Scanned pages/files
Request | Server response | Status |
http://www.pepsibaghdad.org/ | 200 OK Content-Length: 100211 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: Hacked by IraQeN-H4XORZ ...[61549 bytes skipped]... ft Word 15"> <link rel=File-List href="index12_files/filelist.xml"> <link rel=Edit-Time-Data href="index12_files/editdata.mso"> <!--[if !mso]> <style> v:* {behavior:url(#default#VML);} o:* {behavior:url(#default#VML);} w:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} </style> <![endif]--> <title> Hacked by IraQeN-H4XORZ </title> <!--[if gte mso 9]><xml> <o:DocumentProperties> <o:Author>root</o:Author> <o:Template>Normal</o:Template> <o:LastAuthor>DR.Ahmed Saker</o:LastAuthor> <o:Revision>27</o:Revision> <o:TotalTime>42</o:TotalTime> <o:Created>2013-05-14T11:10:00Z</o:Created> <o:LastSaved>2014-01-09T12:55:00Z</o:LastSaved> ...[59901 bytes skipped]... | ||
http://www.pepsibaghdad.org/engine/classes/js/menu.js | 200 OK Content-Length: 2931 Content-Type: application/javascript | clean |
http://www.pepsibaghdad.org/engine/classes/js/dle_ajax.js | 200 OK Content-Length: 7633 Content-Type: application/javascript | clean |
http://www.pepsibaghdad.org/engine/classes/js/js_edit.js | 200 OK Content-Length: 8769 Content-Type: application/javascript | clean |
http://www.pepsibaghdad.org/engine/classes/highslide/highslide.js | 200 OK Content-Length: 57199 Content-Type: application/javascript | clean |
http://www.pepsibaghdad.org/templates/3/_pgtres/jquery-1.4.2.min.js | 200 OK Content-Length: 72174 Content-Type: application/javascript | clean |
http://www.pepsibaghdad.org/templates/3/_pgtres/site.js | 200 OK Content-Length: 2998 Content-Type: application/javascript | clean |
http://www.pepsibaghdad.org/templates/3/_pgtres/stmenu.js | 200 OK Content-Length: 21639 Content-Type: application/javascript | clean |
http://www.pepsibaghdad.org/templates/3/sexybookmark/js/jquery-1.4.2.min.js | 200 OK Content-Length: 72174 Content-Type: application/javascript | clean |
http://www.pepsibaghdad.org/templates/3/sexybookmark/js/sexy-bookmarks-public.js | 200 OK Content-Length: 1593 Content-Type: application/javascript | clean |
http://www.pepsibaghdad.org/0/31-shshhshshshi-shshshhsh-shyoshyeshyishshyi-shhshhshhshshshhshyoshshye-shshhshyeshshishhsh.html | 200 OK Content-Length: 106429 Content-Type: text/html | clean |
http://www.pepsibaghdad.org/0/30-shshhshhshshshishhshh.html | 200 OK Content-Length: 103111 Content-Type: text/html | clean |
http://www.pepsibaghdad.org/6/29-shshhshshshi-shshshhsh-shyoshyeshyishshyi-shhshhshhshshshhshyoshshye-shshhshyeshshishhsh.html | 200 OK Content-Length: 105935 Content-Type: text/html | clean |
http://www.pepsibaghdad.org/templates/en/_pgtres/jquery-1.4.2.min.js | 200 OK Content-Length: 72174 Content-Type: application/javascript | clean |
http://www.pepsibaghdad.org/templates/en/_pgtres/site.js | 200 OK Content-Length: 2998 Content-Type: application/javascript | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: pepsibaghdad.org
Result:
GET / HTTP/1.1
Host: pepsibaghdad.org
Result:
Second query (visit from search engine):
GET / HTTP/1.1
Host: pepsibaghdad.org
Referer: http://www.google.com/search?q=pepsibaghdad.org
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: pepsibaghdad.org
Referer: http://www.google.com/search?q=pepsibaghdad.org
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=pepsibaghdad.org
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://pepsibaghdad.org/
Result: pepsibaghdad.org is not infected or malware details are not published yet.
Result: pepsibaghdad.org is not infected or malware details are not published yet.