lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 4 Jun 2008 17:31:51 +0100
From: n3td3v <xploitable@...il.com>
To: "H D Moore" <fdlist@...italoffense.net>, full-disclosure@...ts.grok.org.uk
Subject: Re: Metasploit - Hack ?

On Mon, Jun 2, 2008 at 6:57 PM, H D Moore <fdlist@...italoffense.net> wrote:
> Looks like someone is doing ARP poisoning at the ISP level. The actual
> metasploit.com server(s) are untouched, but someone is still managing to
> MITM a large portion of the incoming traffic. To make things even more
> fun, its cooinciding with a DoS attack (syn floods) on most of the open
> services.
>
> If you are worried about the the Metasploit Framework source code being
> MITM'd during SVN checkouts, use the SSL version of the SVN tree:
>
> $ svn co https://metasploit.com/svn/framework3/trunk/
>
> -HD
>
>
> On Monday 02 June 2008, Jacques Erasmus wrote:
>> Seems like the metasploit site has been hacked.
>
>

I found this post [1] on my news group it sounds like an awful
coincidence though.

[1] http://groups.google.com/group/n3td3v/browse_thread/thread/41b832968eacf1d9

All the best,

n3td3v

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ