The paper emphasizes on the method of writing binary executive code used in attacking-- shellcode and the improvement of the shellcode for breaking through environment restriction . we discuss the development of " execute script shellcode " 文章重點講述了用于攻擊的二進制可執(zhí)行代碼??shellcode的編寫技術(shù)細節(jié)和突破環(huán)境限制的改進方法,并介紹了“執(zhí)行腳本shellcode”的開發(fā)。
The paper emphasizes on the method of writing binary executive code used in attacking-- shellcode and the improvement of the shellcode for breaking through environment restriction . we discuss the development of " execute script shellcode " 文章重點講述了用于攻擊的二進制可執(zhí)行代碼??shellcode的編寫技術(shù)細節(jié)和突破環(huán)境限制的改進方法,并介紹了“執(zhí)行腳本shellcode”的開發(fā)。
The paper emphasizes on the method of writing binary executive code used in attacking-- shellcode and the improvement of the shellcode for breaking through environment restriction . we discuss the development of " execute script shellcode " 文章重點講述了用于攻擊的二進制可執(zhí)行代碼??shellcode的編寫技術(shù)細節(jié)和突破環(huán)境限制的改進方法,并介紹了“執(zhí)行腳本shellcode”的開發(fā)。
The main task of an intrusion detection system is to detect attacks or intrusions into the network or the computer by identifying security breaches such as incoming shellcode, viruses, malware, or trojan horses 入侵檢測系統(tǒng)(intrusiondetectionsystem,ids)的主要任務(wù)是,通過識別到來的shellcode、病毒、惡意軟件(malware)或者特洛伊木馬等安全缺口,檢測進入網(wǎng)絡(luò)或者計算機的攻擊或入侵。