Did you just totally match up two instances of the string "ARP Poisoning"? You've got a lot more skills than the industry gives you credit for. I for one would be glad to replace my Guhnue software with one n3td3v expert analysiser.
On Wed, Jun 4, 2008 at 12:31 PM, n3td3v <[EMAIL PROTECTED]> wrote: > On Mon, Jun 2, 2008 at 6:57 PM, H D Moore <[EMAIL PROTECTED]> wrote: >> Looks like someone is doing ARP poisoning at the ISP level. The actual >> metasploit.com server(s) are untouched, but someone is still managing to >> MITM a large portion of the incoming traffic. To make things even more >> fun, its cooinciding with a DoS attack (syn floods) on most of the open >> services. >> >> If you are worried about the the Metasploit Framework source code being >> MITM'd during SVN checkouts, use the SSL version of the SVN tree: >> >> $ svn co https://metasploit.com/svn/framework3/trunk/ >> >> -HD >> >> >> On Monday 02 June 2008, Jacques Erasmus wrote: >>> Seems like the metasploit site has been hacked. >> >> > > I found this post [1] on my news group it sounds like an awful > coincidence though. > > [1] > http://groups.google.com/group/n3td3v/browse_thread/thread/41b832968eacf1d9 > > All the best, > > n3td3v > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
