Scanned pages/files
Request | Server response | Status |
http://lanbros.com/ | 200 OK Content-Length: 8072 Content-Type: text/html | suspicious |
Suspicious code. Script contains iFrame. <!-- Indonesian people --> <!-- document.write(unescape('%3C%68%74%6D%6C%3E%0A%3C%74%69%74%6C%65%3E%48%61%63%6B%65%64%20%42%79%20%5A%65%79%6E%6E%79%6D%6F%75%5A%3C%2F%74%69%74%6C%65%3E%0A%3C%6D%65%74%61%20%63%6F%6E%74%65%6E%74%3D%27%48%61%63%6B%65%64%20%42%79%20%5A%65%79%6E%6E%79%6D%6F%75%5A%27%20%6E%61%6D%65%3D%27%64%65%73%63%72%69%70%74%69%6F%6E%27%2F%3E%0A%3C%6D%65%74%61%20%63%6F%6E%74%65%6E%74%3D%27%48%61%63%6B%65%64%20% ...[3569 bytes skipped]... Decoded script: ...[1891 bytes skipped]... ey like it or not... <br> Ask yourself, are you prepared ?? </font> <p align="center"> </p> <p align="center"> </p> <p align="center"> </p> <p align="center"> </p> <p align="center"> </p> <font face="Playball" size="6" color="white"><p align="right">` ZeynnymouZ - Borneo Security Crew ! </iframe><hr width="50%" align="Right"> </style> <link href='http://fonts.googleapis.com/css?family=Iceland' rel='stylesheet' type='text/css'> <body> <center> <font face="Iceland" size="4" color="white">{#} Vulnerable Dot ID - MR.COM - Rahyde-ID - Micky Hat - YousefJafar04 - ?Mr.bonz-101 - ./BlaDDzeRR - Wredha Dot ID - H3r1-1D and you ! {#} <HTML> Deface/Content modification. The following signature was found: Hacked By ZeynnymouZ <html>
<title>Hacked By ZeynnymouZ</title><link rel="SHORTCUT ICON" href="http://xcruzz.blogspot.com/favicon.ico"/> <meta content='Hacked By ZeynnymouZ' name='description'/> <meta content='Hacked By ZeynnymouZ' name='keywords'/> <meta content='Hacked By ZeynnymouZ' name='Abstract'/></style> <body oncontextmenu='return false;' onkeydown='return false;' onmousedown='return false;'> <Script Langu ...[7710 bytes skipped]... | ||
http://lanbros.com/test404page.js | 404 Not Found Content-Length: 506 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: lanbros.com
Result:
HTTP/1.1 200 OK
Cache-Control: post-check=0, pre-check=0
Connection: close
Date: Wed, 22 Oct 2014 04:55:29 GMT
Pragma: no-cache
Server: Apache/2.2.25 (Unix) mod_ssl/2.2.25 OpenSSL/0.9.8m DAV/2 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Wed, 22 Oct 2014 04:55:29 GMT
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Set-Cookie: a49070c8d59d6fa6572ad2f918c4bbab=63c1e30dc474636309f45a5218909426; path=/
X-Powered-By: PHP/5.3.27
GET / HTTP/1.1
Host: lanbros.com
Result:
HTTP/1.1 200 OK
Cache-Control: post-check=0, pre-check=0
Connection: close
Date: Wed, 22 Oct 2014 04:55:29 GMT
Pragma: no-cache
Server: Apache/2.2.25 (Unix) mod_ssl/2.2.25 OpenSSL/0.9.8m DAV/2 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Wed, 22 Oct 2014 04:55:29 GMT
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Set-Cookie: a49070c8d59d6fa6572ad2f918c4bbab=63c1e30dc474636309f45a5218909426; path=/
X-Powered-By: PHP/5.3.27
Second query (visit from search engine):
GET / HTTP/1.1
Host: lanbros.com
Referer: http://www.google.com/search?q=lanbros.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: lanbros.com
Referer: http://www.google.com/search?q=lanbros.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=lanbros.com
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://lanbros.com/
Result: lanbros.com is not infected or malware details are not published yet.
Result: lanbros.com is not infected or malware details are not published yet.