Errata
The errata list is a list of errors and their corrections that were found after the product was released. If the error was corrected in a later version or reprint the date of the correction will be displayed in the column titled "Date Corrected".
The following errata were submitted by our customers and approved as valid errors by the author or editor.
Color key: Serious technical mistake Minor technical mistake Language or formatting error Typo Question Note Update
Version | Location | Description | Submitted By | Date submitted | Date corrected |
---|---|---|---|---|---|
Printed | Page 4 Figure 1-1, Penetration Testing |
"Wide scope 'no holds barred' approach involving multiple attack vendors..." |
Anonymous | ||
Printed | Page 4 Figure 1-1 |
"Network Security Assessment |
Anonymous | Aug 01, 2004 | |
Printed | Page 8 Figure 1-2 |
The description in the "Brute Force Password Grinding" box: |
Anonymous | ||
Printed | Page 8 Figure 1-2 |
"Accessible TOP and UDP network services" |
Anonymous | Aug 01, 2004 | |
Printed | Page 8 Figure 1-2 |
The arrow going down from 'Network Enumeration' to 'New domain names and IP |
Anonymous | Aug 01, 2004 | |
Printed | Page 14 |
http://www.microsoft.com/ntserver/nts/downloads/recommended/netkit/default.asp |
Anonymous | May 01, 2004 | |
Printed | Page 46 |
"Using half-open SYN flags to probe a target is known as an inverted technique because ... " |
Anonymous | May 01, 2004 | |
Printed | Page 49 |
http://www.eaglenet.org/antirez/hping2.html |
Anonymous | May 01, 2004 | |
Printed | Page 66 first paragraph |
"If some ports don't respond, but others respond with |
Anonymous | Aug 01, 2004 | |
Printed | Page 79 |
Table 5-1 should include the following two entries: |
Anonymous | ||
Printed | Page 87 |
snmpwalk -c public 192.168.0.1 |
Anonymous | May 01, 2004 | |
Printed | Page 87 Example 5-14 |
"snmpwalk -c public 192.168.0.1" |
Anonymous | Aug 01, 2004 | |
Printed | Page 91 |
http://www.xfocus.net/exploits |
Anonymous | May 01, 2004 | |
Printed | Page 111 OpenSSL |
"HEAD / HTTP/1.0" NOW APPERAS in bold. |
Anonymous | Aug 01, 2004 | |
Printed | Page 121 Unicode revisited |
http://www.example.org/scripts/..%255c../winnt/system32/cmd.exe/?/c+dir |
Anonymous | Aug 01, 2004 | |
Printed | Page 122 Example 6-14 |
"ispc 192.168.189.10/scripts/idq.dll" NOW APPEARS in bold. |
Anonymous | Aug 01, 2004 | |
Printed | Page 122 |
The following sentence HAS BEEN ADDED to the end of the first paragraph, so that ti NOW READS: |
Anonymous | Aug 01, 2004 | |
Printed | Page 138 About 1/3 down page, the two URLs |
http://www.securityfocus.com/archive/75/295545/2003-09-07/2003-09-13/1 |
Anonymous | Aug 01, 2004 | |
Printed | Page 150 xp_cmdshell;the following code |
"/price.asp?ProductID=12984';EXEC%20master..xp_cmdshell'ping.exe |
Anonymous | Aug 01, 2004 | |
Printed | Page 151 within the first code example at the top of the page |
'net users' NOW READS 'net%20users' |
Anonymous | Aug 01, 2004 | |
Printed | Page 162 Table 7-1 |
"OpenSSH 3.7.1 contains buffer management errors" |
Anonymous | Aug 01, 2004 | |
Printed | Page 167 4th line from the bottom |
"Running 7350logoout from a Linux platform" |
Anonymous | Aug 01, 2004 | |
Printed | Page 171 2nd paragraph example |
"chrismail.trustmatta.com" should be "chris mail.trustmatta.com" |
Anonymous | ||
Printed | Page 172 notes |
It is very easy to get from user/bin to user/root under Unix-based systems |
Anonymous | ||
Printed | Page 174 1st paragraph |
X Consortium was closed in 1996. X is currently maintained by X.org foundation. |
Anonymous | ||
Printed | Page 197 Final paragraph |
"although this may be difficult to exploit under Solaris." |
Anonymous | Aug 01, 2004 | |
Printed | Page 198 2nd paragraph |
heck the MITRE CVE and ... |
Anonymous | ||
Printed | Page 202 Microsoft SQL Server |
"The service listens on UDP port 1434 and returns the IP address and port number" |
Anonymous | ||
Printed | Page 202 |
http://www.sqlsecurity.com/uploads/sqlping.zip |
Anonymous | May 01, 2004 | |
Printed | Page 204 |
http://www.sqlsecurity.com/uploads/forcesql.zip |
Anonymous | May 01, 2004 | |
Printed | Page 207 fig 8-7 and paragraph above |
VSNUM should be: VSNNUM |
Anonymous | ||
Printed | Page 210 table 8-5, 3rd entry in the "note" column |
Oracle 8i and 9iVersion 8.1.7 and 9.0.1 and prior) TNS Listener... |
Anonymous | ||
Printed | Page 213 Penultimate paragraph |
" , which relates to a remote vulnerability in MySQL 3.23.56 ..." |
Anonymous | Aug 01, 2004 | |
Printed | Page 215 Microsoft Windows Networking Services |
To the list of ports (including loc-srv, netbios-ns, microsoft-ds, etc.), |
Anonymous | Aug 01, 2004 | |
Printed | Page 219 rpcdump and ifids, final line |
"ncacn_http (RPC over HTTP on TCP port 80 or 593)" |
Anonymous | Aug 01, 2004 | |
Printed | Page 223 Gleaning User Details via SAMR and LSARPC Interfaces, first |
paragraph; |
Anonymous | Aug 01, 2004 | |
Printed | Page 232 penultimate paragraph |
"An attack can run SMBRelay or LC4 ..." |
Anonymous | Aug 01, 2004 | |
Printed | Page 234 |
http://ntsecurity.nu/toolbox/winfo.exe |
Anonymous | May 01, 2004 | |
Printed | Page 241 second paragraph, below Example 9-19 |
The four instances of "LC4" HAVE BEEN CHANGED to "LC5". |
Anonymous | Aug 01, 2004 | |
Printed | Page 252 |
Table 10-1 NOW INCLUDES CVE-2002-0906, as follows: |
Anonymous | Aug 01, 2004 | |
Printed | Page 255 Table 10-3 |
the "ISS XFID ... Notes" table heading should have a dark grey shaded background |
Anonymous | ||
Printed | Page 268 |
(RDP running on TCP port 259) |
Anonymous | May 01, 2004 | |
Printed | Page 275 1st paragraph |
Due to the number of different RPC services, associated prognum values, ... |
Anonymous | ||
Printed | Page 275 |
Table 12-1 is missing a bug in yppasswd, and currently reads: |
Anonymous | ||
Printed | Page 275 |
Table 12-1 is missing three bugs in ttdbserverd, and currently reads: |
Anonymous | ||
Printed | Page 307 |
The 'xoa' text at the top of Figure 13-16 should be 'x0a' |
Anonymous | ||
Printed | Page 312 Figure 13-17 |
"Pointer to formal string" |
Anonymous | Aug 01, 2004 | |
Printed | Page 313 Figure 13-18 |
"Pointer to formal string" |
Anonymous | Aug 01, 2004 | |
Printed | Page 327 Example 14-7 |
"25/tcp open smtp" |
Anonymous | Aug 01, 2004 | |
Printed | Page 350 |
The rsync service (port 873) is also susceptible to CAN-2003-0962, so |
Anonymous | ||
Printed | Page 351 |
"2401 cvspserver Unix CVS service, vulnerable to a number of attacks" |
Anonymous | ||
Printed | Page 351 |
The rwhois service on TCP port 4321 is also susceptible CVE-2001-0838, so |
Anonymous | ||
Printed | Page 352 |
The following should be added to Table A-2: |
Anonymous |