- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 178字
- 2021-07-16 17:53:00
Conventions used
There are a number of text conventions used throughout this book.
CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "Mount the downloaded WebStorm-10*.dmg disk image file as another disk in your system."
A block of code is set as follows:
import sys, json
from tabulate import tabulate
data = json.load(sys.stdin)
rows = []
When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:
import sys, json
from tabulate import tabulate
data = json.load(sys.stdin)
rows = []
Any command-line input or output is written as follows:
docker run -p 8081:8080 -it webgoat/webgoat-8.0 /home/webgoat/start.sh
Bold: Indicates a new term, an important word, or words that you see onscreen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "Select System info from the Administration panel."
- Extending Symfony2 Web Application Framework
- Metasploit Penetration Testing Cookbook(Second Edition)
- 特種木馬防御與檢測(cè)技術(shù)研究
- 大型互聯(lián)網(wǎng)企業(yè)安全架構(gòu)
- 走進(jìn)新安全:讀懂網(wǎng)絡(luò)安全威脅、技術(shù)與新思想
- Preventing Digital Extortion
- Computer Forensics with FTK
- 數(shù)據(jù)要素安全:新技術(shù)、新安全激活新質(zhì)生產(chǎn)力
- 網(wǎng)絡(luò)安全態(tài)勢(shì)感知
- INSTANT Apple Configurator How-to
- 黑客攻擊與防范實(shí)戰(zhàn)從入門(mén)到精通
- 一本書(shū)讀透金融科技安全
- ATT&CK與威脅獵殺實(shí)戰(zhàn)
- Blockchain Development with Hyperledger
- Web前端黑客技術(shù)揭秘