- Mastering Kali Linux for Advanced Penetration Testing
- Robert W. Beggs
- 217字
- 2021-07-16 11:33:16
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "In this particular case, the VM has been assigned an IP address of 192.168.204.132
."
A block of code is set as follows:
# MSF port scanner onhost_add { println("[*] MSF Port Scanner New Host OpenPorts on$1"); $console = console(); cmd($console, "use auxiliary/scanner/portscan/tcp"); cmd($console, "set THREADS 12"); cmd($console, "set PORTS 139, 143"); # enter other ports as required cmd($console, "set RHOSTS $1"); cmd($console, "run -j"); cmd($console, "use auxiliary/scanner/discovery/udp_sweep"); cmd($console, "set THREADS 12"); cmd($console, "set BATCHSIZE 256"); cmd($console, "set RHOSTS $1"); cmd($console, "run -j"); db_sync(); }
Any command-line input or output is written as follows:
root@kali~# update-rc.d networking defaults
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "If you double-click on the truecrypt1 icon, you will be taken to a File Browser view."
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 數字身份與元宇宙信任治理
- 計算機使用安全與防護
- 代碼審計:企業級Web代碼安全架構
- 解密數據恢復
- Web安全之深度學習實戰
- Mastering Reverse Engineering
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 信息內容安全管理及應用
- 數字銀行安全體系構建
- Real-World SRE
- 網絡對抗的前世今生
- 網絡安全攻防技術實戰
- 精通Metasploit滲透測試(第3版)
- 網絡安全技術及應用實踐教程