go top

session hijacking

  • 会话劫持

网络释义专业释义英英释义

  会话劫持

...它的身份。因为大多数IP安全规范都是围绕主机的IP地址的,IP欺骗对于需要安全地交换数据的网络管理员是很大的问题。 会话劫持Session hijacking)是比IP欺骗更高级别的攻击。这时攻击者会失效所欺骗的主机并伪装活跃的网络会话。

基于3787个网页-相关网页

  连线劫持

这种模拟称为连线劫持 (Session Hijacking),是一种趁机打劫的方式,劫持工具可以让攻击者在工作阶段进行时中断、结束或窃取工作阶段。

基于94个网页-相关网页

  联机截夺

... briefing session简介会;演示文稿会;简报会;团员注意事项 session hijacking会话劫持;联机截夺;连线劫持;连线截夺 terminal session终端对话期间;终端机活动期;[计]终端会话 ...

基于58个网页-相关网页

  连线截夺

连线截夺 ( Session Hijacking )是一种用在使用者密码很难破解时的一种特殊的入侵方法。

基于44个网页-相关网页

短语

Session n Hijacking 会话劫持

  • 会话劫持 - 引用次数:8

    So more scalable method is essential. The key issue of mobile IPv6 security is as follows:false binding of home address and care-of address poses a potential for session hijacking and denial of service attacks.

    移动IPv6安全问题的关键是伪造的家乡地址和转交地址绑定可能导致会话劫持和拒绝服务攻击。

    参考来源 - 移动IPv6绑定更新认证协议设计及分析
    会话接管 - 引用次数:4

    But its authentication mechanism is also one-way, and it’s easy to suffer Man-In-The-Middle (MITM) Attack, Session Hijacking and denial of service.

    但是,它的认证机制在设计上仍然是单向的,容易受到中间人攻击、会话接管攻击及拒绝服务攻击。

    参考来源 - IEEE802.1x网络访问认证技术的攻击应对策略
    联机截夺
    对话挟持

·2,447,543篇论文数据,部分数据来源于NoteExpress

Session hijacking

  • abstract: In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a remote server.

以上来源于: WordNet

双语例句权威例句

  • If you see a page displaying a cookie, then session hijacking of the user's account is possible.

    如果看到页面正在显示一个cookie那么可能发生用户帐号会话攻击。

    youdao

  • Also referred to as TCP session hijacking, a security attack on a user session over a protected network.

    TCP会话劫持,它是保护的网络用户的会话进行安全攻击

    youdao

  • Another type of session hijacking is known as a man-in-the-middle attack, where the attacker, using a sniffer, can observe the communication between devices and collect the data that is transmitted.

    一类会话劫持叫做中间人攻击攻击利用探测程序可以观测到设备之间通信收集发送出去数据

    youdao

更多双语例句
  • But apps written to the protocol can be vulnerable to denial-of-service, session hijacking, and man-in-the middle attacks over the Internet, as well as an attacker actually able to "watch" the transactions, says David Goldsmith, CEO of Matasano Security, who will present the firm's new research on FIX at the upcoming Black Hat USA briefings later this month.

    FORBES: Magazine Article

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定