[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <200806021257.31737.fdlist@digitaloffense.net>
Date: Mon, 2 Jun 2008 12:57:31 -0500
From: H D Moore <fdlist@...italoffense.net>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: Metasploit - Hack ?
Looks like someone is doing ARP poisoning at the ISP level. The actual
metasploit.com server(s) are untouched, but someone is still managing to
MITM a large portion of the incoming traffic. To make things even more
fun, its cooinciding with a DoS attack (syn floods) on most of the open
services.
If you are worried about the the Metasploit Framework source code being
MITM'd during SVN checkouts, use the SSL version of the SVN tree:
$ svn co https://metasploit.com/svn/framework3/trunk/
-HD
On Monday 02 June 2008, Jacques Erasmus wrote:
> Seems like the metasploit site has been hacked.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists