Conventions

In this book, you will find a number of styles of text that distinguish between different kinds of information. The following are some examples of these styles and an explanation of their meaning.

Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "For the second example, we will use a simple program called cisco_crack."

A block of code is set as follows:

[-] Searching in Google:
        Searching 0 results...

[+] Emails found:
------------------
info@example.com
user1@example.com
user2@example.com
user3@example.com

When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:

# SET ...

Get Kali Linux – Assuring Security by Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.