- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 178字
- 2021-07-16 17:53:00
Conventions used
There are a number of text conventions used throughout this book.
CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "Mount the downloaded WebStorm-10*.dmg disk image file as another disk in your system."
A block of code is set as follows:
import sys, json
from tabulate import tabulate
data = json.load(sys.stdin)
rows = []
When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:
import sys, json
from tabulate import tabulate
data = json.load(sys.stdin)
rows = []
Any command-line input or output is written as follows:
docker run -p 8081:8080 -it webgoat/webgoat-8.0 /home/webgoat/start.sh
Bold: Indicates a new term, an important word, or words that you see onscreen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "Select System info from the Administration panel."
- 網(wǎng)絡(luò)空間攻防技術(shù)原理
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- 開發(fā)者的Web安全戒律:真實威脅與防御實踐
- 諸神之眼:Nmap網(wǎng)絡(luò)安全審計技術(shù)揭秘
- 網(wǎng)絡(luò)安全三十六計:人人該懂的防黑客技巧
- Kali Linux Wireless Penetration Testing Cookbook
- 移動APT:威脅情報分析與數(shù)據(jù)防護(hù)
- 網(wǎng)絡(luò)運(yùn)維親歷記 (網(wǎng)絡(luò)運(yùn)維紀(jì)實文學(xué))
- 硬黑客:智能硬件生死之戰(zhàn)
- ARM匯編與逆向工程:藍(lán)狐卷·基礎(chǔ)知識
- 互聯(lián)網(wǎng)企業(yè)安全高級指南
- 實用黑客攻防技術(shù)
- CTF快速上手:PicoCTF真題解析(Web篇)
- Practical Internet of Things Security
- 一本書讀透金融科技安全