What is the translation of " 攻击者可以使用 " in English?

an attacker can use
an attacker could use

Examples of using 攻击者可以使用 in Chinese and their translations into English

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
攻击者可以使用Yersinia工具来制作和发送DTP消息。
An attacker can use the program Yersinia to craft and send a DTP message.
攻击者可以使用移动机器人来跟踪标签的位置。
An attacker can use a mobile robot to track the position of the label.
那么攻击者可以使用自己的阅读器去套取标签的内容。
Then the attacker can use to your readers taking content label.
攻击者可以使用移动机器人来跟踪标签的位置。
The attacker can use the mobile robot to track the position of the tag.
那么攻击者可以使用自己的阅读器去套取标签的内容。
Then attackers can use their own readers to retrieve the contents of the tag.
攻击者可以使用该来电来跟踪受害者的位置。
The attacker can use this to track the victim's location.
攻击者可以使用移动机器人来跟踪标签的位置。
The attackers can use mobile robots to track the location of the tags.
攻击者可以使用该数据来三角测量设备的精确位置。
Attackers can use the data to triangulate the precise location of the device.
这意味着攻击者可以使用远程天线跟踪警察。
That means attacker could use a long range antenna to track cops.
攻击者可以使用声波和超声波信号来破坏硬盘.
Attackers Can Use Sonic and Ultrasonic Signals to Crash Hard Drives.
攻击者可以使用谷歌电子表格不断要求受害者网站提供存储在缓存中的图像或PDF。
An attacker can use Google Spreadsheets to continuously ask the victim website to provide an image or PDF stored in the cache.
攻击者可以使用XSS的恶意脚本发送到一个毫无戒心的用户。
An attacker can use XXS to send a malicious script to an unsuspecting user.
如果成功,攻击者可以使用Emotet感染来获取敏感信息.
If successful, an attacker could use an Emotet infection to obtain sensitive information.".
攻击者可以使用教育信息来威胁或欺骗用户满足他们的要求。
An attacker can use education information to scare or trick users into giving in to their demands.
攻击者可以使用这样的漏洞将他的恶意代码嵌入到易受攻击的网站中。
An attacker could use such a flaw to embed his malicious code in the vulnerable Web site.
攻击者可以使用Scapy工具,创建此攻击所需的特制帧。
An attacker can use the program Scapy, to create the specially crafted frames needed for processing this attack.
攻击者可以使用此信息访问其他对象,并可以创建将来的攻击来访问未经授权的数据。
Thus, the attacker can use this information to access other objects and can create a future attack to access the unauthorized data.
具体来说,攻击者可以使用这种新颖的攻击技术来读取先前被认为已经安全加密的信息。
Concretely, any attacker can use this novel attack technique to read information that was previously assumed to be safely encrypted.
具体来说,攻击者可以使用这种新颖的攻击技术来读取先前被认为已经安全加密的信息。
In particular, the attackers can use this new attack technique to read information which was supposed to be safe and encrypted.
攻击者可以使用这些信息来攻击可能易受攻击的特定软件。
An adversary can use this information to target specific software that may be vulnerable.
攻击者可以使用命令行界面与系统交互,并在操作过程中执行其他软件。
Adversaries may use command-line interfaces to interact with systems and execute other software during the course of an operation.
攻击者可以使用这种新颖的攻击技术来读取先前假定为安全加密的信息。
Attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted.
攻击者可以使用受感染的Docker镜像或对未受感染的正在运行的容器运行exec命令。
The attacker can use an infected Docker image or run exec commands against a non-infected running container.
在该技术的另一个变体中,攻击者可以使用合法实用程序的重命名副本,例如rundll32.exe。
In another variation of this technique, an adversary may use a renamed copy of a legitimate utility, such as rundll32. exe.
攻击者可以使用这种技术对受害者的内部网络进行侦察扫描。
Attackers can use this technique to perform reconnaissance scans of the victim's internal network.
具体来说,攻击者可以使用这种新颖的攻击技术来读取先前被认为已经安全加密的信息。
Concretely, attackers can use this novel[KRACK] attack technique to read information that was previously assumed to be safely encrypted.
Results: 26, Time: 0.0187

Word-for-word translation

Top dictionary queries

Chinese - English