CN112613029A - Weak password detection method and device, computer storage medium and equipment - Google Patents
Weak password detection method and device, computer storage medium and equipment Download PDFInfo
- Publication number
- CN112613029A CN112613029A CN202110013122.4A CN202110013122A CN112613029A CN 112613029 A CN112613029 A CN 112613029A CN 202110013122 A CN202110013122 A CN 202110013122A CN 112613029 A CN112613029 A CN 112613029A
- Authority
- CN
- China
- Prior art keywords
- login
- detection
- information
- weak password
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 300
- 238000000034 method Methods 0.000 claims abstract description 114
- 230000008569 process Effects 0.000 claims description 59
- 238000012550 audit Methods 0.000 claims description 48
- ZPUCINDJVBIVPJ-LJISPDSOSA-N cocaine Chemical compound O([C@H]1C[C@@H]2CC[C@@H](N2C)[C@H]1C(=O)OC)C(=O)C1=CC=CC=C1 ZPUCINDJVBIVPJ-LJISPDSOSA-N 0.000 claims description 19
- 238000004590 computer program Methods 0.000 claims description 7
- 238000000605 extraction Methods 0.000 claims description 6
- 238000012545 processing Methods 0.000 description 13
- 230000004044 response Effects 0.000 description 12
- 238000010586 diagram Methods 0.000 description 11
- 239000000284 extract Substances 0.000 description 8
- 230000006870 function Effects 0.000 description 7
- 230000001788 irregular Effects 0.000 description 7
- 238000005336 cracking Methods 0.000 description 6
- 239000000203 mixture Substances 0.000 description 5
- 238000007781 pre-processing Methods 0.000 description 5
- 230000001360 synchronised effect Effects 0.000 description 5
- 230000006399 behavior Effects 0.000 description 4
- 238000011161 development Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000012423 maintenance Methods 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 230000001681 protective effect Effects 0.000 description 2
- KLDZYURQCUYZBL-UHFFFAOYSA-N 2-[3-[(2-hydroxyphenyl)methylideneamino]propyliminomethyl]phenol Chemical compound OC1=CC=CC=C1C=NCCCN=CC1=CC=CC=C1O KLDZYURQCUYZBL-UHFFFAOYSA-N 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000005422 blasting Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 201000001098 delayed sleep phase syndrome Diseases 0.000 description 1
- 208000033921 delayed sleep phase type circadian rhythm sleep disease Diseases 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
本申请实施例公开了一种弱口令检测方法、装置、计算机存储介质以及设备,该方法包括:接收登录请求信息;确定所述登录请求信息对应的登录特征规则;基于所述登录特征规则,从所述登录请求信息中提取登录信息;在检测到登录状态为成功登录的情况下,对所述登录信息进行弱口令检测,以确定所述登录信息中是否存在弱口令。这样,通过对登录请求信息进行登录特征规则的确定,如此基于该登录特征规则,可以从登录请求信息中准确提取出登录信息;而且在登录成功时,通过对登录信息进行弱口令检测,还可以提高弱口令的检出率,同时降低了弱口令的误判率。
The embodiments of the present application disclose a weak password detection method, device, computer storage medium, and device. The method includes: receiving login request information; determining a login feature rule corresponding to the login request information; The login information is extracted from the login request information; when it is detected that the login status is successful login, weak password detection is performed on the login information to determine whether there is a weak password in the login information. In this way, by determining the login feature rules for the login request information, the login information can be accurately extracted from the login request information based on the login feature rules; and when the login is successful, by performing weak password detection on the login information, it is also possible to Improve the detection rate of weak passwords, while reducing the misjudgment rate of weak passwords.
Description
技术领域technical field
本申请涉及网络安全技术领域,尤其涉及一种弱口令检测方法、装置、计算机存储介质以及设备。The present application relates to the technical field of network security, and in particular, to a weak password detection method, apparatus, computer storage medium, and device.
背景技术Background technique
弱口令(weak password)是指容易被恶意用户猜测到或被破解工具破解的口令,例如仅包含简单数字和字母的口令,例如“123”、“abc”等。据统计,大约30%的安全问题是由弱口令引起的,并且大多数企业具有口令检查与监管的需求,所以,弱口令治理成为了企业安全建设中非常重要的一环。但是,在相关技术中,目前常用的弱口令检测方法检出弱口令的能力不足,因此存在弱口令检出率低、误判率高的问题。Weak passwords refer to passwords that are easily guessed by malicious users or cracked by cracking tools, such as passwords that only contain simple numbers and letters, such as "123", "abc", and so on. According to statistics, about 30% of security problems are caused by weak passwords, and most enterprises have the need for password inspection and supervision. Therefore, weak password management has become a very important part of enterprise security construction. However, in the related art, the currently commonly used weak password detection methods have insufficient ability to detect weak passwords, so there are problems of a low detection rate of weak passwords and a high misjudgment rate.
发明内容SUMMARY OF THE INVENTION
本申请提供了一种弱口令检测方法、装置、计算机存储介质以及设备,能够准确识别多种登录组件下的弱口令,从而提高弱口令的检出率,同时降低弱口令的误判率。The present application provides a weak password detection method, device, computer storage medium and device, which can accurately identify weak passwords under various login components, thereby improving the detection rate of weak passwords and reducing the misjudgment rate of weak passwords.
本申请的技术方案是这样实现的:The technical solution of the present application is realized as follows:
第一方面,本申请实施例提供了一种弱口令检测方法,该方法包括:In a first aspect, an embodiment of the present application provides a weak password detection method, the method comprising:
接收登录请求信息;Receive login request information;
确定所述登录请求信息对应的登录特征规则;determining the login feature rule corresponding to the login request information;
基于所述登录特征规则,从所述登录请求信息中提取登录信息;extracting login information from the login request information based on the login feature rule;
在检测到登录状态为成功登录的情况下,对所述登录信息进行弱口令检测,以确定所述登录信息中是否存在弱口令。When it is detected that the login status is successful login, weak password detection is performed on the login information to determine whether there is a weak password in the login information.
第二方面,本申请实施例提供了一种弱口令检测装置,该弱口令检测装置包括:接收单元、确定单元、提取单元和检测单元;其中In a second aspect, an embodiment of the present application provides a weak password detection device, the weak password detection device includes: a receiving unit, a determining unit, an extracting unit, and a detecting unit; wherein
所述接收单元,配置为接收登录请求信息;the receiving unit, configured to receive login request information;
所述确定单元,配置为确定所述登录请求信息对应的登录特征规则;The determining unit is configured to determine the login feature rule corresponding to the login request information;
所述提取单元,配置为基于所述登录特征规则,从所述登录请求信息中提取登录信息;The extraction unit is configured to extract login information from the login request information based on the login feature rule;
所述检测单元,配置为在检测到登录状态为成功登录的情况下,对所述登录信息进行弱口令检测,以确定所述登录信息中是否存在弱口令。The detection unit is configured to perform weak password detection on the login information when it is detected that the login status is successful login, so as to determine whether there is a weak password in the login information.
第三方面,本申请实施例还提供了一种弱口令检测装置,该弱口令检测装置包括:存储器和处理器;其中,In a third aspect, an embodiment of the present application further provides a weak password detection device, the weak password detection device includes: a memory and a processor; wherein,
所述存储器,用于存储能够在所述处理器上运行的计算机程序;the memory for storing a computer program executable on the processor;
所述处理器,用于在运行所述计算机程序时,执行如第一方面所述的弱口令检测方法。The processor is configured to execute the weak password detection method according to the first aspect when running the computer program.
第四方面,本申请实施例提供了一种计算机存储介质,该计算机存储介质存储有弱口令检测程序,所述弱口令检测程序被至少一个处理器执行时实现如第一方面所述的弱口令检测方法。In a fourth aspect, an embodiment of the present application provides a computer storage medium, where the computer storage medium stores a weak password detection program, and the weak password detection program implements the weak password according to the first aspect when the weak password detection program is executed by at least one processor Detection method.
第五方面,本申请实施例提供了一种检测设备,该检测设备至少包括如第二方面或者第三方面所述的弱口令检测装置。In a fifth aspect, an embodiment of the present application provides a detection device, where the detection device includes at least the weak password detection apparatus described in the second aspect or the third aspect.
本申请实施例所提供的一种弱口令检测方法、装置、计算机存储介质以及设备,接收登录请求信息;确定所述登录请求信息对应的登录特征规则;基于所述登录特征规则,从所述登录请求信息中提取登录信息;在检测到登录状态为成功登录的情况下,对所述登录信息进行弱口令检测,以确定所述登录信息中是否存在弱口令。这样,在接收登录请求信息后,通过确定登录请求信息对应的登录特征规则,从而可以准确识别不同登录组件对应的特征规则,也就能够准确提取待检测的登录信息,进而在对该登录信息进行弱口令检测时,能够准确识别多种登录组件下的弱口令,提高了弱口令的检出率,同时降低了弱口令的误判率。A weak password detection method, device, computer storage medium, and device provided by the embodiments of the present application receive login request information; determine a login feature rule corresponding to the login request information; The login information is extracted from the request information; in the case that the login status is detected as successful login, weak password detection is performed on the login information to determine whether there is a weak password in the login information. In this way, after receiving the login request information, by determining the login feature rules corresponding to the login request information, the feature rules corresponding to different login components can be accurately identified, and the login information to be detected can be accurately extracted, and then the login information can be processed. When detecting weak passwords, it can accurately identify weak passwords under various login components, improve the detection rate of weak passwords, and reduce the misjudgment rate of weak passwords.
附图说明Description of drawings
图1为本申请实施例提供的一种弱口令检测方法的流程示意图;1 is a schematic flowchart of a weak password detection method provided by an embodiment of the present application;
图2为本申请实施例提供的另一种弱口令检测方法的流程示意图;2 is a schematic flowchart of another weak password detection method provided by an embodiment of the present application;
图3为本申请实施例提供的一种弱口令检测系统的组成结构示意图;3 is a schematic diagram of the composition and structure of a weak password detection system provided by an embodiment of the present application;
图4为本申请实施例提供的一种弱口令检测装置的组成结构示意图;FIG. 4 is a schematic structural diagram of a weak password detection device provided by an embodiment of the present application;
图5为本申请实施例提供的另一种弱口令检测装置的组成结构示意图;5 is a schematic structural diagram of another weak password detection device provided by an embodiment of the present application;
图6为本申请实施例提供的一种弱口令检测装置的硬件结构示意图;FIG. 6 is a schematic diagram of the hardware structure of a weak password detection device provided by an embodiment of the present application;
图7为本申请实施例提供的一种检测设备的组成结构示意图。FIG. 7 is a schematic structural diagram of the composition of a detection device provided by an embodiment of the present application.
具体实施方式Detailed ways
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述。The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application.
弱口令治理已经成为企业安全建设中非常重要的一环,然而业内还没有一款产品可以准确识别多种登录组件的弱口令,目前都存在弱口令检出率低、误判率高的问题。在相关技术中,对弱口令进行检测时,通常采用穷举法进行多次模拟登录,导致检测时间长、检测效率低下且漏检率高,同时导致被测网站压力较大,容易对网站产生破坏,导致安全性较低。Weak password management has become a very important part of enterprise security construction. However, there is no product in the industry that can accurately identify weak passwords of various login components. At present, there are problems of low detection rate of weak passwords and high misjudgment rate. In the related art, when detecting weak passwords, the exhaustive method is usually used to perform multiple simulated logins, which leads to long detection time, low detection efficiency and high missed detection rate. damage, resulting in lower security.
可以理解,Snort是一个具有多平台(Multi-Platform)、实时(Real-Time)流量分析、网络网际互连协议(Internet Protocol,IP)数据包(Pocket)记录等特性的强大的网络入侵检测/防御系统(Network Intrusion Detection/Prevention System,NIDS)。大多数入侵行为都具有某种特征,Snort可以采用基于规则的方式对数据包进行规则匹配来检测多种不同的入侵行为和探测活动。本申请实施例提出将Snort规则与登录组件进行结合,通过Snort规则可以识别不同的登录组件,进而根据不同登录组件的特征规则准确提取出登录信息,以便实现对不同登录组件的弱口令精准检测。It can be understood that Snort is a powerful network intrusion detection / Defense System (Network Intrusion Detection/Prevention System, NIDS). Most intrusion behaviors have certain characteristics, and Snort can detect many different intrusion behaviors and detection activities by using rule-based rule matching on data packets. The embodiment of the present application proposes to combine Snort rules with login components, different login components can be identified through Snort rules, and then login information can be accurately extracted according to the characteristic rules of different login components, so as to realize accurate detection of weak passwords of different login components.
基于此,本申请实施例提供了一种弱口令检测方法,该方法的基本思想是:通过接收登录请求信息;确定所述登录请求信息对应的登录特征规则;基于所述登录特征规则,从所述登录请求信息中提取登录信息;在检测到登录状态为成功登录的情况下,对所述登录信息进行弱口令检测,以确定所述登录信息中是否存在弱口令。这样,在接收登录请求信息后,通过确定登录请求信息对应的登录特征规则,从而可以准确识别不同登录组件对应的特征规则,也就能够准确提取待检测的登录信息,进而在对该登录信息进行弱口令检测时,可以准确识别多种登录组件下的弱口令,提高了弱口令的检出率,同时降低了弱口令的误判率。Based on this, an embodiment of the present application provides a weak password detection method, the basic idea of which is: by receiving login request information; determining a login feature rule corresponding to the login request information; The login information is extracted from the login request information; when it is detected that the login status is a successful login, weak password detection is performed on the login information to determine whether there is a weak password in the login information. In this way, after receiving the login request information, by determining the login feature rules corresponding to the login request information, the feature rules corresponding to different login components can be accurately identified, and the login information to be detected can be accurately extracted, and then the login information can be processed. When detecting weak passwords, it can accurately identify weak passwords under various login components, improve the detection rate of weak passwords, and reduce the misjudgment rate of weak passwords.
本申请的一实施例中,参见图1,其示出了本申请实施例提供的一种弱口令检测方法的流程示意图。如图1所示,该方法可以包括:In an embodiment of the present application, referring to FIG. 1 , it shows a schematic flowchart of a weak password detection method provided by an embodiment of the present application. As shown in Figure 1, the method may include:
S101:接收登录请求信息。S101: Receive login request information.
需要说明的是,本申请实施例提供的弱口令检测方法可以应用于弱口令检测装置,或者集成有该装置的检测设备。这里,检测设备可以是诸如智能手机、平板电脑、笔记本电脑、掌上电脑、个人数字助理(Personal Digital Assistant,PDA)、导航装置、服务器等等,本申请实施例对此不作具体限定。It should be noted that, the weak password detection method provided by the embodiment of the present application may be applied to a weak password detection device, or a detection device integrated with the device. Here, the detection device may be, for example, a smart phone, a tablet computer, a notebook computer, a palmtop computer, a personal digital assistant (Personal Digital Assistant, PDA), a navigation device, a server, etc., which is not specifically limited in this embodiment of the present application.
还需要说明的是,本申请实施例提供的弱口令检测方法可以适用于万维网(WorldWide Web,Web)系统中。例如,用户在通过浏览器、客户端等进行登录操作时,所述浏览器、客户端首先接收登录请求信息。在这里,仅列举了用户在浏览器、客户端等进行登录,实际中有多种登录方式,本申请实施例对此不作具体限定。It should also be noted that the weak password detection method provided by the embodiments of the present application may be applicable to a World Wide Web (WorldWide Web, Web) system. For example, when a user performs a login operation through a browser, client, etc., the browser or client first receives the login request information. Here, it is only listed that the user logs in through a browser, a client terminal, etc. In practice, there are multiple login methods, which are not specifically limited in this embodiment of the present application.
S102:确定所述登录请求信息对应的登录特征规则。S102: Determine a login feature rule corresponding to the login request information.
需要说明的是,在本申请实施例中,当接收到登录请求信息之后,就可以基于接收到的登录请求信息来确定出对应的登录特征规则。具体可以为:对登录请求信息进行特征提取,并将其与预设特征规则库进行匹配,如果与某种登录特征规则匹配成功,就可以确定出该登录请求信息对应的登录特征规则为匹配成功的登录特征规则。It should be noted that, in this embodiment of the present application, after the login request information is received, the corresponding login feature rule may be determined based on the received login request information. Specifically, it can be as follows: perform feature extraction on the login request information, and match it with a preset feature rule base. If it matches a certain login feature rule successfully, it can be determined that the login feature rule corresponding to the login request information is matched successfully. Login feature rules for .
S103:基于所述登录特征规则,从所述登录请求信息中提取登录信息。S103: Extract login information from the login request information based on the login feature rule.
需要说明的是,在本申请实施例中,当确定出登录特征规则之后,就可以基于已经确定的登录特征规则,从登录请求信息中提取出登录信息。由于在步骤S102中已经根据登录请求信息确定出了登录特征规则,那么再基于所述登录特征规则就能准确地从登录请求信息中提取出登录信息。这里,登录信息至少可以包括用户名和密码。It should be noted that, in this embodiment of the present application, after the login feature rule is determined, the login information can be extracted from the login request information based on the determined login feature rule. Since the login feature rule has been determined according to the login request information in step S102, the login information can be accurately extracted from the login request information based on the login feature rule. Here, the login information may include at least a user name and a password.
S104:在检测到登录状态为成功登录的情况下,对所述登录信息进行弱口令检测,以确定所述登录信息中是否存在弱口令。S104: In the case where it is detected that the login status is successful login, perform weak password detection on the login information to determine whether there is a weak password in the login information.
需要说明的是,在本申请实施例中,在基于确定的登录特征规则,从登录请求信息中提取出登录信息之后,就可以基于提取出来的登录信息进行登录,例如基于提取出来的用户名和密码进行登录,此时需要对登录状态进行检测。如果检测结果表明登录状态为成功登录,说明登录信息中的密码是正确的,这时候就需要对登录信息进行弱口令检测,以确定登录信息中是否存在有弱口令。可以理解的是,如果登录状态为失败,就说明用户名或密码有误,此时,不需要对登录信息进行弱口令检测。It should be noted that, in the embodiment of the present application, after the login information is extracted from the login request information based on the determined login feature rules, the login can be performed based on the extracted login information, for example, based on the extracted user name and password. To log in, you need to check the login status at this time. If the detection result shows that the login status is successful login, it means that the password in the login information is correct. At this time, it is necessary to perform weak password detection on the login information to determine whether there is a weak password in the login information. It can be understood that if the login status is failed, it means that the user name or password is incorrect, and in this case, there is no need to perform weak password detection on the login information.
也就是说,本申请实施例只会对登录成功的登录信息进行弱口令检测,这样不仅减小了被测网站的压力,还提高了弱口令检测的效率。That is to say, the embodiment of the present application only performs weak password detection on the login information that has been successfully logged in, which not only reduces the pressure on the website under test, but also improves the efficiency of weak password detection.
本申请实施例提供了一种弱口令检测方法,通过接收登录请求信息;确定所述登录请求信息对应的登录特征规则;基于所述登录特征规则,从所述登录请求信息中提取登录信息;在检测到登录状态为成功登录的情况下,对所述登录信息进行弱口令检测,以确定所述登录信息中是否存在弱口令。这样,在接收登录请求信息后,通过确定登录请求信息对应的登录特征规则,从而可以准确识别不同登录组件对应的特征规则,也就能够准确提取待检测的登录信息,进而在对该登录信息进行弱口令检测时,可以准确识别多种登录组件下的弱口令,提高了弱口令的检出率,同时降低了弱口令的误判率。The embodiment of the present application provides a weak password detection method, by receiving login request information; determining a login feature rule corresponding to the login request information; extracting login information from the login request information based on the login feature rule; When it is detected that the login status is successful login, weak password detection is performed on the login information to determine whether there is a weak password in the login information. In this way, after receiving the login request information, by determining the login feature rules corresponding to the login request information, the feature rules corresponding to different login components can be accurately identified, and the login information to be detected can be accurately extracted, and then the login information can be processed. When detecting weak passwords, it can accurately identify weak passwords under various login components, improve the detection rate of weak passwords, and reduce the misjudgment rate of weak passwords.
本申请的另一实施例中,参见图2,其示出了本申请实施例提供的另一种弱口令检测方法的流程示意图。如图2所示,该方法可以包括:In another embodiment of the present application, referring to FIG. 2 , it shows a schematic flowchart of another weak password detection method provided by an embodiment of the present application. As shown in Figure 2, the method may include:
S201:接收登录请求信息。S201: Receive login request information.
需要说明的是,步骤S201的实现过程的描述与前一实施例中步骤S101的实现过程的描述一致,本申请实施例对此不再赘述。It should be noted that the description of the implementation process of step S201 is consistent with the description of the implementation process of step S101 in the previous embodiment, which is not repeated in this embodiment of the present application.
S202:利用预设识别规则对所述登录请求信息进行识别,确定待登录组件信息。S202: Identify the login request information by using a preset identification rule, and determine the component information to be logged in.
S203:基于所述待登录组件信息,从预设规则库中确定所述待登录组件信息对应的所述登录特征规则。S203: Based on the component information to be logged in, determine the login feature rule corresponding to the component information to be logged in from a preset rule base.
这里,所述预设规则库包括多种登录组件信息以及所述多种登录组件信息各自对应的登录特征规则。在一些实施例中,所述基于所述待登录组件信息,从预设规则库中确定所述待登录组件信息对应的所述登录特征规则,可以包括:Here, the preset rule base includes multiple types of login component information and respective login feature rules corresponding to the multiple types of login component information. In some embodiments, determining the login feature rule corresponding to the component information to be logged in from a preset rule base based on the component information to be logged in may include:
将所述待登录组件信息与所述预设规则库进行特征匹配;Perform feature matching between the component information to be logged in and the preset rule base;
根据匹配结果,从所述预设规则库中确定所述登录特征规则。According to the matching result, the login feature rule is determined from the preset rule base.
需要说明的是,在本申请实施例中,接收到登录请求信息之后,可以利用预设识别规则来对该登录请求信息进行识别,从而确定出待登录组件信息,并进一步根据待登录组件信息确定出登录请求信息所对应的登录特征规则。It should be noted that, in this embodiment of the present application, after receiving the login request information, the login request information can be identified by using a preset identification rule, so as to determine the component information to be logged in, and further determine the component information to be logged in according to the information of the component to be logged in. The log-in feature rule corresponding to the log-in request information is displayed.
在本申请实施例中,预设识别规则可以包括Snort规则。In this embodiment of the present application, the preset identification rules may include Snort rules.
这里,Snort规则是Snort引擎的核心模块,可以对某些行为进行特征识别及提取。在本申请实施例中,可以利用Snort规则对登录请求信息进行特征识别,当然也可以利用其它识别规则来对登录请求信息进行特征识别,本实施例对此不作具体限定。在识别出待登录组件信息后,将提取出来的待登录组件信息与Snort引擎中的预设规则库进行匹配,该预设规则库中存在有多种常见的登录组件以及对应的登录特征规则,还可以包含用户自定义的登录组件以及对应的登录特征规则。还需要注意的是,预设规则库属于Snort引擎中的一部分,也可以称为通过Snort规则进行特征匹配,以确定出登录请求信息所对应的登录特征规则。Here, Snort rules are the core modules of the Snort engine, which can identify and extract features for certain behaviors. In this embodiment of the present application, the Snort rule may be used to identify the features of the login request information, and of course other identification rules may also be used to identify the features of the login request information, which is not specifically limited in this embodiment. After identifying the component information to be logged in, the extracted component information to be logged in is matched with the preset rule base in the Snort engine. The preset rule base contains a variety of common login components and corresponding login feature rules. User-defined login components and corresponding login feature rules may also be included. It should also be noted that the preset rule base belongs to a part of the Snort engine, which can also be called feature matching through Snort rules to determine the log-in feature rules corresponding to the log-in request information.
这样,在确定出待登录组件信息之后,可以将待登录组件信息与预设规则库进行匹配;如果匹配成功,那么就能够确定出对应的登录特征规则。In this way, after the component information to be registered is determined, the component information to be registered can be matched with the preset rule base; if the matching is successful, the corresponding login feature rule can be determined.
进一步地,在一些实施例中,所述预设规则库可以包括第一特征规则库和第二特征规则库;其中,第一特征规则库表示常见登录组件对应的特征规则库,第二特征规则库表示非常见登录组件对应的预定义配置的特征规则库。Further, in some embodiments, the preset rule base may include a first feature rule base and a second feature rule base; wherein the first feature rule base represents a feature rule base corresponding to common login components, and the second feature rule base The library represents the predefined configuration feature rule library corresponding to the uncommon login components.
具体来讲,第一特征规则库表示常见登录组件对应的特征规则库,常见的登录组件可以是Joomla、EYOUCMS、DedeCMS、DouPHP以及其它常用登录组件,并不局限于此处所举的示例。举例来说,当登录组件为Joomla时,Joomla的登录过程通过组件com_user,插件plugin/authenication/joomla.php、plugin/user/joomla.php等诸多部分共同完成,用户在进行登录时,用户组件在接受用户登录请求之后开始发起登录认证流程,登录请求信息可以为一段程序代码,其中重点是$options以及$credentials,前者记录了一些客户端的行为比如记住我(remembe me),返回地址,后者类似于一个身份请求令牌,令牌中包括了用户输入的用户名以及密码。需要说明的是,此处仅以Joomla登录组件为例,实际中存在有许多对应有不同登录特征规则的常见登录组件。Specifically, the first feature rule base represents a feature rule base corresponding to common login components. Common login components may be Joomla, EYOUCMS, DedeCMS, DouPHP, and other common login components, and are not limited to the examples here. For example, when the login component is Joomla, the login process of Joomla is completed by the component com_user, the plugin plugin/authenication/joomla.php, plugin/user/joomla.php and many other parts. When the user logs in, the user component is in the After accepting the user's login request, the login authentication process is initiated. The login request information can be a piece of program code, the focus of which is $options and $credentials. The former records some client behaviors such as remember me (remembe me), return address, and the latter Similar to an identity request token, the token includes the username and password entered by the user. It should be noted that the Joomla login component is used as an example here. In practice, there are many common login components corresponding to different login feature rules.
第二特征规则库表示非常见登录组件对应的预定义配置的特征规则库。例如,对于某些企业或者公司来说,用户在进行登录时并没有采用常见的登录组件进行登录,而是该公司自行开发的或者购买的内部业务登录系统或者私有登录组件,这些登录组件只在企业或者公司内部或者小范围内使用,不存在于第一特征规则库中,此时可以通过用户自行将这些非常见的登录组件信息以及其对应的预定义配置的登录特征规则加入第二特征规则库中,用户可以自行对其进行更新,也可以自动在线更新,即满足了对内部业务登录系统和私有登录组件信息及其对应的登录特征规则自定义。The second feature rule base represents a predefined configuration feature rule base corresponding to the uncommon login component. For example, for some enterprises or companies, users do not use common login components to log in, but internal business login systems or private login components developed or purchased by the company. These login components are only used in It is used within an enterprise or company or within a small range, and does not exist in the first feature rule base. At this time, users can add these unusual login component information and their corresponding pre-configured login feature rules to the second feature rule by themselves. In the library, users can update it by themselves or automatically online, which satisfies the customization of the internal business login system and private login component information and their corresponding login feature rules.
举例来说,W公司在管理公司系统时,使用公司自行开发的内部业务登录系统K,同时也可以使用购买的私有登录组件L,另外,有时候还使用一些常见登录组件。这样,对于W公司来说,就可以将内部业务登录系统K和私有登录组件L以及对应的登录特征规则加入第二特征规则库中。这样,员工在登录时,弱口令检测装置会先对登录请求信息进行识别确定登录组件信息,再根据当前的登录组件对应的登录特征规则,准确提取用户名密码。在后续使用过程中,如果研发或者购买了新的组件,或者对登录组件更新了新版本时,都可以自动或者手动对第二特征规则库进行更新。For example, when company W manages the company system, it uses the internal business login system K developed by the company itself, and can also use the purchased private login component L. In addition, it sometimes uses some common login components. In this way, for company W, the internal business login system K, the private login component L and the corresponding login feature rules can be added to the second feature rule base. In this way, when an employee logs in, the weak password detection device will first identify the login request information to determine the login component information, and then accurately extract the username and password according to the login feature rules corresponding to the current login component. In the subsequent use process, if a new component is developed or purchased, or a new version of the login component is updated, the second feature rule base can be updated automatically or manually.
可见,如果在提取登录信息之前,先对登录组件信息进行识别,再根据登录组件信息对应的登录特征规则,就可以精确知晓登录信息例如用户名、密码等所在的位置,并将其准确地提取出来,之后可以根据用户输入的用户名查出数据库里对应的密码与用户密码匹配,匹配一致就登录成功,匹配不一致就登录失败。不同的登录组件具有不同的登录特征规则,在接收到登录请求信息时,先对登录请求信息进行特征提取以根据预设识别规则来确定出待登录组件信息,并进一步确定出所述登录组件信息对应的登录特征规则,从而基于不同登录组件信息特有的登录特征规则从登录请求信息中准确提取出登录信息。It can be seen that if the login component information is identified before the login information is extracted, and then according to the login feature rules corresponding to the login component information, the location of the login information such as user name and password can be accurately known and extracted accurately. After that, you can find out that the corresponding password in the database matches the user password according to the user name entered by the user. If the match is consistent, the login is successful, and if the match is inconsistent, the login fails. Different login components have different login feature rules. When receiving login request information, first perform feature extraction on the login request information to determine the component information to be logged in according to the preset identification rules, and further determine the login component information. Corresponding login feature rules, thereby accurately extracting login information from login request information based on login feature rules unique to different login component information.
在本申请实施例中,第一特征规则库可以是弱口令检测装置(或检测设备)内部预置的。在一些实施例中,对于第一特征规则库来说,该方法还可以包括:对所述第一特征规则库进行在线更新。In this embodiment of the present application, the first feature rule base may be preset inside the weak password detection apparatus (or detection device). In some embodiments, for the first feature rule base, the method may further include: online updating the first feature rule base.
也就是说,由于行业技术的不断发展,更多不同类型的组件会被研发出来;而且第一特征规则库中已经包含的登录组件也会不断更新出新版本。因此,在本申请实施例中,第一特征规则库还支持在线更新。That is to say, due to the continuous development of industry technology, more and different types of components will be developed; and the login components already included in the first feature rule base will also be continuously updated with new versions. Therefore, in this embodiment of the present application, the first feature rule base also supports online update.
在本申请实施例中,对第一特征规则库的在线更新包括对登录组件信息类型的更新以及登录组件信息对应的登录特征规则类型的更新。该更新可以为实时、定期或者不定期的,本实施例对此不作具体限定。例如,第一特征规则库中原本包含有M种不同类型的登录组件信息,某公司研发了一种新的登录组件并广为应用,当在线更新时检测到该新的登录组件时,就会将该新的登录组件信息以及其对应的登录特征规则加入第一特征规则库中进行更新。又例如,原本存在于第一特征规则库中的登录组件信息A,一段时间后又发布了新版本A2.0,新版本A2.0中增加了以前A中不存在的新的登录特征规则,当在线更新时检测到该A2.0中新的登录特征规则时,就会将该新的登录特征规则加入第一特征规则库中进行更新。当然,对第一特征规则库的更新不局限于这里所列举的示例,本领域技术人员也可以采取其它手段对第一特征规则库进行更新。In this embodiment of the present application, the online update to the first feature rule base includes updating the type of login component information and updating the type of login feature rule corresponding to the login component information. The update may be real-time, regular or irregular, which is not specifically limited in this embodiment. For example, the first feature rule base originally contains M different types of login component information. A company has developed a new login component and widely used it. When the new login component is detected during online update, it will The new login component information and its corresponding login feature rules are added to the first feature rule base for updating. For another example, the login component information A that originally existed in the first feature rule base, a new version A2.0 was released after a period of time, and the new version A2.0 added new login feature rules that did not exist in A before, When a new login feature rule in the A2.0 is detected during online update, the new login feature rule will be added to the first feature rule base for updating. Of course, the updating of the first feature rule base is not limited to the examples listed here, and those skilled in the art can also take other means to update the first feature rule base.
S204:基于所述登录特征规则,从所述登录请求信息中提取登录信息。S204: Extract login information from the login request information based on the login feature rule.
需要说明的是,不同的登录组件信息对应有不同的登录特征规则。这样,根据确定的待登录组件信息对应的登录特征规则,就可以根据该登录特征规则从登录请求信息中准确地提取出登录信息。这里,登录信息至少可以包括:用户名、密码、源IP地址,目的IP地址,登录时间等。通常情况下,登录信息一般是指用户名和密码,但是不作具体限定。It should be noted that different login component information corresponds to different login feature rules. In this way, according to the determined log-in feature rule corresponding to the component information to be logged in, the log-in information can be accurately extracted from the log-in request information according to the log-in feature rule. Here, the login information may at least include: user name, password, source IP address, destination IP address, login time, and the like. Usually, the login information generally refers to the user name and password, but is not specifically limited.
S205:在检测到登录状态为成功登录的情况下,对所述登录信息进行弱口令检测,以确定所述登录信息中是否存在弱口令。S205: In the case where it is detected that the login status is successful login, perform weak password detection on the login information to determine whether there is a weak password in the login information.
在本申请实施例中,在从登录请求信息中提取到登录信息之后,这时候就可以基于提取到的登录信息来确定登录状态,登录状态可能为成功或者失败,甚至也可能是由于网络等原因导致的其它登录状态。在本申请实施例中,只有在检测到登录状态为成功登录的情况下,才会对登录信息进行弱口令检测,以确定登录信息中是否存在弱口令。具体地,对登录信息进行弱口令检测主要是对登录信息中的密码进行弱口令检测。In the embodiment of the present application, after the login information is extracted from the login request information, the login status can be determined based on the extracted login information at this time, and the login status may be success or failure, or even due to reasons such as the network other login states resulting. In this embodiment of the present application, only when it is detected that the login status is successful login, weak password detection is performed on the login information to determine whether there is a weak password in the login information. Specifically, the weak password detection on the login information is mainly to perform weak password detection on the password in the login information.
进一步地,在一些实施例中,在检测到登录状态为成功登录的情况下,该方法还可以包括:Further, in some embodiments, when it is detected that the login status is successful login, the method may further include:
将所述登录信息写入审计日志表中;writing the login information into the audit log table;
相应地,所述对所述登录信息进行弱口令检测,可以包括:Correspondingly, the performing weak password detection on the login information may include:
启动离线检测进程;Start the offline detection process;
从所述审计日志表中获取所述登录信息,利用预设检测策略对所述登录信息进行弱口令检测。The login information is obtained from the audit log table, and weak password detection is performed on the login information by using a preset detection strategy.
需要说明的是,在本申请实施例中,在检测到登录状态为登录成功后,将所述登录信息写入审计日志表中,该审计日志表用于存储登录成功的登录信息。审计日志表中存储的登录信息至少包括:用户名、密码、登录状态,也可以包括源IP地址,目的IP地址以及其它登录信息,弱口令检测主要使用到用户名、密码。It should be noted that, in the embodiment of the present application, after it is detected that the login status is that the login is successful, the login information is written into the audit log table, and the audit log table is used to store the login information of the successful login. The login information stored in the audit log table includes at least the user name, password, and login status, and may also include the source IP address, destination IP address, and other login information. The weak password detection mainly uses the user name and password.
还需要说明的是,在本申请实施例中,在将登录信息写入审计日志表后,离线检测进程可以定时启动,例如每小时或者每天启动一次,也可以不定时启动,例如在检测到审计日志表中新增了预设数量或者预设数量范围的登录信息时启动,也可以手动启动,例如在管理员认为有必要的时候手动启动离线检测进程。在离线检测进程启动后,利用预设检测策略对登录信息进行弱口令检测,这里主要是对登录信息中的密码进行弱口令检测。It should also be noted that, in this embodiment of the present application, after the login information is written into the audit log table, the offline detection process can be started regularly, such as every hour or every day, or it can be started irregularly, such as when an audit is detected. It starts when a preset number or range of login information is added to the log table, or it can be started manually, for example, when the administrator considers it necessary to manually start the offline detection process. After the offline detection process is started, a preset detection strategy is used to perform weak password detection on the login information. Here, the weak password detection is mainly performed on the password in the login information.
进一步地,在一些实施例中,离线检测进程主要包含预处理和弱口令检测。Further, in some embodiments, the offline detection process mainly includes preprocessing and weak password detection.
需要说明的是,在本申请实施例中,离线检测进程首先对采集到的数据进行预处理,即对从审计日志表中读取到的登录信息进行数据筛选,采集出有用数据以便进行弱口令检测,这里有用的数据主要指用户名、密码。然后离线检测进程对登录信息进行弱口令检测,弱口令检测即对采集到的数据进行分析检测,这里主要是对密码进行弱口令检测。It should be noted that, in the embodiment of the present application, the offline detection process first preprocesses the collected data, that is, performs data screening on the login information read from the audit log table, and collects useful data for weak password verification. Detection, the useful data here mainly refers to the user name and password. Then, the offline detection process performs weak password detection on the login information. The weak password detection is to analyze and detect the collected data. Here, the weak password detection is mainly performed on the password.
进一步地,在一些实施例中,所述预设检测策略包括内置弱口令检测策略和预定义弱口令检测策略;其中,Further, in some embodiments, the preset detection strategy includes a built-in weak password detection strategy and a predefined weak password detection strategy; wherein,
所述内置弱口令检测策略至少包括下述一项:内置口令长度检测策略、内置字符种类检测策略和常见组件弱口令字典匹配检测策略;The built-in weak password detection strategy includes at least one of the following: a built-in password length detection strategy, a built-in character type detection strategy, and a common component weak password dictionary matching detection strategy;
所述预定义弱口令检测策略至少包括下述一项:预设口令长度检测策略、预设字符种类检测策略和预设弱口令字典匹配检测策略。The predefined weak password detection strategy includes at least one of the following: a preset password length detection strategy, a preset character type detection strategy, and a preset weak password dictionary matching detection strategy.
需要说明的是,在本申请实施例中,对于内置弱口令检测策略,其至少包括下述一项:内置口令长度检测策略、内置字符种类检测策略和常见组件弱口令字典匹配检测策略。It should be noted that, in the embodiment of the present application, the built-in weak password detection strategy includes at least one of the following: a built-in password length detection strategy, a built-in character type detection strategy, and a common component weak password dictionary matching detection strategy.
进一步地,在一些实施例中,该方法还可以包括:对内置弱口令检测策略进行更新。Further, in some embodiments, the method may further include: updating the built-in weak password detection policy.
需要说明的是,在本申请实施例中,内置弱口令检测策略可以是弱口令检测装置(或者检测设备)内部预置的,且定期或者不定期更新的,更新可以包括对内置口令长度检测策略、内置字符种类检测策略和常见组件弱口令字典匹配检测策略中的一种策略或者几种策略以及这几种策略之外的内置弱口令检测策略的更新。It should be noted that, in this embodiment of the present application, the built-in weak password detection strategy may be preset inside the weak password detection device (or detection device) and updated regularly or irregularly, and the update may include detecting the built-in password length. , One or several strategies in the built-in character type detection strategy and the common component weak password dictionary matching detection strategy, and the update of the built-in weak password detection strategy other than these strategies.
需要说明的是,当密码过短的时候,例如只包括四个字符时,被破解的可能性就比较大。通过内置口令长度检测策略,可以将密码长度不符合策略而导致较弱的口令检测出来。例如,可以设置一个长度阈值或者长度区间,当密码长度小于该阈值或者不在该区间时,说明该密码强度比较弱。举例如下:当内置口令长度检测策略为规定密码长度应当大于等于6个字符时,此时检测到了一个密码为A24b的密码,其仅包含有四个字符即密码长度过短,因此被破解的可能性较大,此时,可以根据内置口令长度检测策略确定其为弱口令。需要说明的是,随着行业技术的发展,密码破解手段也会越来越高级,有可能原来设置字符长度为6个字符是比较安全的,但是在某些情况下字符长度为6个字符可能已经不再安全,因此内置口令长度检测策略会基于实际情况进行更新,更新可以为实时、定期或者不定期的。It should be noted that when the password is too short, for example, it only includes four characters, it is more likely to be cracked. Through the built-in password length detection strategy, weak passwords can be detected because the password length does not conform to the strategy. For example, a length threshold or length interval can be set, and when the password length is less than the threshold or not in the interval, it means that the password strength is relatively weak. An example is as follows: When the built-in password length detection policy specifies that the password length should be greater than or equal to 6 characters, a password of A24b is detected at this time, which only contains four characters, that is, the password length is too short, so it may be cracked. At this time, it can be determined as a weak password according to the built-in password length detection strategy. It should be noted that with the development of industry technology, password cracking methods will become more and more advanced. It may be safer to set the character length to 6 characters, but in some cases, it may be possible to set the character length to 6 characters. It is no longer secure, so the built-in password length detection strategy will be updated based on the actual situation, and the update can be real-time, regular or irregular.
需要说明的是,字符种类单一的密码被破解的可能性比较大。通过内置字符种类检测策略可以将字符种类单一而导致容易被破解的口令检测出来。例如,可以限制密码的字符种类,比如密码至少包括S种字符(S为大于1的整数),或者密码至少要包括大写字母、小写字母、数字、符号等的几种。如果密码的字符种类不符合要求,则说明该密码强度较弱容易被破解,有可能为弱口令。举例如下,当内置字符种类检测策略为规定字符种类不少于3种,且至少包含大写字母和小写字母时,检测到了一个密码为FGH17895的密码,其只包含了大写字母和数字两种字符,没有包含小写字母,不符合这里举例的内置字符种类检测策略,此时,可以根据内置字符种类检测策略确定其为弱口令。需要说明的是,随着行业技术的发展,密码破解手段也会越来越高级,有可能原来字符种类为3种字符是比较安全的,但是在某些情况下字符种类为3种字符可能已经不再安全,因此内置字符种类检测策略会根据实际情况进行更新,更新可以为实时、定期或者不定期的。It should be noted that a password with a single character type is more likely to be cracked. The built-in character type detection strategy can detect passwords that are easy to be cracked due to a single character type. For example, the character types of the password can be limited, for example, the password includes at least S characters (S is an integer greater than 1), or the password includes at least several types of uppercase letters, lowercase letters, numbers, and symbols. If the character type of the password does not meet the requirements, it means that the password is weak and easy to be cracked, and may be a weak password. For example, when the built-in character type detection policy specifies that there are no less than 3 types of characters, and at least contains uppercase letters and lowercase letters, a password with the password FGH17895 is detected, which only contains uppercase letters and numbers. If it does not contain lowercase letters, it does not conform to the built-in character type detection strategy exemplified here. In this case, it can be determined as a weak password according to the built-in character type detection strategy. It should be noted that with the development of industry technology, password cracking methods will become more and more advanced. It may be safer to have three types of characters, but in some cases, three types of characters may already be used. It is no longer safe, so the built-in character type detection strategy will be updated according to the actual situation, and the update can be real-time, regular or irregular.
需要说明的是,有些用户经常会为了方便记忆选择一些简单的或者有规律可循的密码,例如“123456”、“ABCDEF”、“8888888”等,或者类似“ZXCVBN”这种虽然看似无规律,但实际上是按照英文键盘的顺序设置的密码,这些密码容易被猜到或者被破解。有些黑客会利用弱口令字典对账号尝试多次登录,直到试出正确的密码(即“暴力破解”),通过内置常见组件弱口令字典匹配检测策略,可以将容易被暴力破解的密码检测出来,将待测密码与预设常见组件弱口令字典进行匹配,如果匹配成功说明该密码为弱口令。常见组件弱口令字典可以由从互联网等渠道获取到的弱口令、爆破检测时发现的口令以及其它常见的弱口令等组成,而且常见组件弱口令字典会实时或者定时或者不定时进行更新,例如当检测到某账号在进行登录且登录失败时,此时有可能是用户输错了密码,但也有可能是黑客或者恶意软件在对该账号进行暴力破解,如果检测到存在暴力破解,说明此时检测到的密码已经被用于进行破解账号,如果有用户采用此密码作为登录密码就极易被破解,此时,如果该密码不存在于预设常见组件弱口令字典中,就将其添加进预设常见组件弱口令字典中,又例如互联网上出现了新的弱口令字典也将其中的弱口令加入常见组件弱口令字典中,当然对常见组件弱口令字典进行更新的方式有多种,不局限于本申请实施例所列举的例子,只要弱口令检测装置检测到了不存在于常见组件弱口令字典中的弱口令,就将新的弱口令加入对常见组件弱口令字典进行更新。It should be noted that some users often choose some simple or regular passwords for the convenience of memory, such as "123456", "ABCDEF", "8888888", etc., or similar to "ZXCVBN" although it seems irregular , but the passwords are actually set in the order of the English keyboard, which are easy to guess or crack. Some hackers will use the weak password dictionary to try to log in to the account for many times until the correct password (ie "brute force cracking") is tried. Through the built-in weak password dictionary matching detection strategy of common components, passwords that are easily cracked by brute force can be detected. Match the password to be tested with the preset weak password dictionary of common components. If the match is successful, the password is a weak password. The weak password dictionary of common components can be composed of weak passwords obtained from the Internet and other channels, passwords found during blasting detection, and other common weak passwords, and the weak password dictionary of common components will be updated in real time or regularly or irregularly. When it is detected that an account is logging in and the login fails, the user may have entered the wrong password at this time, but it is also possible that a hacker or malware is brute force cracking the account. If brute force cracking is detected, it means that the detection The obtained password has been used to crack the account. If a user uses this password as the login password, it is very easy to be cracked. At this time, if the password does not exist in the preset weak password dictionary of common components, it will be added to the preset password. Suppose the common component weak password dictionary, for example, a new weak password dictionary appears on the Internet, and the weak passwords are added to the common component weak password dictionary. Of course, there are many ways to update the common component weak password dictionary, not limited to In the examples listed in the embodiments of the present application, as long as the weak password detection device detects a weak password that does not exist in the weak password dictionary of common components, a new weak password is added to update the weak password dictionary of common components.
另外,弱口令检测装置还可以内置口令复杂度检测策略,例如口令复杂度检测策略规定连续的字母或者数字或者与用户名相同的密码为弱口令。In addition, the weak password detection device may also have a built-in password complexity detection strategy. For example, the password complexity detection strategy specifies that consecutive letters or numbers or a password identical to the user name is a weak password.
需要说明的是,在本申请实施例中,可以通过几种内置弱口令检测策略同时对密码进行弱口令检测,也可以只通过一种或几种内置弱口令检测策略对密码进行弱口令检测,本申请实施例对此不作具体限定。It should be noted that, in this embodiment of the present application, weak password detection may be performed on passwords simultaneously through several built-in weak password detection strategies, or weak password detection may be performed on passwords only through one or several built-in weak password detection strategies. This embodiment of the present application does not specifically limit this.
需要说明的是,在本申请实施例中,对于预定义弱口令检测策略,其至少包括下述一项:预设口令长度检测策略、预设字符种类检测策略和预设弱口令字典匹配检测策略。It should be noted that, in this embodiment of the present application, the predefined weak password detection strategy includes at least one of the following: a preset password length detection strategy, a preset character type detection strategy, and a preset weak password dictionary matching detection strategy .
其中,预设口令长度检测策略与预设字符种类检测策略与内置弱口令检测策略中的内置口令长度检测策略和内置字符种类检测策略类似,主要为用户结合自身实际需求进行具体设定,此处不再赘述。Among them, the preset password length detection strategy and the preset character type detection strategy are similar to the built-in password length detection strategy and the built-in character type detection strategy in the built-in weak password detection strategy, and are mainly set by users according to their actual needs. Here No longer.
预设弱口令字典匹配检测策略为用户自定义的,预设弱口令字典可以包括用户自行输入的弱口令,也可以包括根据用户指定的规则生成的弱口令字典;例如:某公司的电话号码为一串8位且不连续的数字,对于非该公司的人来说,将该电话号码设置为密码或许不易被破解,但是对于该公司的员工来说,如果将该电话号码直接设置为密码或者将自己的姓名+该电话号码设置为密码就很容易被破解。所以,预设弱口令字典一般为用户结合自身实际情况,将容易被破解的密码加入,例如用户可以将员工的姓名拼音或首字母、电话号码、公用电话号码、公司名称拼音或首字母等信息直接作为弱口令加入预设弱口令字典,也可以使用程序将其进行组合生成弱口令加入弱口令字典中。同样,预设弱口令字典也支持实时或者定时或者不定时进行更新,用户可以直接手动添加新的弱口令也可以结合自身情况生成新的弱口令到预设弱口令字典中。例如,当公司有新员工入职时,公司内部系统(该系统包含有本申请实施例所述的弱口令检测装置)会对新员工信息进行录入,当检测到新员工的信息例如姓名、生日、电话等时就可以根据这些信息生成容易被破解的弱口令加入预设弱口令字典中;当然,用户也可以通过手动添加的方式将新的弱口令加入预设弱口令字典中,本实施例对此不作具体限制。The preset weak password dictionary matching detection strategy is user-defined. The preset weak password dictionary can include weak passwords entered by the user, or a weak password dictionary generated according to the rules specified by the user; for example, the phone number of a company is A string of 8-digit and discontinuous numbers. For non-company people, setting the phone number as a password may not be easy to crack, but for employees of the company, if the phone number is directly set as a password or It is easy to crack by setting your name + this phone number as a password. Therefore, the default weak password dictionary is generally for users to add passwords that are easy to be cracked according to their actual situation. For example, users can add information such as the employee's name in pinyin or initials, phone number, public phone number, company name in pinyin or initials, etc. It is directly added to the preset weak password dictionary as a weak password, or a program can be used to combine it to generate a weak password and add it to the weak password dictionary. Similarly, the preset weak password dictionary also supports real-time or regular or irregular updates. Users can directly manually add new weak passwords or generate new weak passwords into the preset weak password dictionary based on their own conditions. For example, when a new employee joins the company, the company's internal system (the system includes the weak password detection device described in the embodiment of the present application) will input the information of the new employee. A weak password that is easily cracked can be generated according to the information and added to the preset weak password dictionary when making a phone call, etc.; of course, the user can also manually add a new weak password into the preset weak password dictionary. This is not specifically limited.
另外,用户还可以自定义预设口令复杂度检测策略,例如口令复杂度检测策略规定连续的字母或者数字等为弱口令。In addition, the user can also customize a preset password complexity detection strategy, for example, the password complexity detection strategy specifies that consecutive letters or numbers are weak passwords.
需要说明的是,在本申请实施例中,可以通过几种预定义弱口令检测策略同时对密码进行弱口令检测,也可以只通过一种或几种预定义弱口令检测策略对密码进行弱口令检测,本申请实施例对此不作具体限定。It should be noted that, in this embodiment of the present application, weak password detection may be performed on passwords simultaneously through several predefined weak password detection strategies, or weak password detection may be performed on passwords only through one or several predefined weak password detection strategies. Detection is not specifically limited in this embodiment of the present application.
需要说明的是,在本申请实施例中,可以通过内置弱口令检测策略和预定义弱口令检测策略同时对密码进行弱口令检测,也可以只选择其中一种进行检测策略对密码进行弱口令检测,本申请实施例对此不作具体限定。例如,有些用户并没有设置预设预定义弱口令检测策略,此时,就只需要根据内置弱口令检测策略进行弱口令检测。It should be noted that, in this embodiment of the present application, weak password detection can be performed on passwords simultaneously through a built-in weak password detection strategy and a predefined weak password detection strategy, or only one of the detection strategies can be selected to perform weak password detection on passwords. , which is not specifically limited in the embodiments of the present application. For example, some users do not set a preset predefined weak password detection policy. In this case, only weak password detection needs to be performed according to the built-in weak password detection policy.
进一步地,在一些实施例中,所述登录信息包括用户名和密码,在所述从所述审计日志表中获取所述登录信息之后,该方法还可以包括:Further, in some embodiments, the login information includes a user name and a password, and after acquiring the login information from the audit log table, the method may further include:
对所述登录信息进行特权账号识别,确定所述用户名是否为特权账号。Perform privileged account identification on the login information to determine whether the user name is a privileged account.
需要说明的是,在本申请实施例中,在进行弱口令检测时,所述登录信息至少可以包括用户名和密码。It should be noted that, in this embodiment of the present application, when performing weak password detection, the login information may include at least a user name and a password.
还需要说明的是,特权账号往往为具有较高操作权限的账号,特权账号可以是在企业运营过程中,给相关业务运营、系统管理、系统运维等人员赋予的系统维护、权限增加、数据修改删除导出等高级权限的系统账户,这些账户及其持有人掌握着企业的信息系统的生死大计,为公司各项业务的正常开展保驾护航,一旦缺乏掌控或者被攻击破解,会给公司业务带来极大的危害。It should also be noted that a privileged account is often an account with higher operating authority, and a privileged account can be the system maintenance, authority increase, data, etc. assigned to relevant business operation, system management, system operation and maintenance personnel during the operation of the enterprise. Modify, delete, export and other high-level system accounts. These accounts and their holders control the life and death plan of the company's information system and escort the normal development of the company's various businesses. cause great harm.
进一步地,在一些实施例中,针对特权账号进行识别的方法,可以包括:识别登录信息中的用户名。Further, in some embodiments, the method for identifying a privileged account may include: identifying a user name in the login information.
其中,特权账号往往具有特殊的用户名,例如root、admin、DBA等,如果检测到此类用户名,说明该账号很有可能为特权账号。当然,特权账号也可以为用户自定义的特权账号用户名。这里,特权账号可以有多种,并不局限于本实施例列举的几类。另外,也可以通过其它方式对特权账号进行识别,本申请实施例对此不作具体限定。Among them, privileged accounts often have special user names, such as root, admin, DBA, etc. If such a user name is detected, it indicates that the account is likely to be a privileged account. Of course, the privileged account can also be a user-defined privileged account username. Here, there may be multiple types of privileged accounts, which are not limited to the types listed in this embodiment. In addition, the privileged account may also be identified in other ways, which is not specifically limited in this embodiment of the present application.
S206:对所述登录信息进行弱口令检测之后,若确定所述登录信息中存在弱口令,则将所述登录信息以安全日志格式存储到预设安全日志表。S206: After performing weak password detection on the login information, if it is determined that there is a weak password in the login information, store the login information in a security log format in a preset security log table.
需要说明的是,在本申请实施例中,在确定登录信息中存在弱口令时,就将该登录信息以安全日志格式存储到预设安全日志表中。这里,预设安全日志表中存储的内容至少包括:检测到的存在弱口令的密码,以及该密码对应的用户名。这样将存在弱口令的登录信息存入预设安全日志表中,便于管理员进行查看,以便对存在弱口令的账号进行及时整顿。It should be noted that, in this embodiment of the present application, when it is determined that there is a weak password in the login information, the login information is stored in the preset security log table in a security log format. Here, the content stored in the preset security log table at least includes: a detected password with a weak password, and a user name corresponding to the password. In this way, the login information with weak passwords is stored in the preset security log table, which is convenient for the administrator to view, so as to rectify the accounts with weak passwords in time.
在一些实施例中,在对所述登录信息进行弱口令检测之后,该方法还可以包括:In some embodiments, after performing weak password detection on the login information, the method may further include:
若确定所述登录信息中存在弱口令,则发送预警信息;其中,所述预警信息用于提示用户所述登录信息存在弱口令风险。If it is determined that there is a weak password in the login information, early warning information is sent; wherein, the early warning information is used to prompt the user that the login information has a risk of a weak password.
需要说明的是,在本申请实施例中,如果检测到登录信息中存在弱口令,此时可以发送预警信息,提示管理员或者用户该登录信息存在弱口令风险,以便管理员或者用户及时更改密码或者采取其它安全措施。It should be noted that, in this embodiment of the present application, if it is detected that there is a weak password in the login information, an early warning message may be sent at this time to prompt the administrator or user that the login information has a risk of weak password, so that the administrator or user can change the password in time. Or take other safety measures.
进一步地,在一些实施例中,当确定所述用户名为特权账号时,该方法还可以包括:Further, in some embodiments, when it is determined that the user name is a privileged account, the method may further include:
若检测到所述密码为弱口令,则将所述用户名和所述密码在预设安全日志表中进行标记。If it is detected that the password is a weak password, the user name and the password are marked in a preset security log table.
需要说明的是,在本申请实施例中,如前所述,特权账号为重要账号,如果存在弱口令风险,可能会带来较大的危害。因此,在检测到某账号为特权账号,且对应的密码为弱口令时,在将其存储到预设安全日志表中时,对该特权账号进行标记,与其它账号区别显示。这里,可以通过添加标注的方式进行标记,也可以通过高亮颜色进行标记,甚至还可以通过不同字体或者不同字号进行标记,本申请实施例对此不作具体限定。It should be noted that, in the embodiment of the present application, as mentioned above, the privileged account is an important account, and if there is a risk of weak passwords, it may bring greater harm. Therefore, when it is detected that an account is a privileged account and the corresponding password is a weak password, the privileged account is marked and displayed differently from other accounts when it is stored in the preset security log table. Here, it may be marked by adding a label, or may be marked by a highlight color, or may even be marked by different fonts or different font sizes, which are not specifically limited in this embodiment of the present application.
这样,本申请实施例可以在海量的数据中快速发现重要账号的弱口令风险,从而有针对性地制定防护措施。具体地,可以通过将存在弱口令的特权账号在预设安全日志表中单独设置页面进行展示,或者将存在弱口令的特权账号添加标注、文本高亮等;也可以在存在弱口令的特权账号的用户名之后加括号标记为特权账号,对应的也可以在存在弱口令的普通账号的用户名之后加括号标记普通账号,本实施例对此不作具体限定。In this way, the embodiments of the present application can quickly discover the weak password risk of an important account in massive data, so as to formulate protective measures in a targeted manner. Specifically, the privileged accounts with weak passwords can be displayed on a separate page in the preset security log table, or the privileged accounts with weak passwords can be marked, highlighted, etc.; privileged accounts with weak passwords can also be displayed The user name is marked with parentheses as a privileged account, and correspondingly, parentheses may be added after the username of a common account with a weak password to mark a common account, which is not specifically limited in this embodiment.
由于特权账号比较重要,因此,在一些实施例中,在确定所述用户名为特权账号时,还可以直接向管理员发送提醒消息,所述提醒消息用于告知管理员特权账号存在弱口令风险,以使管理员及时做出整顿,更好地保证了账号安全。Since the privileged account is more important, in some embodiments, when the user name is determined to be a privileged account, a reminder message may also be sent directly to the administrator, where the reminder message is used to inform the administrator that the privileged account has a weak password risk , so that the administrator can make timely rectification and better ensure account security.
本申请实施例提供了一种弱口令检测方法,通过该实施例对前述实施例的具体实现过程进行了详细阐述。从中可以看出,利用预设规则对登录请求信息进行识别,从而确定出待登录组件信息,基于待登录组件信息对应的登录特征规则,能够准确地从登录请求信息中提取出登录信息,并且只有在登录成功时将登录信息记入审计日志表并利用预设检测策略对登录信息进行弱口令检测,同时离线检测还支持对特权账号的识别。这样,实现了对不同登录组件的弱口令精确检测,提高了弱口令的检出率。The embodiment of the present application provides a weak password detection method, and the specific implementation process of the foregoing embodiment is described in detail through this embodiment. It can be seen from this that the login request information is identified by using the preset rules to determine the component information to be logged in. Based on the login feature rules corresponding to the component information to be logged in, the login information can be accurately extracted from the login request information, and only When the login is successful, the login information is recorded in the audit log table and the weak password detection is performed on the login information by using the preset detection strategy. At the same time, the offline detection also supports the identification of privileged accounts. In this way, accurate detection of weak passwords for different login components is realized, and the detection rate of weak passwords is improved.
在本申请的又一实施例中,参见图3,其示出了本申请实施例提供的一种弱口令检测系统的结构示意图。如图3所示,弱口令检测系统可以包括四大进程,分别为:代理进程301、日志处理进程302、数据库进程303和离线检测进程304。In another embodiment of the present application, referring to FIG. 3 , it shows a schematic structural diagram of a weak password detection system provided by an embodiment of the present application. As shown in FIG. 3 , the weak password detection system may include four major processes, namely: an
其中,本申请实施例在代理进程301中进行登录信息审计,利用Snort规则对HTTP数据进行登录特征规则匹配。首先,在请求方向匹配登录特征规则,匹配到登录特征规则后,提取用户名和密码,将它们缓存到当前链接上。然后在响应方向进行匹配,获取登录状态,判断本次登录是否成功。此时,可以将一次链接的请求方向和响应方向关联起来,对本次登录用户名、密码和是否登录成功等信息进行审计。Among them, in the embodiment of the present application, the
日志处理进程302主要用于接收审计日志,审计日志中包括用户名、密码以及源IP地址和目的IP地址等信息。弱口令检测主要使用到用户名和密码。离线检测进程会被定时拉起,完成弱口令检测。The
数据库进程303主要用于存储审计日志表和安全日志表,审计日志表中记录了登录信息的审计日志,安全日志表中记录了弱口令检测结果的安全日志。The
离线检测进程304主要包含预处理和检测。预处理即对审计日志进行数据筛选,采集出有用数据以便进行弱口令检测。检测即对采集到的数据进行分析检测。The
这里,预设的检测策略可以包括两大类:内置弱口令检测策略和预定义弱口令检测策略。内置弱口令检测策略包括:内置口令长度检测策略、内置字符种类检测策略和常见组件弱口令字典匹配检测策略等;预定义弱口令检测策略包括预设口令长度检测策略、预设字符种类检测策略和预设弱口令字典匹配检测策略等。Here, the preset detection strategies may include two categories: built-in weak password detection strategies and predefined weak password detection strategies. Built-in weak password detection strategies include: built-in password length detection strategy, built-in character type detection strategy, and common component weak password dictionary matching detection strategies; predefined weak password detection strategies include preset password length detection strategy, preset character type detection strategy, and Preset weak password dictionary matching detection strategies, etc.
另外,在本申请实施例中,离线检测还可以支持对root和admin等特权账号的识别。In addition, in this embodiment of the present application, offline detection may also support identification of privileged accounts such as root and admin.
日志处理进程302还用于接收安全日志,对审计日志表中的登录信息进行离线检测后,当检测出出弱口令后,将检测结果适配安全日志格式,记录到数据库进程303中的安全日志表中。The
下面结合图3对本申请实施例提供的一种弱口令检测系统各进程的工作流程进行详细阐述。The workflow of each process of a weak password detection system provided by an embodiment of the present application will be described in detail below with reference to FIG. 3 .
如图3所示,代理进程301可以对应步骤S3011至S3018,具体如下:As shown in FIG. 3, the
S3011:获取请求方向报文。S3011: Obtain the request direction packet.
需要说明的是,本申请实施例提供的一种弱口令检测方法,在用户进行登录的过程中,可以基于http(超文本传输)协议来实现,http是一个简单的请求-响应协议,它通常运行在TCP之上。它指定了客户端可能发送给服务器什么样的消息以及得到什么样的响应。在本申请实施例中,在请求方向发起登录请求。It should be noted that a weak password detection method provided by this embodiment of the present application can be implemented based on the HTTP (Hypertext Transfer) protocol during the user's login process. HTTP is a simple request-response protocol, which usually Runs on top of TCP. It specifies what kind of messages the client might send to the server and what kind of response it gets. In this embodiment of the present application, a login request is initiated in the request direction.
S3012:判断是否命中规则。S3012: Determine whether the rule is hit.
在这里,对于步骤S302,如果判断结果为是,那么执行步骤S303;如果判断结果为否,那么结束此次登录过程,重新执行步骤S301。Here, for step S302, if the judgment result is yes, then step S303 is executed; if the judgment result is no, then the login process is ended, and step S301 is executed again.
需要说明的是,在本申请实施例中,在获取请求方向报文之后,需要对该请求方向报文信息进行特征匹配。这里,利用Snort引擎,首先对请求方向报文进行登录特征匹配后,就可以确定出对应的登录特征规则,也就确定出了此次登录请求的登录组件,所述登录组件包括内置的常见登录组件,例如Joomla、EYOUCMS、DedeCMS和DouPHP等;还可以包括用户自定义登录组件,例如:内部业务登录系统、私有登录组件等。其中,常见登录组件为已有的、常用的登录组件;自定义登录组件可以为用户自定义的登录组件或者只在某些企业内部使用的私有登录组件。It should be noted that, in this embodiment of the present application, after the request direction packet is acquired, feature matching needs to be performed on the request direction packet information. Here, using the Snort engine, after first matching the login feature of the request direction message, the corresponding login feature rule can be determined, and the login component of this login request is also determined, and the login component includes the built-in common login Components, such as Joomla, EYOUCMS, DedeCMS, DouPHP, etc.; can also include user-defined login components, such as: internal business login system, private login components, etc. Among them, the common login component is an existing and commonly used login component; the custom login component may be a user-defined login component or a private login component only used in some enterprises.
另外,常见登录组件支持在线更新。例如,当出现了新的登录组件,或者登录组件出现了新的登录特征规则,即在线更新包括登录组件和登录组件特征规则的更新,更新可以为定期或者不定期的,本实施例对此不作具体限定。自定义登录组件主要为用户内部或者私有的登录组件,主要由用户主动进行更新,更新也可以为定期或者不定期,本实施例对此不作具体限定。In addition, common login components support online updates. For example, when a new login component appears, or a new login feature rule appears in the login component, that is, the online update includes the update of the login component and the login component feature rule, and the update may be regular or irregular, which is not made in this embodiment. Specific restrictions. The user-defined login component is mainly an internal or private login component of the user, and is mainly updated by the user actively. The update may also be regular or irregular, which is not specifically limited in this embodiment.
S3013:提取用户名和密码。S3013: Extract the user name and password.
需要说明的是,在本申请实施例中,在步骤S302中,对请求方向报文进行规则匹配后确定出了登录特征规则,根据不同的登录特征规则就可以准确地从请求方向报文中提取到用户名和密码。It should be noted that, in this embodiment of the present application, in step S302 , the log-in feature rule is determined after the request direction packet is matched with the rules, and the log-in feature rule can be accurately extracted from the request direction message according to different log-in feature rules. to username and password.
需要说明的是,直接从请求方向报文中提取登录信息例如用户名和密码,很有可能导致提取不到登录信息或者提取到错误的登录信息。在本申请实施例中,由于不同的登录组件具有不同的登录特征规则,可以先对请求方向报文进行规则匹配,只有在命中规则后,即确定了登录组件信息,再基于登录组件信息对应的登录特征规则进行登录信息例如用户名和密码的提取,提高了用户名密码提取的准确率。It should be noted that, directly extracting the login information, such as the user name and password, from the request direction packet may result in the login information not being extracted or the wrong login information being extracted. In the embodiment of the present application, since different login components have different login feature rules, the request direction packet can be first matched with the rules, and only after the rules are hit, the login component information is determined, and then based on the corresponding login component information The login feature rule extracts login information such as user name and password, which improves the accuracy of user name and password extraction.
需要说明的是,存在一种情况:如果Snort规则未匹配到用户名和密码,则需要尝试以Basic认证方式解析登录参数,同时匹配Basic认证的结果作为登录状态。Basic认证是一种HTTP认证方式,客户端将用户名和密码进行Base64编码后,通过Authorization头部传输到服务端进行认证。也就是说,如果采用的是Basic认证的方式,基于Snort规则进行用户名和密码提取时,有可能匹配不到用户名和密码,因为Basic认证会对用户名和密码进行Base64编码,此时就需要先进行解码,并基于Basic认证方式来进行登录认证。It should be noted that there is a situation: if the Snort rule does not match the username and password, you need to try to parse the login parameters in Basic authentication mode, and match the result of Basic authentication as the login status. Basic authentication is an HTTP authentication method. The client base64 encodes the user name and password, and transmits it to the server through the Authorization header for authentication. That is to say, if the Basic authentication method is used, the user name and password may not be matched when the user name and password are extracted based on Snort rules, because Basic authentication will Base64 encode the user name and password. Decode, and perform login authentication based on the Basic authentication method.
S3014:缓存用户名和密码。S3014: Cache the user name and password.
需要说明的是,在本申请实施例中,在提取出来用户名和密码之后,可以将用户名和密码缓存到当前链接上。可以理解的是,在登录过程中,可能同时存在很多用户在进行登录,那么后面的数据就会将前面的数据覆盖。在本实施例中,需要对登录信息进行审计,所以先将用户名和密码缓存到当前链接上,以便后续在确认登录状态后对登录信息进行审计。It should be noted that, in this embodiment of the present application, after the user name and password are extracted, the user name and password may be cached on the current link. It is understandable that during the login process, there may be many users logging in at the same time, and the later data will overwrite the earlier data. In this embodiment, the login information needs to be audited, so the user name and password are first cached on the current link, so that the login information can be audited after the login status is confirmed later.
S3015:获取响应方向报文。S3015: Obtain the response direction packet.
S3016:检测登录状态。S3016: Detect the login status.
需要说明的是,在本申请实施例中,在请求方向提取到登录用户名和密码后,还需要在响应方向进行特征匹配,以获取登录状态,如果响应方向也匹配成功,说明有登录需求,就可以对登录状态进行检测,用以判断此次登录是否成功。It should be noted that, in this embodiment of the present application, after the login user name and password are extracted in the request direction, feature matching is also required in the response direction to obtain the login status. The login status can be detected to determine whether the login is successful.
S3017:判断是否登录成功。S3017: Determine whether the login is successful.
S3018:生成审计日志。S3018: Generate an audit log.
需要说明的是,在本申请实施例中,如果在请求方向提取到了正确的用户名密码,这时候表示能够成功登录,即判断结果为是,那么执行步骤S3018;否则,表示登录失败,即判断结果为否,那么返回步骤S3011。It should be noted that, in this embodiment of the present application, if the correct username and password are extracted in the request direction, it means that the login can be successfully logged in, that is, the judgment result is yes, then step S3018 is executed; otherwise, it means that the login fails, that is, the judgment is made. If the result is no, then return to step S3011.
还需要说明的是,当登录成功时,对登录信息进行审计,生成审计日志,审计日志中包括有登录成功的登录信息。所述登录信息可以包括:用户名、密码以及登录状态信息。当登录失败时,结束此次登录过程,重新执行步骤S3011。It should also be noted that when the login is successful, the login information is audited, and an audit log is generated, and the audit log includes the login information of the successful login. The login information may include: user name, password, and login status information. When the login fails, the login process is ended, and step S3011 is executed again.
需要说明的是,Snort特征匹配可能会存在误判,此处的解决方式是一次审计需要关联请求方向特征和响应方向特征。只有请求方向匹配到登录用户名和密码后,然后才在响应方向匹配/检测登录状态,两个方向都匹配上才进行审计。也就是说,存在检测到用户名和密码或者用户名和密码都正确但是并不需要登录或者响应方向不匹配的情况,只有在确定请求方向提取到了用户名和密码且响应方向确定登录状态为成功登录时,才会将检测结果记入审计日志表中。这样,只有在请求方向和响应方向都匹配成功且确定登录状态为登录成功时,才会对登录信息进行审计,提高了检出率,降低了网站的压力。It should be noted that there may be misjudgments in Snort feature matching. The solution here is that an audit needs to associate the request direction feature and the response direction feature. Only after the request direction matches the login user name and password, and then the response direction matches/detects the login status, and the audit is performed when both directions match. That is to say, there is a situation where it is detected that the user name and password or the user name and password are correct but no login is required or the response direction does not match, only when it is determined that the request direction has extracted the user name and password and the response direction determines that the login status is successful login, Only then will the detection result be recorded in the audit log table. In this way, only when the request direction and the response direction are matched successfully and the login status is determined to be successful, the login information will be audited, which improves the detection rate and reduces the pressure on the website.
如图3所示,日志处理进程302可以对应步骤S3021至S3022,具体如下:As shown in FIG. 3 , the
S3021:接收日志。S3021: Receive logs.
S3022:写入数据库。S3022: Write to the database.
需要说明的是,本步骤中,日志处理进程302主要用于审计日志的写入。也就是说,当代理进程301审计到登录成功的登录信息时,会生成审计日志,日志处理进程302接收审计日志并写入数据库。It should be noted that, in this step, the
如图3所示,日志处理进程302接收审计日志后会将审计日志存储到数据库进程303中的审计日志表中。这里,数据库进程303存储有审计日志表和安全日志表。其中,审计日志表用于记录登录成功的登录信息,安全日志表用于记录存在弱口令的登录信息。As shown in FIG. 3 , after receiving the audit log, the
需要说明的是,本申请实施例中,供离线检测进程检测的数据来自于代理进程审计出的审计日志表。在进行弱口令检测时,离线检测进程首先读取审计日志表,获取审计日志表中记录的登录信息。It should be noted that, in the embodiment of the present application, the data for the offline detection process to detect comes from the audit log table audited by the agent process. When performing weak password detection, the offline detection process first reads the audit log table and obtains the login information recorded in the audit log table.
如图3所示,离线检测进程304在从数据库进程303中读取了审计日志表之后,离线检测进程304主要包括以下步骤:As shown in FIG. 3, after the
S3041:拉起定时任务。S3041: Start the scheduled task.
S3042:进行弱口令检测。S3042: Perform weak password detection.
S3043:按照协议分发检测函数。S3043: Distribute the detection function according to the protocol.
需要说明的是,在本申请实施例中,离线检测进程会被定时拉起,完成弱口令检测。例如:每小时检测一次或者每天检测一次,本实施例对此不作具体限定。离线检测主要可以包括预处理和检测。预处理即对审计日志表中记录的登录信息进行数据筛选,采集出有用数据以便进行弱口令检测。检测即对采集到的数据进行分析检测。其中,有用的数据主要指用户名和密码,而检测通常是指弱口令检测,并且主要是针对密码进行检测。It should be noted that, in this embodiment of the present application, the offline detection process will be started periodically to complete the weak password detection. For example, the detection is performed once an hour or once a day, which is not specifically limited in this embodiment. Offline detection can mainly include preprocessing and detection. Preprocessing is to filter the login information recorded in the audit log table, and collect useful data for weak password detection. Detection is the analysis and detection of the collected data. Among them, useful data mainly refers to user names and passwords, and detection usually refers to weak password detection, and mainly detects passwords.
还需要说明的是,在本申请实施例中,对密码进行检测的检测策略可以包括两类:内置弱口令检测策略和预定义弱口令检测策略。内置弱口令检测策略可以是系统预置的,而预定义弱口令检测策略可以是由用户进行设置的。It should also be noted that, in this embodiment of the present application, detection strategies for detecting passwords may include two types: built-in weak password detection strategies and predefined weak password detection strategies. The built-in weak password detection strategy can be preset by the system, and the predefined weak password detection strategy can be set by the user.
其中,所述内置检测策略可以包括:内置口令长度检测策略、内置字符种类检测策略和常见组件弱口令字典匹配检测策略等。其实现过程的描述与上一实施例类似,此处不再赘述。The built-in detection strategy may include: a built-in password length detection strategy, a built-in character type detection strategy, a weak password dictionary matching detection strategy for common components, and the like. The description of the implementation process is similar to that of the previous embodiment, and details are not repeated here.
预定义弱口令检测策略可以包括:预设口令长度检测策略、预设字符种类检测策略和预设弱口令字典匹配检测策略等。其实现过程的描述与上一实施例类似,此处不再赘述。The predefined weak password detection strategy may include: a preset password length detection strategy, a preset character type detection strategy, a preset weak password dictionary matching detection strategy, and the like. The description of the implementation process is similar to that of the previous embodiment, and details are not repeated here.
这样,基于预设的检测策略,对登录成功的密码信息进行弱口令检测。需要说明的是,在检测的时候不同的协议可能需要采用不同的检测函数,所以需要按协议分发检测函数,在本申请实施例中,可以分为其它协议和HTTP协议;如果采用HTTP协议,那么就进行HTTP检测;如果采用其它协议,就进行其它协议检测,例如SMD协议检测、RDP协议检测等。In this way, based on the preset detection strategy, weak password detection is performed on the password information that is successfully logged in. It should be noted that different protocols may need to use different detection functions during detection, so the detection functions need to be distributed according to the protocol. In the embodiment of the present application, it can be divided into other protocols and HTTP protocols; HTTP detection is performed; if other protocols are used, other protocol detection is performed, such as SMD protocol detection, RDP protocol detection, and the like.
另外,离线检测还可以支持对特权账号的识别,例如root账号和admin账号。由于特权账号不同于普通账号,往往具有更高的权限,如果特权账号存在弱口令并被破解,往往会带来更多的麻烦和损失。离线检测环节在进行弱口令检测时,还会进行特权账号的识别,识别的方法可以为:对用户名进行识别,特权账号的登录名root、admin等,也包括用户指定的特权账号。这样,如果离线检测识别到了可能为特权账号的用户名,且该用户名对应的密码为弱口令时,就将存在弱口令的特权账号在安全日志中进行标记或者单独展示,或者以其它方式与普通账号进行区分,本实施例不作具体限定。In addition, offline detection can also support the identification of privileged accounts, such as the root account and the admin account. Because privileged accounts are different from ordinary accounts, they often have higher authority. If a privileged account has a weak password and is cracked, it will often bring more trouble and loss. In the offline detection process, when the weak password is detected, the privileged account will also be identified. The identification method can be: identifying the user name, the login name of the privileged account, such as root, admin, etc., and also including the privileged account specified by the user. In this way, if the offline detection identifies a user name that may be a privileged account, and the password corresponding to the user name is a weak password, the privileged account with the weak password will be marked in the security log or displayed separately, or in other ways with the Common accounts are distinguished, which is not specifically limited in this embodiment.
S3044:生成安全日志。S3044: Generate a security log.
需要说明的是,在本申请实施例中,当检测出弱口令时,根据检测结果生成安全日志。其中,安全日志可以包括检测出的弱口令密码和对应的用户名。另外,当检测出弱口令时,也可以通过告警例如给管理员发送告警信息等方式提醒存在弱口令风险。It should be noted that, in this embodiment of the present application, when a weak password is detected, a security log is generated according to the detection result. The security log may include the detected weak password and the corresponding user name. In addition, when a weak password is detected, the risk of weak password may also be reminded by means of an alarm, such as sending an alarm message to an administrator.
如图3所示,日志处理进程302接收安全日志后会将安全日志存储到数据库进程303中的安全日志表中。As shown in FIG. 3 , after receiving the security log, the
也就是说,数据库进程模块303中至少包括审计日志表和安全日志表,其中,审计日志表中记录的审计日志主要包括登录成功的登录信息,审计日志用于为离线检测进程提供待检测数据。安全日志表中记录的安全日志主要包括存在弱口令的登录信息,以便管理员在查阅安全日志时,可以及时发现弱口令隐患,并做出对应处理。That is, the
本申请实施例通过对存在登录接口的常见登录组件,比如:Joomla、EYOUCMS、DedeCMS和DouPHP等提取登录特征规则,利用Snort引擎对HTTP请求和响应进行规则匹配,审计出登录信息,检测弱口令,实现了对不同登录组件的弱口令登录精准检测。同时,在扩展性方面支持:常见登录组件对应的第一特征规则库支持动态更新,非常见登录组件对应的第二特征规则库(例如内部业务登录系统、私有登录组件等)支持自定义。The embodiment of the present application extracts the login feature rules for common login components with login interfaces, such as: Joomla, EYOUCMS, DedeCMS, DouPHP, etc., uses the Snort engine to perform rule matching on HTTP requests and responses, audits login information, and detects weak passwords. Accurate detection of weak password logins for different login components is achieved. At the same time, it supports scalability: the first feature rule base corresponding to common login components supports dynamic updating, and the second feature rule base corresponding to uncommon login components (such as internal business login systems, private login components, etc.) supports customization.
通过上述实施例,对前述实施例的具体实现进行了详细阐述,可以看出:本方案在防火墙上实施检测,而防火墙环境中会有大量Web系统,存在各种各样的登录组件,本方案能很好地防护用户业务之中的登录系统。本方案内置的表示常见登录组件对应的特征规则库的第一特征规则库支持在线更新。不同登录组件可能会存在不同的登录特征,而Web系统的组件更新频繁。在线更新能降低维护成本,快速提升检测能力。本方案对于非常见的登录组件,支持用户自定义配置登录特征规则,有效覆盖用户私有业务系统场景,保护用户内网Web系统安全。本方案还支持识别特权账号,可以帮助用户在海量安全日志中快速发现重要账号的弱口令风险,有针对性地制定防护措施。Through the above embodiments, the specific implementation of the above embodiments is described in detail. It can be seen that: this solution implements detection on the firewall, and there are a large number of Web systems in the firewall environment, and there are various login components. It can well protect the login system in the user's business. The first feature rule base built in this solution, which represents the feature rule base corresponding to common login components, supports online update. Different login components may have different login characteristics, and the components of the Web system are updated frequently. Online updates can reduce maintenance costs and rapidly improve detection capabilities. For unusual login components, this solution supports user-defined configuration of login feature rules, effectively covering the user's private business system scenarios and protecting the security of the user's intranet web system. This solution also supports the identification of privileged accounts, which can help users quickly discover weak password risks of important accounts in massive security logs, and formulate protective measures in a targeted manner.
本申请的再一实施例,参见图4,其示出了本申请实施例提供的一种弱口令检测装置40的组成结构示意图。如图4所示,所述弱口令检测装置40可以包括:接收单元401、确定单元402、提取单元403和检测单元404;其中,For yet another embodiment of the present application, see FIG. 4 , which shows a schematic structural diagram of a weak
接收单元401,配置为接收登录请求信息;A receiving
确定单元402,配置为确定所述登录请求信息对应的登录特征规则;A determining
提取单元403,配置为基于所述登录特征规则,从所述登录请求信息中提取登录信息;
检测单元404,配置为在检测到登录状态为成功登录的情况下,对所述登录信息进行弱口令检测,以确定所述登录信息中是否存在弱口令。The
在一些实施例中,确定单元402,还配置为利用预设识别规则对所述登录请求信息进行识别,确定待登录组件信息;以及基于所述待登录组件信息,从预设规则库中确定所述待登录组件信息对应的所述登录特征规则;其中,所述预设规则库包括多种登录组件信息以及所述多种登录组件信息各自对应的登录特征规则。In some embodiments, the determining
在一些实施例中,确定单元402,还配置为将所述待登录组件信息与所述预设规则库进行特征匹配;以及根据匹配结果,从所述预设规则库中确定所述登录特征规则。In some embodiments, the determining
在一些实施例中,所述预设识别规则包括Snort规则。In some embodiments, the preset identification rules include Snort rules.
在一些实施例中,所述预设规则库还包括第一特征规则库和第二特征规则库;其中,所述第一特征规则库表示常见登录组件对应的特征规则库,所述第二特征规则库表示非常见登录组件对应的预定义配置的特征规则库。In some embodiments, the preset rule base further includes a first feature rule base and a second feature rule base; wherein the first feature rule base represents a feature rule base corresponding to common login components, and the second feature rule base The rule base represents the pre-configured feature rule base corresponding to the uncommon login components.
在一些实施例中,参见图5,所述弱口令检测装置40还可以包括更新单元405,配置为对所述第一特征规则库进行在线更新。In some embodiments, referring to FIG. 5 , the weak
在一些实施例中,参见图5,所述弱口令检测装置40还可以包括存储单元406,配置为若确定所述登录信息中存在弱口令,则将所述登录信息以安全日志格式存储到预设安全日志表。In some embodiments, referring to FIG. 5 , the weak
在一些实施例中,存储单元406,还配置为在检测到登录状态为成功登录的情况下,将所述登录信息写入审计日志表中;In some embodiments, the
所述检测单元404,还配置为启动离线检测进程;从所述审计日志表中获取所述登录信息,利用预设检测策略对所述登录信息进行弱口令检测。The
在一些实施例中,所述登录信息包括用户名和密码,检测单元404,还配置为对所述登录信息进行特权账号识别,确定所述用户名是否为特权账号。In some embodiments, the login information includes a user name and a password, and the
在一些实施例中,检测单元404,还配置为当确定所述用户名为特权账号时,若检测到所述密码为弱口令,则将所述用户名和所述密码在预设安全日志表中进行标记。In some embodiments, the
在一些实施例中,所述内置弱口令检测策略至少包括下述一项:内置口令长度检测策略、内置字符种类检测策略和常见组件弱口令字典匹配检测策略;所述预定义弱口令检测策略至少包括下述一项:预设口令长度检测策略、预设字符种类检测策略和预设弱口令字典匹配检测策略。In some embodiments, the built-in weak password detection strategy includes at least one of the following: a built-in password length detection strategy, a built-in character type detection strategy, and a common component weak password dictionary matching detection strategy; the predefined weak password detection strategy at least It includes one of the following: a preset password length detection strategy, a preset character type detection strategy, and a preset weak password dictionary matching detection strategy.
在一些实施例中,参见图5,所述弱口令检测装置40还可以包括预警单元407,配置为若确定所述登录信息中存在弱口令,则发送预警信息;其中,所述预警信息用于提示用户所述登录信息存在弱口令风险。In some embodiments, referring to FIG. 5 , the weak
可以理解地,在本实施例中,“单元”可以是部分电路、部分处理器、部分程序或软件等等,当然也可以是模块,还可以是非模块化的。而且在本实施例中的各组成部分可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。It can be understood that, in this embodiment, a "unit" may be a part of a circuit, a part of a processor, a part of a program or software, etc., of course, it may also be a module, and it may also be non-modular. Moreover, each component in this embodiment may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit. The above-mentioned integrated units can be implemented in the form of hardware, or can be implemented in the form of software function modules.
所述集成的单元如果以软件功能模块的形式实现并非作为独立的产品进行销售或使用时,可以存储在一个计算机可读取存储介质中,基于这样的理解,本实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或processor(处理器)执行本实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。If the integrated unit is implemented in the form of a software functional module and is not sold or used as an independent product, it can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of this embodiment is essentially or The part that contributes to the prior art or the whole or part of the technical solution can be embodied in the form of a software product, the computer software product is stored in a storage medium, and includes several instructions for making a computer device (which can be It is a personal computer, a server, or a network device, etc.) or a processor (processor) that executes all or part of the steps of the method described in this embodiment. The aforementioned storage medium includes: U disk, removable hard disk, Read Only Memory (ROM), Random Access Memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program codes.
因此,本实施例提供了一种计算机存储介质,该计算机存储介质存储有弱口令检测程序,所述弱口令检测程序被至少一个处理器执行时实现前述实施例中任一项所述的方法的步骤。Therefore, this embodiment provides a computer storage medium, where the computer storage medium stores a weak password detection program, and when the weak password detection program is executed by at least one processor, implements the method described in any one of the foregoing embodiments. step.
基于上述的一种弱口令检测装置40的组成以及计算机存储介质,参见图6,其示出了本申请实施例提供的一种弱口令检测装置40的具体硬件结构示意图。如图6所示,可以包括:通信接口501、存储器502和处理器503;各个组件通过总线系统504耦合在一起。可理解,总线系统504用于实现这些组件之间的连接通信。总线系统504除包括数据总线之外,还包括电源总线、控制总线和状态信号总线。但是为了清楚说明起见,在图6中将各种总线都标为总线系统504。其中,通信接口501,用于在与其他外部网元之间进行收发信息过程中,信号的接收和发送;Based on the above-mentioned composition of a weak
存储器502,用于存储能够在处理器503上运行的计算机程序;a
处理器503,用于在运行所述计算机程序时,执行:The
接收登录请求信息;Receive login request information;
确定所述登录请求信息对应的登录特征规则;determining the login feature rule corresponding to the login request information;
基于所述登录特征规则,从所述登录请求信息中提取登录信息;extracting login information from the login request information based on the login feature rule;
在检测到登录状态为成功登录的情况下,对所述登录信息进行弱口令检测,以确定所述登录信息中是否存在弱口令。When it is detected that the login status is successful login, weak password detection is performed on the login information to determine whether there is a weak password in the login information.
可以理解,本申请实施例中的存储器502可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data RateSDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步链动态随机存取存储器(Synchronous link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本文描述的系统和方法的存储器502旨在包括但不限于这些和任意其它适合类型的存储器。It can be understood that the
而处理器503可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器503中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器503可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器502,处理器503读取存储器502中的信息,结合其硬件完成上述方法的步骤。The
可以理解的是,本文描述的这些实施例可以用硬件、软件、固件、中间件、微码或其组合来实现。对于硬件实现,处理单元可以实现在一个或多个专用集成电路(ApplicationSpecific Integrated Circuits,ASIC)、数字信号处理器(Digital Signal Processing,DSP)、数字信号处理设备(DSP Device,DSPD)、可编程逻辑设备(Programmable LogicDevice,PLD)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)、通用处理器、控制器、微控制器、微处理器、用于执行本申请所述功能的其它电子单元或其组合中。It will be appreciated that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or a combination thereof. For hardware implementation, the processing unit may be implemented in one or more Application Specific Integrated Circuits (ASIC), Digital Signal Processing (DSP), Digital Signal Processing Device (DSP Device, DSPD), programmable logic Devices (Programmable Logic Device, PLD), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA), general purpose processors, controllers, microcontrollers, microprocessors, other electronic units for performing the functions described in this application or a combination thereof.
对于软件实现,可通过执行本文所述功能的模块(例如过程、函数等)来实现本文所述的技术。软件代码可存储在存储器中并通过处理器执行。存储器可以在处理器中或在处理器外部实现。For a software implementation, the techniques described herein may be implemented through modules (eg, procedures, functions, etc.) that perform the functions described herein. Software codes may be stored in memory and executed by a processor. The memory can be implemented in the processor or external to the processor.
可选地,作为另一个实施例,处理器503还配置为在运行所述计算机程序时,执行前述实施例中任一项所述的方法的步骤。Optionally, as another embodiment, the
基于上述弱口令检测装置40的组成以及硬件结构示意图,参见图7,其示出了本申请实施例提供的一种检测设备60的组成结构示意图。如图7所示,该检测设备60至少包括前述实施例中任一项所述的弱口令检测装置40。Based on the composition and hardware structure diagram of the weak
对于检测设备60而言,由于在接收登录请求信息后,通过确定登录请求信息对应的登录特征规则,从而可以准确识别不同登录组件对应的特征规则,也就能够准确提取待检测的登录信息,进而在对该登录信息进行弱口令检测时,能够准确识别多种登录组件下的弱口令,提高了弱口令的检出率,同时降低了弱口令的误判率。For the
以上所述,仅为本申请的较佳实施例而已,并非用于限定本申请的保护范围。The above descriptions are only preferred embodiments of the present application, and are not intended to limit the protection scope of the present application.
需要说明的是,在本申请中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。It should be noted that, in this application, the terms "comprising", "comprising" or any other variation thereof are intended to encompass non-exclusive inclusion, such that a process, method, article or device comprising a series of elements includes not only those elements , but also other elements not expressly listed or inherent to such a process, method, article or apparatus. Without further limitation, an element qualified by the phrase "comprising a..." does not preclude the presence of additional identical elements in a process, method, article or apparatus that includes the element.
上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。The above-mentioned serial numbers of the embodiments of the present application are only for description, and do not represent the advantages or disadvantages of the embodiments.
本申请所提供的几个方法实施例中所揭露的方法,在不冲突的情况下可以任意组合,得到新的方法实施例。The methods disclosed in the several method embodiments provided in this application can be arbitrarily combined under the condition of no conflict to obtain new method embodiments.
本申请所提供的几个产品实施例中所揭露的特征,在不冲突的情况下可以任意组合,得到新的产品实施例。The features disclosed in the several product embodiments provided in this application can be combined arbitrarily without conflict to obtain a new product embodiment.
本申请所提供的几个方法或设备实施例中所揭露的特征,在不冲突的情况下可以任意组合,得到新的方法实施例或设备实施例。The features disclosed in several method or device embodiments provided in this application can be combined arbitrarily without conflict to obtain new method embodiments or device embodiments.
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。The above are only specific embodiments of the present application, but the protection scope of the present application is not limited to this. should be covered within the scope of protection of this application. Therefore, the protection scope of the present application should be subject to the protection scope of the claims.
Claims (15)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110013122.4A CN112613029A (en) | 2021-01-06 | 2021-01-06 | Weak password detection method and device, computer storage medium and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110013122.4A CN112613029A (en) | 2021-01-06 | 2021-01-06 | Weak password detection method and device, computer storage medium and equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112613029A true CN112613029A (en) | 2021-04-06 |
Family
ID=75254004
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110013122.4A Pending CN112613029A (en) | 2021-01-06 | 2021-01-06 | Weak password detection method and device, computer storage medium and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112613029A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113852637A (en) * | 2021-09-28 | 2021-12-28 | 全球能源互联网研究院有限公司 | Weak password detection method and device and electronic equipment |
CN113852625A (en) * | 2021-09-23 | 2021-12-28 | 杭州安恒信息技术股份有限公司 | A weak password monitoring method, device, equipment and storage medium |
CN114006773A (en) * | 2021-12-31 | 2022-02-01 | 北京微步在线科技有限公司 | Weak password judgment method, device, equipment and storage medium |
CN114417314A (en) * | 2021-12-07 | 2022-04-29 | 深信服科技股份有限公司 | Alarm information analysis method and device, electronic equipment and storage medium |
CN114553561A (en) * | 2022-02-25 | 2022-05-27 | 北京华云安信息技术有限公司 | Weak password efficient detection method and device, electronic equipment and storage medium |
CN114978745A (en) * | 2022-06-09 | 2022-08-30 | 奇安信科技集团股份有限公司 | Password auditing method, apparatus, electronic device, and computer-readable storage medium |
CN116611046A (en) * | 2023-06-05 | 2023-08-18 | 武汉思普崚技术有限公司 | Method, device and system for processing weak password based on SOAR |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103701805A (en) * | 2013-12-26 | 2014-04-02 | 山石网科通信技术有限公司 | Method and device for detecting weak password in network |
CN107196899A (en) * | 2017-03-21 | 2017-09-22 | 北京神州泰岳软件股份有限公司 | Equipment weak passwurd management method and device |
CN107679397A (en) * | 2017-10-23 | 2018-02-09 | 郑州云海信息技术有限公司 | The weak passwurd detecting system and method for a kind of Linux system |
CN109361518A (en) * | 2018-10-16 | 2019-02-19 | 杭州安恒信息技术股份有限公司 | A kind of weak passwurd detection method, device and computer readable storage medium |
CN109471865A (en) * | 2018-11-06 | 2019-03-15 | 用友网络科技股份有限公司 | A kind of off-line data management method, system, server and storage medium |
CN109583199A (en) * | 2018-12-18 | 2019-04-05 | 郑州云海信息技术有限公司 | A kind of access auditing method, system, equipment and the medium of storage management system |
CN110365637A (en) * | 2019-05-27 | 2019-10-22 | 平安银行股份有限公司 | Internetbank login detecting method, device, electronic equipment and storage medium |
CN111385272A (en) * | 2018-12-29 | 2020-07-07 | 北京奇虎科技有限公司 | Method and device for detecting weak password |
CN111447204A (en) * | 2020-03-24 | 2020-07-24 | 深信服科技股份有限公司 | Weak password detection method, device, equipment and medium |
CN112163215A (en) * | 2020-10-14 | 2021-01-01 | 杭州安恒信息技术股份有限公司 | Weak password detection method and device and computer equipment |
-
2021
- 2021-01-06 CN CN202110013122.4A patent/CN112613029A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103701805A (en) * | 2013-12-26 | 2014-04-02 | 山石网科通信技术有限公司 | Method and device for detecting weak password in network |
CN107196899A (en) * | 2017-03-21 | 2017-09-22 | 北京神州泰岳软件股份有限公司 | Equipment weak passwurd management method and device |
CN107679397A (en) * | 2017-10-23 | 2018-02-09 | 郑州云海信息技术有限公司 | The weak passwurd detecting system and method for a kind of Linux system |
CN109361518A (en) * | 2018-10-16 | 2019-02-19 | 杭州安恒信息技术股份有限公司 | A kind of weak passwurd detection method, device and computer readable storage medium |
CN109471865A (en) * | 2018-11-06 | 2019-03-15 | 用友网络科技股份有限公司 | A kind of off-line data management method, system, server and storage medium |
CN109583199A (en) * | 2018-12-18 | 2019-04-05 | 郑州云海信息技术有限公司 | A kind of access auditing method, system, equipment and the medium of storage management system |
CN111385272A (en) * | 2018-12-29 | 2020-07-07 | 北京奇虎科技有限公司 | Method and device for detecting weak password |
CN110365637A (en) * | 2019-05-27 | 2019-10-22 | 平安银行股份有限公司 | Internetbank login detecting method, device, electronic equipment and storage medium |
CN111447204A (en) * | 2020-03-24 | 2020-07-24 | 深信服科技股份有限公司 | Weak password detection method, device, equipment and medium |
CN112163215A (en) * | 2020-10-14 | 2021-01-01 | 杭州安恒信息技术股份有限公司 | Weak password detection method and device and computer equipment |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113852625A (en) * | 2021-09-23 | 2021-12-28 | 杭州安恒信息技术股份有限公司 | A weak password monitoring method, device, equipment and storage medium |
CN113852625B (en) * | 2021-09-23 | 2024-04-30 | 杭州安恒信息技术股份有限公司 | A weak password monitoring method, device, equipment and storage medium |
CN113852637A (en) * | 2021-09-28 | 2021-12-28 | 全球能源互联网研究院有限公司 | Weak password detection method and device and electronic equipment |
CN114417314A (en) * | 2021-12-07 | 2022-04-29 | 深信服科技股份有限公司 | Alarm information analysis method and device, electronic equipment and storage medium |
CN114006773A (en) * | 2021-12-31 | 2022-02-01 | 北京微步在线科技有限公司 | Weak password judgment method, device, equipment and storage medium |
CN114553561A (en) * | 2022-02-25 | 2022-05-27 | 北京华云安信息技术有限公司 | Weak password efficient detection method and device, electronic equipment and storage medium |
CN114553561B (en) * | 2022-02-25 | 2023-12-15 | 北京华云安信息技术有限公司 | Weak password efficient detection method and device, electronic equipment and storage medium |
CN114978745A (en) * | 2022-06-09 | 2022-08-30 | 奇安信科技集团股份有限公司 | Password auditing method, apparatus, electronic device, and computer-readable storage medium |
CN116611046A (en) * | 2023-06-05 | 2023-08-18 | 武汉思普崚技术有限公司 | Method, device and system for processing weak password based on SOAR |
CN116611046B (en) * | 2023-06-05 | 2024-04-09 | 武汉思普崚技术有限公司 | Method, device and system for processing weak password based on SOAR |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112613029A (en) | Weak password detection method and device, computer storage medium and equipment | |
Baloch | Ethical hacking and penetration testing guide | |
Thomas et al. | Data breaches, phishing, or malware? Understanding the risks of stolen credentials | |
US7752662B2 (en) | Method and apparatus for high-speed detection and blocking of zero day worm attacks | |
US9009829B2 (en) | Methods, systems, and media for baiting inside attackers | |
US10721271B2 (en) | System and method for detecting phishing web pages | |
US20210344693A1 (en) | URL risk analysis using heuristics and scanning | |
US20080028444A1 (en) | Secure web site authentication using web site characteristics, secure user credentials and private browser | |
CN111651757A (en) | Monitoring method, device, device and storage medium for attack behavior | |
US9973525B1 (en) | Systems and methods for determining the risk of information leaks from cloud-based services | |
CN101816148A (en) | System and method for authentication, data transfer and protection against phishing | |
CN103634317A (en) | Method and system of performing safety appraisal on malicious web site information on basis of cloud safety | |
US10341382B2 (en) | System and method for filtering electronic messages | |
CN105306467B (en) | The analysis method and device that web data is distorted | |
CN111131221A (en) | Interface checking device, method and storage medium | |
Akram et al. | How to build a vulnerability benchmark to overcome cyber security attacks | |
CN105354494A (en) | Detection method and apparatus for web page data tampering | |
Spett | Cross-site scripting | |
Franken et al. | Exposing cookie policy flaws through an extensive evaluation of browsers and their extensions | |
WO2018018699A1 (en) | Website scripting attack prevention method and device | |
CN113852625B (en) | A weak password monitoring method, device, equipment and storage medium | |
US8266704B1 (en) | Method and apparatus for securing sensitive data from misappropriation by malicious software | |
WO2020000753A1 (en) | Device security monitoring method and apparatus | |
Rousmaniere et al. | Internet security for clinical supervisors | |
Saračević et al. | Some specific examples of attacks on information systems and smart cities applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210406 |