- Kali Linux CTF Blueprints
- Cameron Buchanan
- 171字
- 2021-12-08 12:34:30
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "Type ifconfig eth0 10.0.0.124
or whichever local subnet you wish to use."
A block of code is set as follows:
[global] workgroup = Kanto server string = Oaktown map to guest = Bad User log file = /var/log/samba.%m
Any command-line input or output is written as follows:
ifconfig at0 up ifconfig at0 10.0.0.1 netmask 255.255.255.0
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "Select the Management tools – Basic option—everything else is unnecessary."
Note
Warnings or important notes appear in a box like this.
Tip
Tips and tricks appear like this.
- 云原生安全:攻防實(shí)踐與體系構(gòu)建
- 黑客大曝光:無(wú)線網(wǎng)絡(luò)安全(原書第3版)
- Practical Network Scanning
- 白帽子講Web安全(紀(jì)念版)
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級(jí)版)
- 網(wǎng)絡(luò)安全技術(shù)及應(yīng)用(第3版)
- 黑客攻防與無(wú)線安全從新手到高手(超值版)
- 數(shù)據(jù)安全實(shí)踐指南
- 網(wǎng)絡(luò)空間安全實(shí)驗(yàn)
- 從0到1:CTFer成長(zhǎng)之路
- 隱私計(jì)算
- 數(shù)據(jù)安全領(lǐng)域指南
- 網(wǎng)絡(luò)安全與攻防入門很輕松(實(shí)戰(zhàn)超值版)
- 信息安全等級(jí)保護(hù)測(cè)評(píng)與整改指導(dǎo)手冊(cè)
- Mastering Malware Analysis