论文标题
WebCrack:基于爆破响应事件歧视的Web弱密码检测的动态词典调整
WebCrack: Dynamic Dictionary Adjustment for Web Weak Password Detection based on Blasting Response Event Discrimination
论文作者
论文摘要
页面元素,提交内容和返回信息中不同Web系统的功能多样性使得很难自动检测弱密码。为了解决此问题,提出了DBKER算法中集成的多因素相关检测方法,以实现Web弱密码和通用密码的自动检测。它根据PCFG算法生成密码词典,建议通过传统静态关键字功能和动态页面功能信息的4个步骤来判断爆炸结果。然后歧视爆破失败事件,并根据响应时间爆炸用户名。此后,根据响应失败页面提供的提示,对弱密码词典进行了动态调整。根据算法,本文实现了一个名为WebCrack的检测系统。在Dedecms和Discuz上进行了两次爆破测试的实验结果!系统以及随机的后端测试表明,所提出的方法可以检测各种Web系统的弱密码和通用密码,平均准确率约为93.75%,从而为用户的密码设置提供了强大的实用性的安全咨询。
The feature diversity of different web systems in page elements, submission contents and return information makes it difficult to detect weak password automatically. To solve this problem, multi-factor correlation detection method as integrated in the DBKER algorithm is proposed to achieve automatic detection of web weak passwords and universal passwords. It generates password dictionaries based on PCFG algorithm, proposes to judge blasting result via 4 steps with traditional static keyword features and dynamic page feature information. Then the blasting failure events are discriminated and the usernames are blasted based on response time. Thereafter the weak password dictionary is dynamically adjusted according to the hints provided by the response failure page. Based on the algorithm, this paper implements a detection system named WebCrack. Experimental results of two blasting tests on DedeCMS and Discuz! systems as well as a random backend test show that the proposed method can detect weak passwords and universal passwords of various web systems with an average accuracy rate of about 93.75%, providing security advisories for users' password settings with strong practicability.