以下是脚本kiddy经常使用的攻击过程。
Here's the typical attack process that a script kiddie USES.
CSRF攻击过程中的请求和响应的序列如 图1 所示。
The sequence of requests and responses during a CSRF attack is illustrated in Figure 1.
十几岁的青少年可以成为父母和青少年的情感攻击过程。
The teenage years can be an emotional assault course for parents and teenagers.
虽然在攻击过程中CPU使用率达到33%,但它并没有完全耗尽。
Although CPU use is up to 33% during the attack, it is not completely exhausted.
针对事后入侵响应,提出了一种基于引理推理的攻击过程分析方法。
Based on abduction inference, a method of network attack process analysis for incident response was designed.
这些攻击甚至提供它们自己的匹配工作负载,以便攻击过程更加容易。
These exploits even come with their own matching payloads to make the process that much easier.
如果保持存储量不变,改进的攻击过程需要大约2127次加密运算。
When the same memory is used as GilbertMinier's attack, the time complexity is about 2127 encryption operations.
渗透测试模型是渗透测试的关键技术,但现有的渗透测试模型难以模拟网络攻击过程。
Penetration testing has important actual application value for network security, as a kind of new technique keeping away network security.
信息攻击过程主要通过影响信息传输子系统和指挥控制子系统来影响整个作战系统效能。
Information attack impacts on whole combat effectiveness mostly by impacting on information transmission and command control subsystem.
在一个CSRF攻击过程中,请求源自一个入侵的第三方站点并通过一个已验证的浏览器页面传递到服务器。
During a CSRF attack, requests originate from an intruding third-party site and are passed through an authenticated browser page to the server.
在CSRF攻击过程中,请求来自一个入侵者站点,然后通过一个经过验证的浏览器页面传输到服务器。
During a CSRF attack, requests originate from an intruder site and are transmitted through an authenticated browser page to the server.
研究表明,入侵场景可提供较高层次的抽象来表示攻击过程,但是已有研究方法均无法在线生成入侵场景。
Researchers use intrusion scenarios to describe complicated attack procedures at a high abstract level, while, to our best knowledge, none is able to produce the scenarios online.
最后,在仿真实验中模拟了现实环境中恶意用户的攻击过程,来测试该信誉模型防御SPIT攻击的性能情况。
At last, the thesis USES a simulation experiment which simulates the real environment of malicious voice attack to test the SPIT filter performance of the reputation module.
给出了一个网络攻击模型,该模型将攻击过程归纳为若干阶段,并详细地分析了黑客在各阶段所采用技术方法。
This paper presents a network attack model , which departs attack into several steps , and describes technology that hacker adopts during each attack step.
在整个攻击过程中,Twitter一直更新自己的状态博客,告诉人们Twitter的服务状态,但是没有提到API。
Throughout the attack, Twitter has updated their Status Blog with notes about the service itself, but nothing about the API.
一次完整的攻击过程通常会包括一系列单独的攻击行为,每个攻击行为是对某个系统漏洞(脆弱性)的一次利用。
A complete attack process usually includes a series of attack actions, and every attack action is a use of system vulnerability.
介绍了空战中超视距多目标攻击过程,分析了多目标攻击过程的工作时序,及火控雷达对空空导弹截获概率的影响。
The target detection model, booting attack model and using effect model of weapon are (presented) based on process analysis of the over-the-horizon (OTH) attack of the anti-ship missile.
利用漏洞对系统进行攻击成为了黑客们惯用本文针对对管理员账号口令为空这一安全漏洞,采用了一些基本的攻击方法,详细地描述了具体地攻击过程。
In this paper, we focus on the vulnerability that the administrator account and password are empty, using some basic methods of attack, describing in detail the process of attacks.
因此,通过应用告警相关方法开发入侵检测系统的协作模块,通过分析关联告警产生清晰的攻击过程描述,通过生成综合告警来减少假告警的数量提高检测效率非常必要。
So, it's necessary that apply alert correlation methods develop several IDS coordination modes to analysis alerts and build distinct attack scenarios and reduce the volume of false alerts.
当不一致的问题在项目中出现时,开发过程就变成了存储库,每个人都从中寻找为他们自己辩护或攻击其他人的东西。
When issues of noncompliance arise on a project, the development process becomes the repository to which everyone looks for defending their position or for attacking someone else's.
提及的恶性程序能很快发现并进入控制世界上工业过程的计算机组,这说明控制系统在面对这种攻击时是多么的不堪一击。
The malicious program quickly found its way into computers controlling industrial processes the world over, demonstrating how vulnerable control systems are to such attacks.
一旦攻击开始,网站可以尝试追踪突发洪水般的流量找到源计算机并对此加以过滤,但这是一个复杂的过程。
Once the attack begins, websites can try to trace the sudden flood of traffic back to the source computer and filter it out, but even that's a complex process.
这个过程应该适用于大多数攻击和工作负载。
This process should apply to running most exploits and payload deliveries.
我们联合追求的过程并非是一种生硬攻击,而是多样化的多管齐下的方式。
The course we are jointly pursuing is not a blunt assault, but a diversified multi-pronged approach.
所有生物组织中的DNA都处于被高度活跃的化学物质和辐射的不停攻击之下,而且DNA复制过程中经常出错。
The DNA in all organisms is under constant attack from highly reactive chemicals and radiation, and errors are often made when it is copied.
美国国防部官员否认有关报导,这些报导说,巴基斯坦军人星期天晚上向两架据称在攻击一个激进分子基地过程中侵犯了巴基斯坦领空的美国直升机射击。
Pentagon officials deny news reports that Pakistani soldiers fired at two U.S. helicopters late Sunday for allegedly violating Pakistan's airspace in a suspected attack on a militant base.
航母空中军事行动在所有海军军事行动中最具挑战性和最为苛刻的——之所以这样说,是因为我曾亲眼目睹了林肯号攻击航母上飞机着陆和弹射起飞的过程。
Carrier air operations are the most challenging and demanding of all naval operations — as I saw firsthand when landing and was catapulted off the attack carrier USS Abraham Lincoln.
相反,每只动物都是在遵循数千年在对此饿狼攻击的过程中所培养出来的简单法则。
Instead each animal was following simple rules evolved over thousands of years of Wolf attacks.
在胸腺里T细胞必须经过淘汰的过程,才能阻止有可能攻击自身组织(这些组织细胞表面表达的是自身蛋白)的T细胞发育成熟。
There they undergo a selection process designed to weed out cells that might attack the body’s own cells (which display pieces of human proteins on their surface).
LMHash容易被此类攻击攻破,是因为它没有使用现今常用的给加密过程引入“salt”的方式。
LM Hash is vulnerable to this type of attack because it does not use today's common method of introducing "salt" to the encryption process.
应用推荐