- Building Virtual Pentesting Labs for Advanced Penetration Testing
- Kevin Cardwell
- 157字
- 2021-07-16 11:42:06
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "In the metasploitable virtual machine, enter sudo route add default gw 10.3.0.10
to add the route to the table."
A block of code is set as follows:
<IMG SRC="http://10.2.0.132/WebGoat/attack?Screen=52&menu=900&transferFunds=4000"width="1" height="1"/>
Any command-line input or output is written as follows:
ip access-group External in
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "Go to the Serversniff page and navigate to IP Tools | TCP Traceroute."
- 工業互聯網安全
- 網絡安全應急管理與技術實踐
- 開發者的Web安全戒律:真實威脅與防御實踐
- Learning Veeam? Backup & Replication for VMware vSphere
- 網絡安全技術及應用(第3版)
- 諸神之眼:Nmap網絡安全審計技術揭秘
- 黑客攻防與網絡安全從新手到高手(絕招篇)
- 云原生安全技術實踐指南
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- Web安全之深度學習實戰
- 信息安全等級保護測評與整改指導手冊
- 安全防御入門手冊
- 電腦安全與攻防入門很輕松(實戰超值版)
- 功能型密碼算法設計與分析
- 物聯網信息安全技術