Scanned pages/files
Request | Server response | Status |
http://omgsushi.com/ | 200 OK Content-Length: 7746 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: Hacked by Murkho Manob | Just another WordPress site ...[59 bytes skipped]... ml class="ie ie7" lang="en-US"> <![endif]--> <!--[if IE 8]> <html class="ie ie8" lang="en-US"> <![endif]--> <!--[if !(IE 7) | !(IE 8) ]><!--> <html lang="en-US"> <!--<![endif]--> <head> <meta charset="UTF-8" /> <meta name="viewport" content="width=device-width" /> <title>Hacked by Murkho Manob | Just another WordPress site</title> <link rel="profile" href="http://gmpg.org/xfn/11" /> <link rel="pingback" href="http://omgsushi.com/xmlrpc.php" /> <!--[if lt IE 9]> <script src="http://omgsushi.com/wp-content/themes/twentytwelve/js/html5.js" type="text/javascript"></script> <![endif]--> <link rel="alternate" type="application/rss+xml" title="Hacked by Murkho Manob » Feed" href="http://omgsushi. ...[8448 bytes skipped]... | ||
http://omgsushi.com/wp-content/themes/twentytwelve/js/navigation.js?ver=1.0 | 200 OK Content-Length: 863 Content-Type: application/javascript | clean |
http://omgsushi.com/?p=1 | 200 OK Content-Length: 9335 Content-Type: text/html | clean |
http://omgsushi.com/?cat=1 | 200 OK Content-Length: 8105 Content-Type: text/html | clean |
http://omgsushi.com/?author=1 | 200 OK Content-Length: 8181 Content-Type: text/html | clean |
http://omgsushi.com/?m=201312 | 200 OK Content-Length: 7884 Content-Type: text/html | clean |
http://omgsushi.com/wp-login.php | 200 OK Content-Length: 2262 Content-Type: text/html | clean |
http://omgsushi.com/wp-login.php?action=lostpassword | 200 OK Content-Length: 1915 Content-Type: text/html | clean |
http://omgsushi.com/test404page.js | 404 Not Found Content-Length: 290 Content-Type: text/html | clean |
http://omgsushi.com/?feed=rss2 | 200 OK Content-Length: 4208 Content-Type: text/xml | clean |
http://omgsushi.com/?feed=comments-rss2 | 200 OK Content-Length: 1421 Content-Type: text/xml | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: omgsushi.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sat, 12 Apr 2014 19:20:34 GMT
Server: Apache/2.2.22 (Debian)
Vary: Accept-Encoding
Content-Length: 7746
Content-Type: text/html; charset=UTF-8
X-Pingback: http://omgsushi.com/xmlrpc.php
X-Powered-By: PHP/5.4.4-14+deb7u8
...7746 bytes of data.
GET / HTTP/1.1
Host: omgsushi.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sat, 12 Apr 2014 19:20:34 GMT
Server: Apache/2.2.22 (Debian)
Vary: Accept-Encoding
Content-Length: 7746
Content-Type: text/html; charset=UTF-8
X-Pingback: http://omgsushi.com/xmlrpc.php
X-Powered-By: PHP/5.4.4-14+deb7u8
...7746 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: omgsushi.com
Referer: http://www.google.com/search?q=omgsushi.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: omgsushi.com
Referer: http://www.google.com/search?q=omgsushi.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=omgsushi.com
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://omgsushi.com/
Result: omgsushi.com is not infected or malware details are not published yet.
Result: omgsushi.com is not infected or malware details are not published yet.