• 脚本实现securecrt语法高亮

    脚本实现securecrt语法高亮 之前要实现securtcrt语法高亮要纯手工云设置,很麻烦,使用脚本则小白都可实现,只要在securtcrt菜单栏选择script-->run,在弹出的对话框中选择highlight.py,这是会让选择高亮语法的配置,给大家提供了3个,即扩展名为.ini的三个文件,一次可任意选择一个,也可运行三次脚本把三个都放进来。 剩下来就是在securt配置刚做好的语法高亮。 菜单栏选择options-->Global options-->Default Session下找到Edit Default Sessions点击后 找到Appeance,这时可看到Highlight keywords,里面即有我们导入的配置信息。只勾选Color。后面的太简单不用介绍了啊

    0
    357
    8KB
    2022-08-10
    24
  • 江苏省世界技能大赛 “网络系统管理”专业项目操作技能竞赛试题(样卷) 修订330.doc

    世界技能大赛 “网络系统管理”专业项目操作技能竞赛试题 江苏省选拔赛 世界技能大赛 “网络系统管理”专业项目操作技能竞赛试题

    0
    2570
    1.53MB
    2020-03-18
    50
  • c3725-ipbasek9-mz.124-25

    cioco ios l'n思科 ios 三层交换机 c3725-ipbasek9-mz.124-25

    0
    105
    17.21MB
    2017-11-06
    9
  • 交换机 Catalyst 3750-E Series 升级ISO文件

    交换机 Catalyst 3750-E Series 升级ISO文件,2015版

    0
    120
    19.49MB
    2017-11-05
    9
  • java ppt 入门介绍ppt

    本课件主要讲解了java的一些入门知识,比较基础,适合初学java的朋友。刚开始看书可能会觉得枯燥,不防先看看简单的课件。浅显易懂。

    5
    207
    5.99MB
    2017-08-31
    5
  • CCNA Cisco Certified Network Associate Study Guide, 7th Edition英文原版

    CCNA Cisco Certified Network Associate Study Guide, 7th Edition英文原版

    0
    107
    14.04MB
    2017-08-30
    21
  • Android Security Internals An In-Depth Guide to Androids Security Architecture.

    In Android Security Internals, top Android security expert Nikolay Elenkov takes us under the hood of the Android security system. Elenkov describes Android security architecture from the bottom up, delving into the implementation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration.

    0
    42
    7.72MB
    2017-07-16
    10
  • The CEH Prep Guide

    If you’re preparing to take the CEH exam, you’ll undoubtedly want to find as much information as you can about computers, networks, applications, and physical security. The more information you have at your disposal and the more hands-on experience you gain, the better off you’ll be when taking the exam. This study guide was written with that goal in mind—to provide enough information to prepare you for the test, but not so much that you’ll be overloaded with information that is too far outside the scope of the exam. To make the information more understandable, I’ve included practical examples and experience that supplements the theory.

    0
    44
    9.8MB
    2017-07-16
    10
  • 黑客之道:漏洞发掘的艺术.【英文第二版】.(Hacking.The.Art.of.Exploitation,.2nd.Edition)

    黑客之道:漏洞发掘的艺术.【英文第二版】.(Hacking.The.Art.of.Exploitation,.2nd.Edition)

    0
    0
    4.04MB
    2017-07-16
    15
  • 黑客之道:漏洞发掘的艺术.【英文第二版】.(Hacking.The.Art.of.Exploitation,.2nd.Edition).chm

    黑客之道:漏洞发掘的艺术.【英文第二版】.(Hacking.The.Art.of.Exploitation,.2nd.Edition).chm Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson -------------------------------------------------------------------------------- Publisher: No Starch Pub Date: January 15, 2008 Print ISBN-13: 978-1-59-327144-2 Pages: 480 Table of Contents| Index Overview Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to: Program computers using C, assembly language, and shell scripts Corrupt system memory to run arbitrary code using buffer overflows and format strings Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening Outsmart common security measures like nonexecutable stacks and intrusion detection systems Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence Redirect network traffic, conceal open ports, and hijack TCP connections Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.

    0
    0
    4.67MB
    2017-07-16
    2
  • 分享精英

    成功上传11个资源即可获取
关注 私信
上传资源赚积分or赚钱