Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Weak password detection system based on covert scanning technology

A detection system and scanning technology, applied in the field of weak password detection systems, can solve the problems of missing detection targets, inability to identify and detect, weak password vulnerabilities cannot be detected, etc., so as to avoid missing detection targets and avoid incomplete vulnerability detection. Effect

Pending Publication Date: 2022-05-27
TIANYI ELECTRONICS COMMERCE
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When security functions such as firewalls are enabled in the information system, there will be a possibility that the weak password detection system will not be able to discover the information assets of the target to be detected, thus missing the detection target
Common weak password detection systems usually use the weak password detection function of one or several services, protocols, or interfaces integrated by themselves to detect target information assets, and cannot target information assets that may have weak password vulnerabilities. Services, protocols, and interfaces, etc. Comprehensive identification and detection, and then there is the possibility of missing weak password vulnerabilities that cannot be detected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Weak password detection system based on covert scanning technology
  • Weak password detection system based on covert scanning technology
  • Weak password detection system based on covert scanning technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0040] In the description of the present invention, it should be noted that the orientations or positional relationships indicated by the terms "vertical", "upper", "lower", "horizontal", etc. are based on the orientations or positional relationships shown in the drawings, only In order to facilitate the description of the present invention and simplify the description, it is not indicated or implied that the indicated device or eleme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of computer information processing, and particularly discloses a weak password detection system based on a covert scanning technology, which depends on an asset identification module to identify a to-be-target asset and an open port by using the covert scanning technology, and comprises covert information assets protected by a firewall and the like. The IP address and the port number are detailed; identifying protocols, services, interfaces and the like which are adopted by the target assets under the OSI model framework and need password interaction by depending on a feature library in the feature identification module; and carrying out weak password vulnerability detection by depending on the weak password detection module. Target information assets which cannot be detected due to existence of safety protection measures such as firewalls can be identified, and the situation that hidden target information assets cannot be detected by weak passwords is avoided; the feature library constructed based on the OSI model framework can comprehensively identify services, protocols, interfaces and the like of the target information assets needing password interaction, and omission is avoided.

Description

technical field [0001] The invention relates to the technical field of computer information processing, in particular to a weak password detection system based on concealed scanning technology. Background technique [0002] Today, with the wide application of information technology, more and more information assets are exposed on the Internet, and more and more information security threats and information security attacks are faced, resulting in an endless stream of information security incidents. So far, weak password vulnerabilities have been one of the important factors leading to information security incidents. [0003] Weak passwords usually refer to passwords that are easily guessed by others or cracked by cracking tools, such as birthdays, names, simple sequential numbers or characters, and consecutive keyboard letters (such as: 3456, 3abc, abcdef, qwerty, 1qaz2wsx etc.). The daily use of telnet, ssh, and snmp service protocols, weblogic, redis, mysql application co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46G06F21/57H04L9/40
CPCG06F21/46G06F21/577H04L63/1433
Inventor 张宣宇
Owner TIANYI ELECTRONICS COMMERCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products