• 只要具有Internet上免费获得的众多端口扫描器之一任何人可以轻松实现这种攻击

    This attack can be fairly easily performed with any one of a number of port scanners available freely on the Internet.

    youdao

  • Metasploit常规漏洞扫描器更进一步支持研究自己攻击交付机制

    Metasploit goes a step beyond regular vulnerability scanners: it provides you the ability to develop your own exploits and delivery mechanisms.

    youdao

  • 黑客入侵一般过程首先攻击随机或者有针对性地利用扫描器发现互联网那些漏洞的机器

    Hackers general process: first, the attacker random or purposeful use scanners to find the Internet those a loophole machine.

    youdao

  • 黑客入侵一般过程首先攻击随机或者有针对性地利用扫描器发现互联网那些漏洞的机器

    Hackers general process: first, the attacker random or purposeful use scanners to find the Internet those a loophole machine.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定