... 漏洞侦测(Vulnerability Detection) 后门侦测(Backdoor Detection) 漏洞利用(Vulnerability Exploitation) ...
基于28个网页-相关网页
此漏洞利用程序 exploiting application
漏洞利用零日攻击 Zero Day Exploit
漏洞利用代码 Venerability Exploit Code ; Exploit Code
一般漏洞利用禁止功能 Generic Exploit Blocking
内核漏洞的利用与防范 A Guide to Kernel Exploitation
运行利用漏洞 running exploit
执行初始利用漏洞 Performing initial exploit
确定可利用漏洞 Vulnerability ldentification
Secondly, we choose the perfect technology scheme from the different phrase of the diffusion. On the basis of which, the dissertation induce the analysis of the core technology including the vulnerability exploitation、reverse connection and far tread insertion.
在此基础上,引出漏洞利用、反向连接、远程线程插入等受控性关键技术,并给出指令解析的算法描述,设计适合扩散过程三阶段的技术方案。
参考来源 - 移动agent的受控扩散研究与实现·2,447,543篇论文数据,部分数据来源于NoteExpress
漏洞利用(exloit)是一个揭示或利用安全性漏洞的程序。
An exploit is a program that demonstrates or exploits the vulnerability.
当这一漏洞利用得以正名之际,谷歌也更新了正在开发中的铬浏览器版本。
Google updated its version of Chrome in development when word of this exploit came out.
由新西兰安全研究者Simon Howard运营的备受争议的“零病毒检测”竞赛允许各个参赛队伪装计算机病毒代码和漏洞利用代码样本。
The controversial Race to Zero contest, run by New Zealand security researcher Simon Howard, allowed each team to try to obfuscate real computer viruses and exploit code samples.
应用推荐