FOOTNOTES

Chapter 2. TCP, Scanners, and Proxies

1. This is a free service provided by Fyodor, the creator of Nmap, but when you’re scanning, be polite. He requests, “Try not to hammer on the server too hard. A few scans in a day is fine, but don’t scan 100 times a day.”

Chapter 3. HTTP Clients and Remote Interaction with Tools

1. For assistance and practice with exploitation, consider downloading and running the Metasploitable virtual image, which contains several exploitable flaws useful for training purposes.

Chapter 5. Exploiting DNS

1. Go versions 1.9 and newer contain a concurrent-safe type, sync.Map, that may be used to simplify your code.

Chapter 9. Writing and Porting Exploit Code

1. For more detailed information about this vulnerability, refer to https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/#jboss.

Chapter 11. Implementing and Attacking Cryptography

1. Some operating modes, such as Galois/Counter Mode (GCM), provide integrity assurance.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset