搜索结果

找到约 14 项符合 attack 的查询结果

其他书籍 本文挡主要探讨一些web代码安全里比较隐秘

本文挡主要探讨一些web代码安全里比较隐秘,容易被程序员忽视的问题. 主要内容: 二次攻击[Second attack] 类型1:通过文件系统函数漏洞转换 类型2:通过SQL注射漏洞转换 类型3:通过正则表达式中转变量 类型4:通过编码/解码中转变量 数组变量的魅力 Code与系统 Code与http协议 漏洞挖掘 ...
https://www.eeworm.com/dl/542/378611.html
下载: 169
查看: 1026

游戏 西工大程序设计大赛作品 拿出来与大家分享 含完整工作日记 历史备分 源代码及注释 RPG(role-playing game,角色扮演类游戏) 战斗用菜单操作:一级菜单有两项

西工大程序设计大赛作品 拿出来与大家分享 含完整工作日记 历史备分 源代码及注释 RPG(role-playing game,角色扮演类游戏) 战斗用菜单操作:一级菜单有两项,attack(一般攻击),magic(使用魔法);当选magic后会出现第二级菜单,heal(治疗),magicattack(魔法攻击)。 ...
https://www.eeworm.com/dl/625/396249.html
下载: 69
查看: 1086

其他 Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough dat

Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to ...
https://www.eeworm.com/dl/534/466392.html
下载: 82
查看: 1104

嵌入式/单片机编程 An Overview of Smart Card Security. The smart card, an intelligent token, is a credit card sized

An Overview of Smart Card Security. The smart card, an intelligent token, is a credit card sized plastic card embedded with an integrated circuit chip. It provides not only memory capacity, but computational capability as well. The self-containment of smart card makes it resistant to attack as it d ...
https://www.eeworm.com/dl/647/493510.html
下载: 129
查看: 1081