二次探测 meaning in Chinese
quadratic probing
Examples
- Secondly , it can detect opened ports on the basis of results of the first port - scan , and get the information of service and version of these opened ports . thirdly , through many kinds of detecting ways , it can get the os - fingerprints of tcp / ip protocol stack of the destination computer , and guess the faraway operation system exactly . at last , taking cve ( common vulnerabilities and exposures ) as the standard , a more practical vulnerability database by combining the structures of two large - scale oversea vulnerability databases is designed
设计开发的网络漏洞探测系统具有较强的综合性能,能够提供多种端口扫描技术,在第一次扫描结果的基础上对开放的端口进行第二次探测,得到开放的端口的服务和版本信息,通过多种探测方法获得目标主机的tcp / ip协议栈指纹信息、较准确的推测出远程操作系统,并以cve ( commonvulnerabilitiesandexposures )为标准,结合国外两个大型漏洞数据库的结构,设计了较实用的漏洞数据库。