- Metasploit Bootcamp
- Nipun Jaswal
- 170字
- 2021-07-09 21:00:00
Conventions
In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "We can see that running the pattern_create.rb script from the /tools/exploit/ directory, for a pattern of 1000 bytes, will generate the preceding output."
A block of code is set as follows:
def exploit
connect
weapon = "HEAD "
weapon << make_nops(target['Offset'])
weapon << generate_seh_record(target.ret)
weapon << make_nops(19)
weapon << payload.encoded
weapon << " HTTP/1.0\r\n\r\n"
sock.put(weapon)
handler
disconnect
end
end
When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:
weapon << make_nops(target['Offset'])
weapon << generate_seh_record(target.ret)
weapon << make_nops(19)
weapon << payload.encoded
Any command-line input or output is written as follows:
irb(main):003:1> res = a ^ b
irb(main):004:1> return res
New terms and important words are shown in bold. Words that you see on the screen, for example, in menus or dialog boxes, appear in the text like this: "We can see we have scanned the entire network and found two hosts running FTP services, which are TP-LINK FTP server and FTP Utility FTP server."
- 云原生安全:攻防實(shí)踐與體系構(gòu)建
- 計(jì)算機(jī)病毒分析與防范大全(第3版)
- 局域網(wǎng)交換機(jī)安全
- Building a Home Security System with BeagleBone
- 信息安全等級保護(hù)測評與整改指導(dǎo)手冊
- 網(wǎng)絡(luò)安全態(tài)勢感知
- 黑客攻防實(shí)戰(zhàn)從入門到精通
- CTF特訓(xùn)營:技術(shù)詳解、解題方法與競賽技巧
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- VMware vCloud Security
- Mastering Linux Security and Hardening
- 網(wǎng)絡(luò)安全實(shí)戰(zhàn)詳解(企業(yè)專供版)
- 云計(jì)算安全技術(shù)與應(yīng)用
- 一本書讀透金融科技安全
- BeagleBone for Secret Agents