- Metasploit Penetration Testing Cookbook
- Abhinav Singh
- 176字
- 2021-08-13 18:21:07
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text are shown as follows: " The last two commands, vulns
and db_autopwn
are post-exploitation commands, which we will deal with in later chapters."
A block of code is set as follows:
# Register command execution options register_options( [ OptString.new('USER', [ true, "The username to create", "metasploit" ]), OptString.new('PASS', [ true, "The password for this user", "metasploit" ]), ], self.class)
Any command-line input or output is written as follows:
$ chmod +x framework-4.*-linux-full.run $ sudo ./framework-4.*-linux-full.run
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: " You can either start the Metasploit framework from the Applications menu or from the command line".
推薦閱讀
- 物聯網之魂:物聯網協議與物聯網操作系統
- 網絡故障現場處理實踐(第4版)
- OpenLayers Cookbook
- TCP/IP入門經典(第5版)
- 計算機網絡安全實訓教程(第二版)
- 互聯網安全的40個智慧洞見:2014年中國互聯網安全大會文集
- INSTANT LinkedIn Customization How-to
- 精通SEO:100%網站流量提升密碼
- 網絡基本通信約束下的系統性能極限分析與設計
- SD-WAN 架構與技術
- 深入理解移動互聯網
- 5G時代邊緣計算:LF Edge生態與EdgeGallery技術詳解
- 華為LiteOS:快速上手物聯網應用開發
- 計算機網絡技術實用寶典(第3版)
- iOS 12 Programming for Beginners