Mastering Metasploit
上QQ阅读APP看书,第一时间看更新

Conventions used

There are a number of text conventions used throughout this book.

Code in text: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "Mount the downloaded WebStorm-10*.dmg disk image file as another disk in your system."

A block of code is set as follows:

def exploit

connect

weapon = "HEAD "

weapon << make_nops(target['Offset'])

weapon << generate_seh_record(target.ret)

weapon << make_nops(19)

weapon << payload.encoded

weapon << " HTTP/1.0\r\n\r\n"

sock.put(weapon)

handler

disconnect

end

end

When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:

weapon << make_nops(target['Offset'])

weapon << generate_seh_record(target.ret)

weapon << make_nops(19)

weapon << payload.encoded

Any command-line input or output is written as follows:

irb(main):003:1> res = a ^ b

irb(main):004:1> return res

Bold: Indicates a new term, an important word, or words that you see onscreen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "Select System info from the Administration panel."

Tips or important notes

Appear like this.