Last updated at Fri, 12 Jan 2024 01:27:59 GMT
It looks like our little DDoS buddy got sent home from school early today -- the flood started up again, this time ignoring the DNS name for the metasploit.com web site and instead targeting both IP addresses configured on the server. While SSL service is still unaffected (including Online Update over SVN), folks who wish to visit the Metasploit web site will need to do so using an alternate port until we roll out the next countermeasure.
<We also host the main web server for Attack Research.
Thanks for your patience,
-HD