- Mastering Metasploit
- Nipun Jaswal
- 178字
- 2021-08-13 17:54:00
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "This can be simply achieved using the db_export
function."
A block of code is set as follows:
require 'msf/core' require 'rex' require 'msf/core/post/windows/registry' class Metasploit3 < Msf::Post include Msf::Post::Windows::Registry def initialize super( 'Name' => 'Drive Disabler Module', 'Description' => 'C Drive Disabler Module', 'License' => MSF_LICENSE, 'Author' => 'Nipun Jaswal' ) End
Any command-line input or output is written as follows:
#services postgresql start #services metasploit start
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "Type an appropriate name in the Name field and select the Operating System type and Version."
推薦閱讀
- DevSecOps敏捷安全
- Mobile Forensics Cookbook
- INSTANT Burp Suite Starter
- 代碼審計(jì):企業(yè)級(jí)Web代碼安全架構(gòu)
- 數(shù)據(jù)安全實(shí)踐指南
- 黑客攻防與無(wú)線安全從新手到高手(超值版)
- Applied Network Security
- 數(shù)據(jù)安全與隱私計(jì)算(第3版)
- 信息安全工程與實(shí)踐
- VMware vCloud Security
- 白話零信任
- Mastering Linux Security and Hardening
- 聯(lián)邦學(xué)習(xí)原理與算法
- 信息組織
- 一本書讀透金融科技安全