The paper emphasizes on the method of writing binary executive code used in attacking-- shellcode and the improvement of the shellcode for breaking through environment restriction . we discuss the development of " execute script shellcode " 文章重点讲述了用于攻击的二进制可执行代码??shellcode的编写技术细节和突破环境限制的改进方法,并介绍了“执行脚本shellcode”的开发。
The paper emphasizes on the method of writing binary executive code used in attacking-- shellcode and the improvement of the shellcode for breaking through environment restriction . we discuss the development of " execute script shellcode " 文章重点讲述了用于攻击的二进制可执行代码??shellcode的编写技术细节和突破环境限制的改进方法,并介绍了“执行脚本shellcode”的开发。
The paper emphasizes on the method of writing binary executive code used in attacking-- shellcode and the improvement of the shellcode for breaking through environment restriction . we discuss the development of " execute script shellcode " 文章重点讲述了用于攻击的二进制可执行代码??shellcode的编写技术细节和突破环境限制的改进方法,并介绍了“执行脚本shellcode”的开发。
The main task of an intrusion detection system is to detect attacks or intrusions into the network or the computer by identifying security breaches such as incoming shellcode, viruses, malware, or trojan horses 入侵检测系统(intrusiondetectionsystem,ids)的主要任务是,通过识别到来的shellcode、病毒、恶意软件(malware)或者特洛伊木马等安全缺口,检测进入网络或者计算机的攻击或入侵。