EXPLOIT - 翻译成英语

exploit
利用
剥削
开发
开采
漏洞
的漏洞
该漏洞

在 中文 中使用 Exploit 的示例及其翻译为 英语

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
恶意软件包括1exploit(s)。
Malicious software includes 1 trojan(s), 1 exploit(s).
恶意软件包括1exploit(s)。
Malicious software includes 1 scripting exploit(s).
这要求用户打开文档或文件以便执行exploit
These require the user to open the document or file for the exploit to run.
ZNIU使用公开的exploit代码将shellcode写入vDSO并创建反向shell。
ZNIU uses public exploit code to write shellcodes to vDSO and create a reverse shell.
这段时期,涌现出了非常多的经典漏洞以及“exploit”。
During this period, a large number of classic loopholes and the“exploit” emerged.
正如所料,该exploit确实管用,我们从该服务器收集到一些旗标。
The exploit ran as expected and we were able to collect a number of basic flags from this server.
我们的EdgeLogic引擎将样本检测为“exploitCVE-2013-3346”,与前一个相同。
The sample was detected as"exploit CVE-2013-3346" by our EdgeLogic engine, same as the previous one.
我们的EdgeLogic引擎将样本检测为“exploitCVE-2013-3346”,与前一个相同。
The sample was also detected as“exploit CVE-2013-3346” by our EdgeLogic engine as the same as the previous one.
被Mimecast称为“矩阵漏洞利用”(MatrixExploit)的另一种攻击场景要比“SwitchExploit”复杂的多,因此也更难以发现和防御。
Another attack scenario, called"Matrix Exploit" by the Mimecast, is more sophisticated than the"Switch Exploit", and therefore much harder to detect and defend against.
月,网络安全专家发现基于这个漏洞的exploit已经在暗网(darknet)市场上进行公开出售,要价在$15,000美元左右。
In April, cybersecurity experts found an exploit based on this vulnerability for sale on a darknet marketplace where the seller was asking around $15,000.
这个链接看起来对访问者无害,但只要一点击,就会执行exploit_code这个JavaScript函数或攻击者提供的其他JavaScript代码。
The link looks innocent to visitors, but when it's clicked, it will execute the JavaScript function"exploit_code" or any other JavaScript the attacker provides.
一分钟后,他上传了两个文件,一个名为exploit.
A minute later, he uploaded two files, one called exploit.
对于初始感染,他们没有使用exploit包或spearphishingspam。
For initial infection they have not used exploit packs, or spear phishing spam.
地下犯罪分子广泛认为exploit.
Among the underground faithful, it's widely assumed that the Exploit.
例如,一些Flashexploit已经作为MicrosoftOffice文档中的对象传递。
For instance, some Flash exploits have been delivered as objects within Microsoft Office documents.
现在我们一直在等待的部分:Exploit
Now for the part we have been waiting for: the powertrain.
后门程序的作用在于保护exploit
The backdoor serves to protect the exploit.
现在我们一直在等待的部分:Exploit
Now the part you have been waiting for.
现在我们一直在等待的部分:Exploit!!
Now is the part we have all been waiting for: CAKE!
在目标服务器上运行exploit之前,我们要在本地搭设相应的软件,以检查它是否完全按预期工作。
Before we ran the exploit against the target server, we set up the software locally to check it would all work as intended.
结果: 61, 时间: 0.0194

顶级字典查询

中文 - 英语