攻击者可以 - 翻译成英语

an adversary may
an attacker may
an attacker could
the adversary can
对手 可以
对手 可能 会
攻击 者 可以

在 中文 中使用 攻击者可以 的示例及其翻译为 英语

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
通过提交合适的有效payload,攻击者可以使应用程序服务器来攻击可以与之交互的其他系统。
By submitting suitable payloads, an attacker can cause the application server to attack other systems that it can interact with.
在该技术的另一个变体中,攻击者可以使用合法实用程序的重命名副本,例如rundll32.exe。
In another variation of this technique, an adversary may use a renamed copy of a legitimate utility, such as rundll32. exe.
攻击者可以使用谷歌电子表格不断要求受害者网站提供存储在缓存中的图像或PDF。
An attacker can use Google Spreadsheets to continuously ask the victim website to provide an image or PDF stored in the cache.
然后,攻击者可以声称他们忘记了密码以便更改域名注册。
The adversary can then claim that they forgot their password in order to make changes to the domain registration.
使用过时的软件,攻击者可以利用漏洞与这些设备相关的风险增加。
Using outdated software increases the risk that an attacker may exploit vulnerabilities associated with these devices.
攻击者可以利用现有的RAT,修改现有的RAT或创建自己的RAT。
An adversary may utilize existing RATs, modify existing RATs, or create their own RAT.
对于最坏的情况,假设攻击者可以促使您的服务器读取任意文件(这是一个目录遍历漏洞)。
For a worst-case scenario, suppose an attacker can convince your server to read an arbitrary file(this is a directory traversal vulnerability).
攻击者可以以固定大小的块而不是整个文件来窃取数据,或者将数据包大小限制在特定阈值内。
An adversary may exfiltrate data in fixed size chunks instead of whole files or limit packet sizes below certain thresholds.
要利用此漏洞,攻击者可以手工创建一个特殊的文档文件,然后说服用户打开它。
To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it.
使用此漏洞,攻击者可以访问未经授权的内部对象,可以修改数据或破坏应用程序。
Using this vulnerability, an attacker can gain access to unauthorized internal objects, can modify data or compromise the application.
反过来,这最终可能导致攻击者可以访问数据或更糟的是劫持电话的情况。
This, in turn, could eventually lead to situations where an attacker could gain access to data or, worse, hijack the phone.
成功利用此漏洞的攻击者可以执行脚本或内容注入攻击,并企图欺骗用户泄漏敏感信息。
An attacker can exploit this vulnerability to perform script or content injection attacks, and attempt to trick the user into disclosing sensitive information.
攻击者可以通过将精心制作的数据包发送到设备上可到达的IP地址上的端口UDP496来利用此漏洞。
An attacker could exploit this vulnerability by sending crafted packets to port UDP 496 on a reachable IP address on the device.
攻击者可以利用这个问题绕过某些安全限制,并通过利用应用程序中的另一个漏洞执行任意代码。
An attacker can leverage this issue to bypass certain security restrictions and execute arbitrary code by exploiting another vulnerability in the application.
攻击者可以伪造RIP数据包,宣称其主机“X”拥有最快的连接网络外部的路径。
An attacker could forge a RIP packet, claiming his host"X" has the fastest path out of the network.
对于新版本的CSS(层叠样式表),攻击者可以控制你能够看见的CSS增强网页的要素。
With the new version of Cascading Style Sheets(CSS), an attacker can control what elements of a CSS-enhanced page you can see.
在传统的银行系统中,网络攻击者可以渗入中央数据库并访问用户的账号和货币余额。
In a traditional banking system, an attacker could infiltrate a central database and gain access to your account numbers and balances.
根据服务器对损坏消息的回复,攻击者可以逐步得出关于加密内容的更好和更好的结论。
Based on the server's replies to the corrupted message, an attacker can gradually draw better and better conclusions about the encrypted contents.
如果攻击者可以取下足够的发电站,将导致大量停电,可能需要数天才能恢复。
If an attacker could take down enough power stations, it could result in a massive power outage that could take several days to recover from.”.
如果攻击者可以取下足够的发电站,将导致大量停电,可能需要数天才能恢复。
If an attacker can take down enough power stations, it will result in a massive power outage that could take days to recover from.
结果: 375, 时间: 0.0226

单词翻译

顶级字典查询

中文 - 英语