Scanned pages/files
Request | Server response | Status |
http://lrcp.com.au/ | 200 OK Content-Length: 12709 Content-Type: text/html | clean |
http://lrcp.com.au/concrete/js/jquery.js?v=bd83e0d411c007d659017f9996ae0946 | 200 OK Content-Length: 94840 Content-Type: application/javascript | clean |
http://lrcp.com.au/concrete/js/ccm.base.js?v=bd83e0d411c007d659017f9996ae0946 | 200 OK Content-Length: 2450 Content-Type: application/javascript | clean |
http://lrcp.com.au/packages/nivo_slider/blocks/nivo_slider/js/jquery.nivo.slider.js?v=bd83e0d411c007d659017f9996ae0946 | 200 OK Content-Length: 25372 Content-Type: application/javascript | suspicious |
Deface/Content modification. The following signature was found: * Hacked by Seb (myconcretelab.com) : changed some height:100% by height:slider.height(); /*
* jQuery Nivo Slider v2.7.1 * http://nivo.dev7studios.com * * Copyright 2011, Gilbert Pellegrom * Free to use and abuse under the MIT license. * http://www.opensource.org/licenses/mit-license.php * * March 2010 * * Hacked by Seb (myconcretelab.com) : changed some height:100% by height:slider.height(); */ (function($) { var NivoSlider = function(element, options){ //Defaults are below var settings = $.extend({}, $.fn.nivoSlider.defaults, options); //Useful variables. Play carefully. var vars = { currentSlide: 0, currentImage: '', totalSlides: 0, ...[27690 bytes skipped]... | ||
http://lrcp.com.au//maps.google.com/maps/api/js?sensor=true/ | 404 Not Found Content-Length: 2262 Content-Type: text/html | clean |
http://lrcp.com.au/concrete/js/bootstrap.js?v=bd83e0d411c007d659017f9996ae0946 | 200 OK Content-Length: 9879 Content-Type: application/javascript | clean |
http://lrcp.com.au/test404page.js | 404 Not Found Content-Length: 2262 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: lrcp.com.au
Result:
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection: close
Date: Thu, 28 Aug 2014 06:52:21 GMT
Pragma: no-cache
Server: Apache/2.2.22 (Ubuntu)
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Set-Cookie: CONCRETE5=a4cb93b1085c971b6018a6f8ea02746d; path=/
X-Powered-By: PHP/5.3.10-1ubuntu3.11
GET / HTTP/1.1
Host: lrcp.com.au
Result:
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection: close
Date: Thu, 28 Aug 2014 06:52:21 GMT
Pragma: no-cache
Server: Apache/2.2.22 (Ubuntu)
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Set-Cookie: CONCRETE5=a4cb93b1085c971b6018a6f8ea02746d; path=/
X-Powered-By: PHP/5.3.10-1ubuntu3.11
Second query (visit from search engine):
GET / HTTP/1.1
Host: lrcp.com.au
Referer: http://www.google.com/search?q=lrcp.com.au
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: lrcp.com.au
Referer: http://www.google.com/search?q=lrcp.com.au
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=lrcp.com.au
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://lrcp.com.au/
Result: lrcp.com.au is not infected or malware details are not published yet.
Result: lrcp.com.au is not infected or malware details are not published yet.