- Building Virtual Pentesting Labs for Advanced Penetration Testing
- Kevin Cardwell
- 157字
- 2021-07-16 11:42:06
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "In the metasploitable virtual machine, enter sudo route add default gw 10.3.0.10
to add the route to the table."
A block of code is set as follows:
<IMG SRC="http://10.2.0.132/WebGoat/attack?Screen=52&menu=900&transferFunds=4000"width="1" height="1"/>
Any command-line input or output is written as follows:
ip access-group External in
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "Go to the Serversniff page and navigate to IP Tools | TCP Traceroute."
- 特種木馬防御與檢測技術研究
- Getting Started with FortiGate
- Python Penetration Testing Cookbook
- 網絡空間安全實驗
- Spring Security(Third Edition)
- 隱私計算
- 局域網交換機安全
- 數據要素安全:新技術、新安全激活新質生產力
- 電腦安全與攻防入門很輕松(實戰超值版)
- Learning Pentesting for Android Devices
- 網絡安全大數據分析與實戰
- 數據安全架構設計與實戰
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- Mastering Malware Analysis
- 一本書讀透金融科技安全