这个步骤的目标是以一种特殊方式格式化有效负载,以便它能躲避壁垒森严的入侵探测系统(IDSs)。
The goal of this step is to format the payload in such a way that it can evade entrenched intrusion-detection systems (IDSs).
入侵探测系统(IDSes)等现有的安全解决方案不了解探测不正当活动所需的数据库协议和结构。
Existing security solutions, such as intrusion detection systems (IDSes), lack the knowledge of database protocols and structures required to detect inappropriate activities.
入侵探测系统是用来探测计算机系统网络上不寻常的活动,以识别出此活动是不友好的或者未经授权的,以便能够对此入侵作出响应。
Intrusion-detection systems are used to detect unusual activity in a network of computer systems, to identify that activity as unfriendly or unauthorized and to enable a response to that intrusion.
入侵探测系统是用来探测计算机系统网络上不寻常的活动,以识别出此活动是不友好的或者未经授权的,以便能够对此入侵作出响应。
Intrusion-detection systems are used to detect unusual activity in a network of computer systems, to identify that activity as unfriendly or unauthorized and to enable a response to that intrusion.
应用推荐