You would think that the authors of Ettercap, one of the most popular
whitehat pentesting tools, would know the basics of security.
Apparently they don't, or they just don't give a shit about what
happens to their users.
So, why is their website so insecure? Ettercap's message board is
hosted at Sourceforge, so they share a server with thousands of other
customers. Every single customer is able to execute commands and
access the other project directories. Pretty stupid, eh? You only need
to find one hole in one hosted site and you can access ALL the project
databases. Of course that isn't ALoR's fault, it's Sourceforge's
fault. Regardless, people who care about security and data integrity
wouldn't use such a shitty provider, would they? To be fair, the
Ettercap project is dead. Most of the admins have been inactive for a
few years now, but that is no excuse for such a security mess.
Especially since the server was compromised some five years ago.
Just look at the process list, horrible. Even the worst perl bots
(scax) get access. If such a poorly written bot can own this box,
Some good advice to all other people/projects who are using
Sourceforge: Move. There are enough good alternatives. Yes, I am
talking to you Vim, get the **** out of there. And to all Ettercap
users: arp poisoning is *not* hacking. If you want to achieve
something real, learn the fundamentals and not how to use a GUI. Don't
sniff the passwords of your friends and call yourself a pentester
(looking at you firesheep).