lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <200806021257.31737.fdlist@digitaloffense.net> Date: Mon, 2 Jun 2008 12:57:31 -0500 From: H D Moore <fdlist@...italoffense.net> To: full-disclosure@...ts.grok.org.uk Subject: Re: Metasploit - Hack ? Looks like someone is doing ARP poisoning at the ISP level. The actual metasploit.com server(s) are untouched, but someone is still managing to MITM a large portion of the incoming traffic. To make things even more fun, its cooinciding with a DoS attack (syn floods) on most of the open services. If you are worried about the the Metasploit Framework source code being MITM'd during SVN checkouts, use the SSL version of the SVN tree: $ svn co https://metasploit.com/svn/framework3/trunk/ -HD On Monday 02 June 2008, Jacques Erasmus wrote: > Seems like the metasploit site has been hacked. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists