• The attacker then sends a packet full of SACK options designed to force the other host to scan that entire queue to process each option.

    然后攻击者发送充满SACK选项目的是使方主机扫描整个队列处理每个选项

    youdao

  • To accomplish this, the attacker sends a TCP packet with the SYN flag set to the target host, just like when opening a regular TCP connection.

    实现一点,攻击者目标主机发送设置了SYN标志tcp打开常规tCP连接一样。

    youdao

  • Let's further assume that host a is located in network 192.168.2.0, and that the attacker sends the datagram to the network broadcast address of this network instead of to a particular host.

    我们进一步假设主机a位于网络192.168.2.0并且攻击者数据报发送这个网络网络广播地址而不是台特定主机。

    youdao

  • Knowing which ports are open on a host is an important first step for an attacker to deduce possible vulnerabilities to the target host.

    知道主机哪些端口打开的,对于攻击推断目标主机上可能存在的弱点重要一步

    youdao

  • Memory space breachAccomplished via stack overflow, buffer overrun, or heap error, enables execution of arbitrary code supplied by the attacker with the permissions of the host process.

    内存空间缺口——通过溢出缓冲区溢出错误来实现,以宿主进程权限执行攻击提供任何代码

    youdao

  • Knowing this, imagine that an attacker constructs an ICMP echo message containing the spoofed source address of some arbitrary Host a, such as 192.168.2.2, in its header.

    知道一点,假设攻击构造了一条IC MP回应消息头中包含伪造任意主机a地址192.168.2.2

    youdao

  • For example, if you host an online database application or e-commerce site, you can expect to be squarely in the sites of an attacker at some point.

    例如如果托管联机数据库应用程序电子商务站点,则一定成为攻击目标

    youdao

  • The ARP spoofing is one of the spoofing on the network, which allows an attacker to redirect the IP packets on a network segment of Ethernet so that he can get the trust of the target host.

    ARP协议欺骗网络欺骗行为之一使得攻击者可以重定向一个以太网IP数据报以取得目标主机信任

    youdao

  • By analyzing the networking character values actively and passively, attacker can get a lot of information about target host, such as the type of operating system.

    基于主动被动探测攻击目标分析数据网络特征可以得出攻击目标的操作系统类型重要信息,进而得出与之相关的系统漏洞,为入侵和攻击提供重要依据。

    youdao

  • By analyzing the networking character values actively and passively, attacker can get a lot of information about target host, such as the type of operating system.

    基于主动被动探测攻击目标分析数据网络特征可以得出攻击目标的操作系统类型重要信息,进而得出与之相关的系统漏洞,为入侵和攻击提供重要依据。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定