Errata
The errata list is a list of errors and their corrections that were found after the product was released.
The following errata were submitted by our customers and have not yet been approved or disproved by the author or editor. They solely represent the opinion of the customer.
Color Key: Serious technical mistake Minor technical mistake Language or formatting error Typo Question Note Update
Version | Location | Description | Submitted by | Date submitted |
---|---|---|---|---|
28 ssh_version example |
The example does not set the RHOSTS value. I can only assume when they were running it a previously used value was carried forward, however to run this command alone the following would need to have been run |
aziramai | Nov 07, 2011 | |
30 snmp_login example |
Syntax error in command - should read 'use scanner/snmp/snmp_login' but currently reads ' use use scanner/snmp/snmp_login' |
Anonymous | Nov 07, 2011 | |
Printed | Page 270,272,273 p. 270 para 1, p.272 item 2, p. 273 item 4 |
When the user attempts to login to the vulnerable web page no matter what user and password he/she uses (including the SQL injection) an SQL error is returned saying user sa cannot login. |
Paul Totton | Jul 16, 2012 |
Page 272 1st paragraph |
http://www.nostarch.com/metasploit.htm doesn't show any links to the resources as stated in the paragraph. |
Anonymous | Jul 28, 2011 | |
Page 273 Item 2 |
After configuring the vulnerable WinXP as described in Annex A, the Default.aspx file supplied in nostarch1.zip displays a "Succesfully logged into the page" immediately. There is no username/password box. |
Anonymous | Jul 28, 2011 | |
Printed | Page 273 Step 4 |
In reference to above report, issue is just formatting. |
Anonymous | Sep 17, 2011 |
Printed, PDF | Page 273 Step 2 |
I guess I am having the same problem. I get logged in without being asked for the username and password |
Anonymous | Oct 12, 2011 |