Crackers briefly hijacked hacking tools website Metasploit.com on Monday.
Metasploit is an advanced open-source exploit development platform used by most pen-testers. A tool we often mention here on Darknet.
On Monday the site was redirected to a page announcing the site was “hacked by sunwear ! just for fun“, as recorded by Sunbelt Software.
Unidentified miscreants used an ARP poisoning attack aimed at the network of Metasploit’s hosting provider in order to pull off the hack. The Metasploit project was quickly restored. H D Moore, the creator of the project, explained what happened in response to online reports of the hack.
“Another customer on the same ISP was compromised and used to ARP poison all servers in that subnet. I corrected the problem by setting a static ARP entry and notifying the ISP. To make it very clear – the metasploit.com servers were not compromised, nor have been to this date,” he said
So don’t worry, the Metasploit packages are safe as the server was NOT compromised it was a network level attack and a redirect rather than an actual intrusion.
Source: The Register
- Egress-Assess – Test Network Egress Data Detection
- BTCrawler – Bluetooth Diagnostic & Discovery Tool
- Just-Metadata – Gathers & Analyse IP Address Metadata
- ARPwner – ARP & DNS Poisoning Attack Tool
- Learn to use Metasploit – Tutorials, Docs & Videos
- HD Moore’s Company BreakingPoint Suffers DNS Attack
Most Read in Network Hacking: