The format of the command you use to run an exploit is.
运行攻击的命令的格式是。
To use Metasploit to run an exploit, perform the following steps.
要使用Metasploit运行一个攻击,执行以下步骤。
An exploit is a program that demonstrates or exploits the vulnerability.
漏洞利用(exloit)是一个揭示或利用安全性漏洞的程序。
The potential damage from such an exploit depends on the script that is executed.
这类擅用攻击的潜在损害程度取决于指令码所执行的内容。
Subsequently, the aim is to detect a malware that is using an exploit or vulnerability.
随后,目的是检测恶意软件,使用的是漏洞或弱点。
This yields a richer feature set that an AT can exploit than the set that MSAA provides.
这生成了AT 所利用的比MSAA 所提供的更丰富的特性集。
Choose an exploit to use against your target system. Three commands are available for this purpose.
选择一个针对目标系统的攻击,这涉及三个命令。
And their incentive to write an exploit has much more to do with bravado and bragging rights than money.
他们写(漏洞)利用程序的动机虚张声势和自夸胜于金钱。
An exploit often needs to reference absolute memory locations: an address on the stack, the address for a library function, etc.
这是一种攻击往往需要引用绝对内存地址在栈上的地址,库函数的地址,等等。
RealNetworks said it has received no reports of systems actually hit with an exploit, but it still urged users to update as soon as possible.
该公司还表示它至今没有受到利用这些漏洞的攻击,但是仍然希望用户可以尽可能的更新。
So if Obama can exploit this triumph to justify an accelerated disengagement, he'll reap the maximum benefits from this otherwise modest victory.
那麽如果奥巴马能利用这次凯旋来把加速跑偏的重心扳回正轨,他将从这次某种方面来说是“谦让的胜利”中获益匪浅。
In order to minimize the possibility of such an exploit, the script always checks to determine if the E-mail is being sent to an acceptable address.
为了将这种威胁降至最低,脚本通常会检查要发送的电子邮件地址是否是一个可到达的地址。
This isn't the first time Microsoft has asked people to voluntarily upgrade, but it is the first time that it's been in response to an exploit or vulnerability.
这不是微软第一次建议用户自愿升级,但是这是第一次作为对某个事件或者漏洞的回应而建议用户升级。
Three exploits followed: an attack on Microsoft Word, an exploit for Microsoft's animated cursor vulnerability and the Slammer worm, which exploited a flaw in Microsoft's SQL database engine.
最后是三个漏洞:一个是攻击MicrosoftWord的,一个是利用Microsoft's animated cursor vulnerability漏洞的,最后是利用Microsoft's SQL数据库引擎漏洞的Slammer worm蠕虫。
The strongest motivation for the DUMAND project is that it will exploit an important source of information about the universe.
DUMAND 计划最强烈的动机是它将开发一个关于宇宙的重要信息来源。
Aesthetic particulars produced by the highly creative artist extend or exploit, in an innovative way, the limits of an existing form, rather than transcend that form.
极具创造力的艺术家所创造的美学细节,以一种创新的方式,扩展或利用了一种现有形式的局限,而不是超越那种形式。
An ancestral species might have adapted to exploit a particular ecological niche on one island and then traveled over water to colonize other islands.
一个原始物种可能已经适应了利用一个岛屿上特定的生态位,然后在水上迁徙到其他岛屿定居。
These adaptations allowed an increasing diversity of plant forms to exploit dry land.
这些适应机制保证了植物形态多样性的不断增加,以便它们开拓干旱的陆地。
Implementers who want to exploit an abstraction such as this need to inherit from the _templated class, like in the Listing 13.
想要开发这样一个抽象,实现者需要从_ templated类继承,如清单13所示。
Along with his strength, he had an uncanny ability to spot and exploit any weakness in an opponent.
除了力大无穷外,他还有一种非同寻常的能力,那就是发现并利用对手的任何弱点。
Instead of lobbying against mobile money, Banks should see it as an exciting chance to exploit telecoms firms' vast retail networks and powerful brands to reach new customers.
不仅不应游说反对移动钱包,而应视此为一个充分利用电信企业巨大的零售网络,并发挥强大的品牌效应以争取新客户的机会。
For example using advanced best practices too early in an organization not yet able to exploit them may lead to frustration and inability to execute.
例如,在一个组织中太早使用尚不能利用的高级最佳实践可能会导致挫折和无法执行。
In most cases, if you create a list of "illegal" characters, an attacker will find a way to exploit your program.
在绝大多数情况下,如果您创建了一个“非法”字符的列表,攻击者还是可以找到利用您的程序的方法。
An attacker may be able to exploit a buffer overflow by changing the value of other data in the function; none of these approaches counter that.
攻击者也许能够通过改变函数中其他数据的值来利用缓冲区溢出;没有哪种方法能够防止这点。
Shaikh, who is imprisoned in the isolated north-western city of Urumqi, was the victim of an elaborate ruse to exploit his mental condition, say his supporters.
谢赫被关在偏僻的西北城市乌鲁木齐。支持者称,他因患有精神疾病而被利用,是一个精心策划诡计的牺牲品。
An attacker may use directory traversal and cross-site ccripting during a scan phase and then hit it with an SQL injection or an RFI in the exploit phase.
在扫描阶段,攻击者可能会利用路径遍历和跨站点脚本;在攻击阶段,黑客可能会利用SQL注入或远程文件包含进行攻击。
And Zuckerberg, once again, saw an opportunity to exploit this as well.
而扎克伯格再度看到了机会,并把这个同样加以利用。
An attacker can potentially exploit this extended processing attribute by looking for relatively short processing times.
攻击者通过查找相对简短的处理时间,有可能会利用这个延长的处理属性。
Now we have an attack vector that is wide open to exploit.
我们就得到了一个易于利用的攻击载体。
Robots are artefacts; they should not be designed to exploit vulnerable users by evoking an emotional response or dependency. It should always be possible to tell a robot from a human.
机器人也是一件人工制品;不应该通过唤起他们的情感反应或依赖性既而被设计成为会溢出漏洞的用户,必须尽可能总由人类告诉机器人要做的事。
应用推荐