What is the translation of " 攻击者可能会 " in English?

attackers might
adversaries will likely
attackers may

Examples of using 攻击者可能会 in Chinese and their translations into English

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
攻击者可能会试图从www.126.
Attackers might be trying to steal your information from www. example.
攻击者可能会试图从www.taobao.
Attackers might be trying to steal your information from www. example.
由政府支持的攻击者可能会试图盗取您的密码.
Government-backed attackers may be trying to steal your password.
在某些情况下,攻击者可能会破坏训练数据。
In some cases, attackers can poison the training data.
攻击者可能会调整代码并重新启动循环。
The attackers may yet tweak the code and restart the cycle.
虽然攻击者可能会通过恶意垃圾邮件将恶意软件渗入系统,但是他们通常会将它置于点对点(P2P)文件共享站点上。
Even though attackers might infiltrate the malware via malicious spam emails, usually they place it on peer-to-peer(P2P) file sharing sites.
攻击者可能会创建恶意应用程序,并使用获取的访问令牌通过API资源获取受害者的帐户数据。
An attacker could create a malicious application and use the obtained access tokens to retrieve victims' account data via the API Resource.
攻击者可能会试图从窃取您的信息(例如:密码、通讯内容或信用卡信息)。
Attackers might be trying to steal your information(for example, passwords, messages, or credit cards).
攻击者可能会随着时间的推移修改工具命令与控制签名,或者以这种方式构造协议以规避常见的防御工具的检测。
Adversaries will likely change tool command and control signatures over time or construct protocols in such a way to avoid detection by common defensive tools.
为利用此漏洞,攻击者可能会将包含国际字符的特制URI请求发送到.
To exploit this vulnerability an attacker could send a specially crafted URI request containing international characters to a..
但是,攻击者可能会将此漏洞与其他漏洞相结合以进一步利用此系统。
However, an attacker could combine this vulnerability with additional vulnerabilities to further exploit the system.
攻击者可能会随着时间的推移修改工具C2签名,或者以这种方式构造协议以规避常见的防御工具的检测。
Adversaries will likely change tool C2 signatures over time or construct protocols in such a way as to avoid detection by common defensive tools.
在采取行动之前,攻击者可能会投入大量的工作来收集相关信息,分析你的基础架构。
Before making their move, attackers may invest a tremendous amount of work in collecting information and analyzing your infrastructure.
攻击者可能会发现清除应用程序有一个漏洞,它允许执行特定的精确格式化文本,而不只是扫描和处理。
An attacker could find a bug in a code-reader app that allows certain precisely formatted text to be executed instead of just scanned and processed.
攻击者可能会在加载恶意模块之前在目标系统上运行这些命令,以确保它被正确编译。
Adversaries will likely run these commands on the target system before loading a malicious module in order to ensure that it is properly compiled.
攻击者可能会窃取或篡改这些弱保护的数据以进行信用卡诈骗、身份窃取或其他犯罪。
Attackers may steal or modify such weakly defended data to conduct credit card fraud, identity theft or other crimes.
攻击者可能会发现扫码应用存在漏洞,可让特定精确格式化文本被执行,而不只是被扫描和处理。
An attacker could find a bug in a code-reader app that allows certain precisely formatted text to be executed instead of just scanned and processed.
如果这些配置正确,攻击者可能会未经授权访问敏感数据或功能。
If these are properly configured, an attacker can have unauthorized access to sensitive data or functionality.
攻击者可能会将恶意代码附加到环境变量上,这些环境变量会影响进程在计算机上的运行方式。
An attacker can attach malicious code to environment variables that affect the way processes are run on a computer.
一个远程的、未经身份验证的攻击者可能会破坏一个脆弱的VPN服务器。
A remote, unauthenticated attacker may be able to compromise a vulnerable VPN server.
解释:攻击者可能会使用代码库,但在他们的本地系统上进行开发。
Explanation: Adversary will likely use code repositories, but development will be performed on their local systems.
攻击者可能会获得所有活跃用户及其明文凭证,”CISA提到CVE-2019-11510。
The attacker may be able to gain access to all active users and their plain-text credentials,” CISA said of CVE-2019-11510.
例如,攻击者可能会向发送电子邮件的首席执行官请求付款,假装是公司的客户。
For example, an attacker may send an email to a CEO requesting payment, pretending to be a client of the company.
如果不将该值设置为0,攻击者可能会强制MTU值变得非常小,从而导致堆栈的负荷过大。
If you do not set this value to 0, an attacker may force the MTU value to a very small value and overwork the stack.
不幸的是,任何应用程序可能会包含攻击者可能会渗透网络的漏洞或漏洞。
Unfortunately, any application may contain holes, or vulnerabilities, that attackers can use to infiltrate your network.
若您访问此网站,攻击者可能会尝试窃取您的密码、电子邮件、信用卡等信息。
If you visit this site, attackers could try to steal information like your passwords, emails, or credit card details.
Results: 26, Time: 0.0238

Word-for-word translation

Top dictionary queries

Chinese - English