【翻译】exploit-db-HOME-About The Exploit Database

感觉需要用日记鞭策一下自己,回顾自己的每天有没有浪费。

上午基本是玩了,只看了下英文网站,记录一下,顺便积累点单词。翻译中遇到的问题整理在最后,希望各位帮忙指正,多谢!

来源:【exploit-db】

About The Exploit Database

Who we are, what we do and more[1].

我们是谁,我们做什么
translation

Who We Are

The Exploit Database is maintained by Offensive Security[2], an information security training company that provides various Information Security Certifications as well as high end penetration testing services.The Exploit Database is a non-profit project that is provided as a public service by Offensive Security.

我们是谁
Exploit Database 被一个叫Offensive Security的公司维护,一个提供多种信息安全认证和高端渗透测试服务的信息安全培训公司。Exploit Database是Offensive Security公司作为的非盈利性项目提供的。
translation
 

What We Do

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software,developed for use by penetration testers and vulnerability researchers. Our aim is to serve the most comprehensive collection of exploits[3] gathered through direct submissions, mailing lists,as well as other public sources[4], and present them in a freely-available and easy-to-navigate database.The Exploit Database is a repository for exploits and proof-of-concepts rather than advisories,making it a valuable resource for those who need actionable data right away.

我们做什么
Exploit Database 是一个CVE(Common Vulnerabilities & Exposures)标准的关于公共漏洞利用和相应的漏洞软件的存档,它为渗透测试人员和漏洞研究人员开发。我们的目的是提供最全面的漏洞集合的收集,通过直接提交,邮件列表以及其他公共资源,并且把它们呈现在一个自由可用和易于导航的数据库中。Exploit Database 是一个漏洞利用(exp)和观点证明(poc)的仓库而非公告,这对于那些马上需要可操作数据的人来说是非常有价值的资源。
translation

How to Navigate the Database

Each exploit in the Exploit Database may have several additional fields, such as Date, Description,Platform, Author, and D,A,V. While the first four titles are self explanatory, the latter three are not.Here’s a short breakdown of their meanings[5]:

Exploit Database 中的每一个漏洞利用都有若干字段,比如日期、描述、平台、作者和D,A,V等。前四个标题是不言而喻的,后三个需要解释一下。下面是这些含义的简短分解:
translation
 
 

1. “D” for Download. This link will download the raw source code[6] of the exploit as it was submitted to us.

“D”是下载。这个链接可以下载我们提交的漏洞利用的源代码。
translation

2. “A” for Application. We make an effort to archive vulnerable applications for the benefit of researchers whenever we can. This facilitates debugging and analysis should the vulnerable application become unavailable[7].

“A”是应用程序。我们尽可能的将易受攻击的应用程序存档,以造福研究人员们。这有利于调试和分析,使易受攻击的应用程序变得不可被利用。
translation

3. “V” for Verified. We make an effort to verify exploits in our labs, when possible[8]. A “non verified” exploit(marked by a clock icon) simply means we did not have the opportunity to test the exploit internally.

“V”是已验证的。我们尽可能在实验室中验证漏洞利用。一个未被验证的漏洞利用(用时钟图标标记)仅仅意味着我们没有机会在内部测试漏洞利用。
translation

How to Submit Exploits

Refer to our “Submit” page to review the Exploit Database guidelines for acceptance.

参考我们的“提交”页面,检查 Exploit Database 的验收规则。
translation

Answers to Common Questions People Have for Us.

Why did you hack my site or my software?

We have not hacked your websites or your software. We collect publicly available exploits from the internet and archive them here.

你为什么入侵我的网站或者软件?
我们没有入侵你的网站或者软件。我们从互联网收集公开的可用的漏洞,并且在这里存档。
translation

Why did you not accept my submitted exploit?

We do not submit exploits which violate our Exploit acceptance policy or have been tested and found not to work. Read more on the “Submit” page.

你们为什么不接收我提交的漏洞?
我们不提交违反我们漏洞接收政策或者已测试的和无效的漏洞。更多的请阅读“提交”页面。
translation

Do you hold on to exploits before publishing them? Do you have some nefarious scheme where by you siphon off exploits[9] for your own use?

No, we don’t. We publish what we get, as soon as we possibly can. The only reason we won’t publish an exploit is if it violates our exploit policies.

你会在公布漏洞之前利用它们吗?你是否有一些邪恶的计划,私自利用漏洞?
不,我们没有。我们会尽可能快的发布我们所得到的漏洞。我们没有发布某个漏洞的唯一原因是如果它违反了我们的漏洞政策。
translation

I sent[10] you an exploit, but you never published it. What gives?

If you sent us an exploit, and it hasn’t been published yet, it could be due to a couple of reasons – either it has not abided by our submit policy, or it is still in our queue and is awaiting moderation.

我发给你们一个漏洞,但是你们从来没有发布它,发生了什么?
如果你给我们发了一个漏洞,并且它还没有被发布,很可能是如下原因 - 或者它没有遵循我们的提交策略,或者它仍然在我们的队列中等待审核。
translation

整理问题如下:

[1]. and more ,更多的意思,翻译中如何体现?

[2]. 被动语态总觉得怪怪的,是否应该翻译成xxx由xxx公司维护。

[3]. exploit该翻译为漏洞利用还是漏洞,此处用“漏洞利用”感觉太啰嗦,此问题也体现在下面几处飘红的地方。

[4]. “通过直接提交,邮件列表以及其他公共资源”不通顺,是否改为“通过xxx的方式”。

[5]. 此处翻译感觉有些牵强。

[6].  raw source code,原始源代码?

[7]. make an effort --努力,whenever we can--尽可能,make an effort to archive vulnerable applications for the benefit of researchers whenever we can(“为了研究员的利益尽可能努力把易受攻击的程序存档”,好别扭啊)。

unavailable--不可利用,should the vulnerable application become unavailable.(“使易受攻击的程序不可利用”,依然很别扭,是指攻击方式不可利用吧)。

[8]. when possible--尽可能。和 whenever we can 一样?

[9]. 不会翻译

[10]. sent--发送,但是在这里感觉应该是提交的意思,是否翻译为提交更合理,但是提交是submit

原文地址:https://www.cnblogs.com/kuboy/p/7705172.html