lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <4b6ee9310806040931v454c83dcpc64056f22a72c814@mail.gmail.com> Date: Wed, 4 Jun 2008 17:31:51 +0100 From: n3td3v <xploitable@...il.com> To: "H D Moore" <fdlist@...italoffense.net>, full-disclosure@...ts.grok.org.uk Subject: Re: Metasploit - Hack ? On Mon, Jun 2, 2008 at 6:57 PM, H D Moore <fdlist@...italoffense.net> wrote: > Looks like someone is doing ARP poisoning at the ISP level. The actual > metasploit.com server(s) are untouched, but someone is still managing to > MITM a large portion of the incoming traffic. To make things even more > fun, its cooinciding with a DoS attack (syn floods) on most of the open > services. > > If you are worried about the the Metasploit Framework source code being > MITM'd during SVN checkouts, use the SSL version of the SVN tree: > > $ svn co https://metasploit.com/svn/framework3/trunk/ > > -HD > > > On Monday 02 June 2008, Jacques Erasmus wrote: >> Seems like the metasploit site has been hacked. > > I found this post [1] on my news group it sounds like an awful coincidence though. [1] http://groups.google.com/group/n3td3v/browse_thread/thread/41b832968eacf1d9 All the best, n3td3v _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists