[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <2d6724810806051314v7c8caf8cmef63c6975de8bdb4@mail.gmail.com>
Date: Thu, 5 Jun 2008 16:14:58 -0400
From: "T Biehn" <tbiehn@...il.com>
To: n3td3v <xploitable@...il.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: Metasploit - Hack ?
Did you just totally match up two instances of the string "ARP
Poisoning"? You've got a lot more skills than the industry gives you
credit for. I for one would be glad to replace my Guhnue software with
one n3td3v expert analysiser.
On Wed, Jun 4, 2008 at 12:31 PM, n3td3v <xploitable@...il.com> wrote:
> On Mon, Jun 2, 2008 at 6:57 PM, H D Moore <fdlist@...italoffense.net> wrote:
>> Looks like someone is doing ARP poisoning at the ISP level. The actual
>> metasploit.com server(s) are untouched, but someone is still managing to
>> MITM a large portion of the incoming traffic. To make things even more
>> fun, its cooinciding with a DoS attack (syn floods) on most of the open
>> services.
>>
>> If you are worried about the the Metasploit Framework source code being
>> MITM'd during SVN checkouts, use the SSL version of the SVN tree:
>>
>> $ svn co https://metasploit.com/svn/framework3/trunk/
>>
>> -HD
>>
>>
>> On Monday 02 June 2008, Jacques Erasmus wrote:
>>> Seems like the metasploit site has been hacked.
>>
>>
>
> I found this post [1] on my news group it sounds like an awful
> coincidence though.
>
> [1] http://groups.google.com/group/n3td3v/browse_thread/thread/41b832968eacf1d9
>
> All the best,
>
> n3td3v
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists