Building Virtual Pentesting Labs for Advanced Penetration Testing(Second Edition)
上QQ阅读APP看书,第一时间看更新

Conventions

In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning.

Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "If you are using Windows and you open a command prompt window and enter tracert www.microsoft.com, you will observe that it fails, as indicated in this screenshot:"

A block of code is set as follows:

f0/0 = NIO_linux_eth:eth0
f1/0 = NIO_linux_eth:eth1

Any command-line input or output is written as follows:

#Enable-WindowsOptionalFeature -Online -FeatureName Microsoft-Hyper-V -All

New terms and important words are shown in bold. Words that you see on the screen, for example, in menus or dialog boxes, appear in the text like this: "The first thing we will look at in the tool is the ability to extract information from a web server header page: click on TcpQuery, and in the window that opens, enter www.packtpub.com and click on Go."

Note

Warnings or important notes appear in a box like this.

Tip

Tips and tricks appear like this.