-
-
WinEdt 7.0 Build 20120321 一键注册器
... multi-lingual setups, and dictionaries (word-lists) are available for many languages. As an editor, WinEdt allows you to exploit its intuitive (customizable) predefined interface and graphic controls. However, if you are not too keen on the mouse ...
-
-
-
Head First Design Patterns
... . In other words, in real world applications. You also want to learn how patterns are used in the Java API, and how to exploit Java's built-in pattern support in your own code. You want to learn the real OO design principles and why everything your boss ...
-
中文版Metasploit 渗透测试指南 渗透测试
metasploit 工具的使用详解,最详尽的电子书
metasploit 集成了当前广泛的操作系统与应用程序,浏览器的漏洞利用exploit, 并且提供开发人员加入第三方模块与发布溢出程序的框架。
-
RPC DCOM堆栈溢出实验
... :\
◆ 本地计算机
◇ 操作系统:Windows 2000主机
◇ 软件:DCOM RPC Exploit - GUI v2。
[实验内容]
◆ 利用RPC DCOM堆栈缓冲区溢出漏洞,对 ...
-
exploiting software hacking
... capabilities. These features, however, may also be used to exploit critical network devices, network traffic traversing these devices ... Guide Jason Nehbross will show you how to exploit critical network devices, network traffic traversing these devices ...
-
A Hybrid Strategy for Caching Web Search Engine Results
This work discusses the design and implementation of an efficient
caching system aimed to exploit the locality present in the queries
submitted to a Web Search Engine (WSE). We enhance previous
proposals in several directions. First we propose the ...
-
-
Metasploit渗透测试指南
... 渗透攻击阶段
1.1.7 报告阶段
1.2 渗透测试类型
1.2.1 白盒测试
1.2.2 黑盒测试
1.3 漏洞扫描器
1.4 小结
第2章 Metasploit基础
2.1 专业术语
2.1.1 渗透攻击(Exploit)
2.1.2 攻击载荷(Payload)
2.1.3 Shellcode
2.1.4 模块(Module)
2.1.5 监听器(Listener)
2.2 Metasploit用户接口
2.2.1 MSF终端
2.2.2 MSF命令行
2.2.3 ...
-