Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Webcam weak password detecting method and system

A network camera and weak password technology, which is applied in the field of network camera weak password detection methods and systems, can solve problems such as low efficiency, poor detection effect, poor intelligence, etc., and achieves high intelligence, improved detection efficiency, and reliable detection. Effect

Active Publication Date: 2018-11-16
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of this, the object of the present invention is to provide a method and system for detecting weak passwords of network cameras, so as to alleviate the technical problems of low efficiency, poor intelligence and poor detection effect in existing methods for detecting weak passwords of network cameras

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Webcam weak password detecting method and system
  • Webcam weak password detecting method and system
  • Webcam weak password detecting method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] A method for detecting weak passwords of network cameras, refer to figure 1 , the method includes:

[0055] S102. Determine the manufacturer type of the network camera in the target network segment to be tested by means of port scanning;

[0056] Generally, most network cameras are installed with the manufacturer's own private protocol when leaving the factory, especially the equipment of Hikvision and Dahua. If the private protocol stack is not packaged, it cannot communicate with the service interface on the device. Therefore, the method of the present invention solves the problem of weak password detection of the network camera under the environment of multi-vendor coexistence under the complex network by being compatible with the private communication protocol of the manufacturer.

[0057] When performing detection, first determine the manufacturer type of the network camera in the target network to be tested by means of port scanning. The specific process will be...

Embodiment 2

[0099] A network camera weak password detection system, refer to Figure 4 , the system consists of:

[0100] Determining module 11, is used for determining the vendor type that the network camera in the target network segment to be tested belongs to by the mode of port scanning;

[0101] Judging module 12, used to judge whether private protocol communication is needed according to the manufacturer type;

[0102] The first login test module 13, if private protocol communication is required, then based on the default password dictionary of the target manufacturer, respectively adopts a private protocol and a general protocol to carry out a login test to the network camera to determine whether there is a weak password in the network camera, wherein the default password dictionary of the target manufacturer Contains the factory default password corresponding to the manufacturer type, and the preset weak password;

[0103] The first extraction module 14, if it is determined that...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a webcam weak password detecting method and system. The method comprises determining the manufacturer type of a webcam in a target network segment to be tested by using a port scanning mode; determining whether private protocol communication is required according to the manufacturer type; if so, performing login tests on the webcam by using a private protocol and a general protocol separately based on the default password dictionary of a target manufacturer in order to determine whether the webcam has a weak password; and if it is determined that the webcam has a weak password, extracting the network information and the attribute information of the webcam. The method is compatible with the manufacturer's private protocol and the general protocol, automatically completes a detection process by a program, improves detection efficiency, achieves good intellectualization degree, can quickly, accurately and reliably detect whether the webcam has a weak password, and solves the technical problem that an existing webcam weak password detecting method is low in efficiency, poor in intellectualization, and poor in detection effect.

Description

technical field [0001] The invention relates to the technical field of security detection, in particular to a method and system for detecting weak passwords of network cameras. Background technique [0002] With the popularity of network cameras, camera security and video private network security issues have increasingly attracted people's attention and attention. After researching various IoT zombie viruses and botnets that are currently popular, it is found that the main transmission method of most viruses targeting webcams is to obtain the system permissions of the camera device through weak passwords. Therefore, to solve the problem of the distribution of weak passwords for webcams is An important means of resisting IoT zombie viruses. [0003] In the prior art, when performing weak password detection on a network camera, it is generally performed manually. Specifically, open the network camera management interface, and log in through the default factory password of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F21/46H04L12/24
CPCG06F21/46H04L41/0253H04L41/28H04L63/083
Inventor 王世晋范渊吕杰黄进
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products