What is the translation of " MAN-IN-THE-MIDDLE " in Chinese? S

Examples of using Man-in-the-middle in English and their translations into Chinese

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
Sending by IP requests a new public key, so yes,it's vulnerable to type 1 man-in-the-middle.
IP请求发送一个新的公钥,所以,是的,它很容易在中间输入1。
Mitmproxy, a tool to implement Man-in-the-Middle attacks with TLS support, has released version 1.0.0.
Mitmproxy是一个执行有TLS支持的中间人攻击的工具,它的1.0.0版本已发布。
Unsecured communication channelscan be susceptible to intrusions such as man-in-the-middle attacks.
不安全的通信渠道可能容易受到诸如中间人攻击之类的入侵。
Consequently, man-in-the-middle attacks against HTTPS services are hard to pull off, and often not very successful.
因此,很难实施针对HTTPS服务的中间人攻击,而且通常不会非常成功。
All communication is encrypted and the identity of the remote is verified,so the proxy cannot act as a man-in-the-middle.
所有通信都是加密的,并且验证了远程的身份,因此代理不能充当中间人
It could then be used by an attacker to perform a man-in-the-middle attack to read and alter the secure traffic to these sites.
随后可能被攻击者用于执行中间人攻击,读取并修改这些网站的安全流量。
By encrypting the data prior to communication,no one can eavesdrop on or use the cipher text data(using a man-in-the-middle attack).
通过在通信之前加密数据,没人能窃听或使用密文数据(使用中间人攻击)。
As described in the paper, it requires an attacker-owned SSL man-in-the-middle proxy to be set up for the attacker's device.
如本文中所述,它需要攻击者拥有的SSL的人在中间代理,为攻击者的设备设置。
Man-in-the-middle attacks, hacker attacks, spying and tampering, memory data errors- embedded systems are exposed to various threats.
中间人攻击、黑客攻击、间谍和篡改、内存数据错误--嵌入式系统面临各种威胁。
Any particular email usually includes a link to own website oruses a man-in-the-middle attack to use your own domain name.
该电子邮件通常包含指向自己网站的链接,或使用中间人攻击来使用您自己的域名。
The man-in-the-middle(MITM) attack exploits the fact that the HTTPS server sends a certificate with its public key to the Web browser.
中间人攻击(man-in-the-middle,即MITM)利用的是HTTPS服务器会向浏览器发送带有公钥的证书这一点。
The deceptive email usually includes a link to their website oruses a man-in-the-middle attack to use your own domain name.
该电子邮件通常包含指向自己网站的链接,或使用中间人攻击来使用您自己的域名。
This technique is called a man-in-the-middle attack because the attacker actually cannot access the wallet, they just intercept and redirect the transaction.
这种技术被称为中间人攻击,因为攻击者实际上无法访问钱包,他们只是拦截和重定向交易。
Usually the cracker hasused an active attack(such as IP spoofing or man-in-the-middle) to compromise a system on the LAN.
通常,该怪客已经使用了某种积极攻击方式(如IP假冒或中间人攻击)来弱化这个LAN上的某个系统。
In a Man-in-the-Middle(MiTM) attack, a hacker breaches the communication channel between two individual systems in an attempt to intercept messages among them.
中间人(MITM)攻击中,黑客破坏了两个单独系统之间的通信通道,并试图拦截其中的信息。
For this reason,the main theme of this article will be Man-in-the-Middle attacks against LLMNR, NetBIOS and WPAD mechanisms.
因此,本文的主题将是针对LLMNR,NetBIOS和WPAD机制的中间人攻击。
The result is strengthened link layer security between neighboring devices that protectswireless links against things like passive eavesdropping and man-in-the-middle(MITM) attacks.
其结果是加强了相邻设备间链路层的安全性,保护无线链路免受无源窃听和中间人(MITM)攻击。
To demonstrate the risk to our client, we developed a man-in-the-middle(MitM) tool which exploited two separate insecure configurations.
为证明这一风险,我们开发了一个中间人(MitM)工具,该工具利用了两个不同的不安全配置来实现攻击。
At first glance Proxysvc, the SSL listener,looks like a proxy setup tool(to carry out man-in-the-middle traffic interception).
乍一看,SSL监听器Proxysvc看起来像一个代理设置工具(用于执行中间人流量拦截)。
In this scenario,the phony base station is part of a man-in-the-middle attack, passing along information from the core network to devices that connect.
在这种情况下,伪基站是中间人攻击的一部分,它将信息从核心网络传递到连接的设备。
Without a built-in method of data authentication,connected devices are susceptible to risks such as hijacking, man-in-the-middle attacks, spoofing or data breaches.
如果没有内置的数据认证方法,连接的设备很容易受到诸如劫持、中间人攻击、欺骗或数据泄露等风险。
It basically allows them- or an attacker- to man-in-the-middle the connection and then downgrade the encryption so they can break it and sniff the traffic.
它基本上允许他们(或攻击者)中间人连接,然后降级加密,这样他们就可以中断它并嗅探流量。
Sasha Perigo has implemented afeature in Chrome that detects improperly installed man-in-the-middle software that intercepts TLS connections.
SashaPerigo已经在Chrome中实现了一项功能,用于检测不正确安装的中间人攻击软件。
IRONGATE's key feature is a man-in-the-middle(MitM) attack against process input-output(IO) and process operator software within industrial process simulation.
IronGate的特点是针对工业过程模拟中的过程输入输出(IO)和过程操作员软件的中间人(MITM)攻击。
Worse yet, researchers found that five of the nine apps were vulnerable to man-in-the-middle attacks because they did not verify certificate authenticity.
更糟糕的是,研究人员发现,九个应用程序中有五个易受“中间人攻击”,因为它们没有验证证书的真实性。
The DNS-over-TLS has been designed to make it harder for man-in-the-middle attackers to manipulate the DNS query or eavesdrop on your Internet connection.
DNS-over-TLS旨在使中间人攻击者更难以操纵DNS查询或窃听您的Internet连接。
In a worst-case scenario,an attacker could be conducting a man-in-the-middle attack, or redirecting users to fake websites in order to steal credentials.
在最糟糕的情况下,攻击者可能正在进行中间人攻击,或者将用户重定向到虚假网站以窃取数据。
One of the major benefits of HTTPS is that it protects users against man-in-the-middle(MitM) attacks that can be launched from compromised or insecure networks.
HTTPS的主要优点之一是它可以保护用户免受不安全网站的威胁和不安全的中间人(MitM)攻击。
A successful exploitcould also allow the attacker to conduct man-in-the-middle attacks and decrypt confidential information on user connections to the affected software.
成功的利用还可以使攻击者进行中间人攻击,并对有关用户与受影响软件的连接的机密信息进行解密。
This ensures reasonable protection from eavesdroppers, and man-in-the-middle attacks, provided that adequate cipher suites are used, and that the server certificate is verified and trusted.
这确保了合理的保护免受窃听者和中间人攻击,只要使用足够的密码套件并且服务器证书被验证和信任。
Results: 112, Time: 0.0342
S

Synonyms for Man-in-the-middle

Top dictionary queries

English - Chinese