只要具有可从Internet上免费获得的众多端口扫描器之一,任何人都可以轻松实现这种攻击。
This attack can be fairly easily performed with any one of a number of port scanners available freely on the Internet.
Metasploit比常规漏洞扫描器更进一步:它支持您研究自己的攻击和交付机制。
Metasploit goes a step beyond regular vulnerability scanners: it provides you the ability to develop your own exploits and delivery mechanisms.
黑客入侵的一般过程:首先,攻击者随机或者有针对性地利用扫描器去发现互联网上那些有漏洞的机器。
Hackers general process: first, the attacker random or purposeful use scanners to find the Internet those a loophole machine.
黑客入侵的一般过程:首先,攻击者随机或者有针对性地利用扫描器去发现互联网上那些有漏洞的机器。
Hackers general process: first, the attacker random or purposeful use scanners to find the Internet those a loophole machine.
应用推荐