- Kali Linux CTF Blueprints
- Cameron Buchanan
- 171字
- 2021-12-08 12:34:30
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "Type ifconfig eth0 10.0.0.124
or whichever local subnet you wish to use."
A block of code is set as follows:
[global] workgroup = Kanto server string = Oaktown map to guest = Bad User log file = /var/log/samba.%m
Any command-line input or output is written as follows:
ifconfig at0 up ifconfig at0 10.0.0.1 netmask 255.255.255.0
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "Select the Management tools – Basic option—everything else is unnecessary."
Note
Warnings or important notes appear in a box like this.
Tip
Tips and tricks appear like this.
- unidbg逆向工程:原理與實踐
- Metasploit Penetration Testing Cookbook(Third Edition)
- 網絡安全應急管理與技術實踐
- Rootkit和Bootkit:現代惡意軟件逆向分析和下一代威脅
- Practical Network Scanning
- INSTANT Metasploit Starter
- 電子支付的規制結構配置研究
- 工業物聯網安全
- 代碼審計:企業級Web代碼安全架構
- Python Penetration Testing Cookbook
- Applied Network Security
- Testing and Securing Android Studio Applications
- ARM匯編與逆向工程:藍狐卷·基礎知識
- Building a Home Security System with BeagleBone
- Mastering Reverse Engineering