Full Disclosure mailing list archives

Re: Metasploit - Hack ?


From: "T Biehn" <tbiehn () gmail com>
Date: Thu, 5 Jun 2008 16:14:58 -0400

Did you just totally match up two instances of the string "ARP
Poisoning"? You've got a lot more skills than the industry gives you
credit for. I for one would be glad to replace my Guhnue software with
one n3td3v expert analysiser.

On Wed, Jun 4, 2008 at 12:31 PM, n3td3v <xploitable () gmail com> wrote:
On Mon, Jun 2, 2008 at 6:57 PM, H D Moore <fdlist () digitaloffense net> wrote:
Looks like someone is doing ARP poisoning at the ISP level. The actual
metasploit.com server(s) are untouched, but someone is still managing to
MITM a large portion of the incoming traffic. To make things even more
fun, its cooinciding with a DoS attack (syn floods) on most of the open
services.

If you are worried about the the Metasploit Framework source code being
MITM'd during SVN checkouts, use the SSL version of the SVN tree:

$ svn co https://metasploit.com/svn/framework3/trunk/

-HD


On Monday 02 June 2008, Jacques Erasmus wrote:
Seems like the metasploit site has been hacked.



I found this post [1] on my news group it sounds like an awful
coincidence though.

[1] http://groups.google.com/group/n3td3v/browse_thread/thread/41b832968eacf1d9

All the best,

n3td3v

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: