- Nmap 6:Network exploration and security auditing Cookbook
- Paulino Calderon Pale
- 154字
- 2021-08-05 18:31:00
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text are shown as follows: "The flag -PS
forces a TCP SYN ping scan."
A block of code is set as follows:
table.insert(fingerprints, { category='cms', probes={ {path='/changelog.txt'}, {path='/tinymce/changelog.txt'}, }, matches={ {match='Version (.-) ', output='Version \\1'}, {output='Interesting, a changelog.'} } })
Any command-line input or output is written as follows:
$ nmap -sP -PS80,21,53 <target> $ nmap -sP -PS1-1000 <target> $ nmap -sP -PS80,100-1000 <target>
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "Click on OK to start downloading your new working copy."
推薦閱讀
- 數據恢復方法及案例分析
- Web漏洞分析與防范實戰:卷1
- Metasploit Penetration Testing Cookbook(Second Edition)
- API安全實戰
- Learning Veeam? Backup & Replication for VMware vSphere
- 代碼審計:企業級Web代碼安全架構
- 網絡安全三十六計:人人該懂的防黑客技巧
- 信息安全案例教程:技術與應用(第2版)
- End to End GUI Development with Qt5
- 黑客攻防從入門到精通
- 數字政府網絡安全合規性建設指南:密碼應用與數據安全
- Mastering Malware Analysis
- 云計算安全技術與應用
- 安全網絡構建
- 信息組織