embodiments, in the method for monitoring weak password vulnerabilities of network devices provided in the embodiments of the present application, step S102: send a login request to the target network device using the address information of the target network device and the preset weak password, specifically Can include:

[0099] According to the JS object numbered notation (json) of the address information of the target network device output by the cyberspace surveying and mapping system, generate a uniform resource location system (URL) for logging in to the firewall of the target network device;

[0100] Utilize Uniform Resource Locator and weak passwords to send login requests to target network devices.

[0101] The various embodiments corresponding to the monitoring method for weak password vulnerabilities of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for monitoring weak password vulnerabilities of network equipment, which comprises the following steps of: acquiring address information of target network equipment by adopting a network space surveying and mapping system, then sending a login request to the target network equipment by utilizing the address information of the target network equipment and a preset weak password, and if the target network equipment is successfully logged in, determining that the target network equipment has the weak password vulnerability. A user only needs to provide the keyword of the target network equipment, address retrieval and weak password vulnerability positioning of large-scale target network equipment can be realized, the working pressure of working personnel in a network equipment weak password vulnerability monitoring task is greatly relieved, and the monitoring of the large-scale network equipment weak password vulnerability is effectively realized. The invention further discloses a device and equipment for monitoring the weak password vulnerabilities of the network equipment and a computer readable storage medium, which have the above beneficial effects.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a method, device, device and computer-readable storage medium for monitoring weak password vulnerabilities of network equipment. Background technique [0002] A weak password usually refers to a password that is easy to be guessed by others or cracked by a cracking tool, such as a password containing only simple numbers and letters. Such a password is easy to be cracked by others, which puts the user's computer at risk, so it is not recommended for users to use. [0003] Internet business is an indispensable business for many units and individuals, and network devices such as routers, firewalls, and load balancers that support this business play a fundamental and important role. However, such a large number of basic network devices also have weak password vulnerabilities. During daily use or major activities such as network protection, if the weak password vul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1433H04L63/083
Inventor 韩思范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More