Scanned pages/files
Request | Server response | Status |
http://badasscheese.com/ | 200 OK Content-Length: 6586 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: hacked by Machiavelli :] el-kaide.com ...[6575 bytes skipped]... br title="XHTML Friends Network">XFN</abbr></a></li> <li><a href="http://wordpress.org/" title="Powered by WordPress, state-of-the-art semantic personal publishing platform.">WordPress</a></li> </ul> </div> <!--meta ends--> <div id="blogroll"> <li id="linkcat-2" class="linkcat"><h2>hacked by Machiavelli :] el-kaide.com</h2> <ul class='xoxo blogroll'> <div class="links"><li><a href="http://wordpress.org/development/">Development Blog</a></li></div> <div class="links"><li><a href="http://codex.wordpress.org/">Documentation</a></li></div> <div class="links"><li><a href="http://wordpress.org/extend/plugins/">Plugins</a></li></div> <div clas ...[1330 bytes skipped]... | ||
http://nikkeh.com/wp-content/themes/diabolique-fountain/js/menu.js | 200 OK Content-Length: 1302 Content-Type: application/javascript | clean |
http://nikkeh.com/wp-includes/js/jquery/jquery.js?ver=1.3.2 | 200 OK Content-Length: 57276 Content-Type: application/javascript | clean |
http://nikkeh.com/index.php?ak_action=aktt_js&v=2.4 | 200 OK Content-Length: 0 Content-Type: text/javascript | clean |
http://nikkeh.com/wp-content/themes/diabolique-fountain/js/cufon.js | 200 OK Content-Length: 18876 Content-Type: application/javascript | clean |
http://nikkeh.com/wp-content/themes/diabolique-fountain/js/Titillium.font.js | 200 OK Content-Length: 61258 Content-Type: application/javascript | clean |
http://badasscheese.com/test404page.js | 404 Not Found Content-Length: 1148 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: badasscheese.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sun, 15 Nov 2015 05:34:29 GMT
Accept-Ranges: bytes
Server: LiteSpeed
Vary: User-Agent
Content-Length: 6586
Content-Type: text/html; charset=UTF-8
X-Pingback: http://nikkeh.com/xmlrpc.php
X-Powered-By: PHP/5.3.28
...6586 bytes of data.
GET / HTTP/1.1
Host: badasscheese.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sun, 15 Nov 2015 05:34:29 GMT
Accept-Ranges: bytes
Server: LiteSpeed
Vary: User-Agent
Content-Length: 6586
Content-Type: text/html; charset=UTF-8
X-Pingback: http://nikkeh.com/xmlrpc.php
X-Powered-By: PHP/5.3.28
...6586 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: badasscheese.com
Referer: http://www.google.com/search?q=badasscheese.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: badasscheese.com
Referer: http://www.google.com/search?q=badasscheese.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=badasscheese.com
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://badasscheese.com/
Result: badasscheese.com is not infected or malware details are not published yet.
Result: badasscheese.com is not infected or malware details are not published yet.