Scanned pages/files
Request | Server response | Status |
http://puresoundz.net/ | HTTP/1.1 301 Moved Permanently Connection: close Date: Wed, 16 Dec 2015 22:56:30 GMT Location: http://www.puresoundz.net/site/ Server: Apache Content-Length: 239 Content-Type: text/html; charset=iso-8859-1 | clean |
http://www.puresoundz.net/site/ | 200 OK Content-Length: 4546 Content-Type: text/html | clean |
http://www.puresoundz.net/site/scripts/swfobject.js | 200 OK Content-Length: 6880 Content-Type: application/javascript | clean |
http://puresoundz.net/playlists/playlist.asx | 404 Not Found Content-Length: 613 Content-Type: text/html | clean |
http://puresoundz.net/test404page.js | 404 Not Found Content-Length: 613 Content-Type: text/html | clean |
http://puresoundz.net/playlists/playlist.qtl | 404 Not Found Content-Length: 613 Content-Type: text/html | clean |
http://puresoundz.net/playlists/playlist.ram | 404 Not Found Content-Length: 613 Content-Type: text/html | clean |
http://puresoundz.net/index.shtml | 200 OK Content-Length: 438 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: HACKED By HEXB00T3R <html>
<head> <title>HACKED By HEXB00T3R</title> </head> <body bgcolor=black> <p align="center"> <img src="http://b.imagehost.org/0355/HEXB00T3R.jpg"></p> <p align="center"><font color="#999999" size="2" face="courier new">Priv Root Exploit Satislari Basladi - HEXB00T3R@windowslive.com</font></p> <p align="center"><font color="white" size="2" face="tahoma">Turkish Hacker By HEXB00T3R - ( Informatics Mafia )</font></p> </html> | ||
http://puresoundz.net/tv.shtml | 404 Not Found Content-Length: 613 Content-Type: text/html | clean |
http://puresoundz.net/timetable.shtml | 404 Not Found Content-Length: 613 Content-Type: text/html | clean |
http://puresoundz.net/downloads.shtml | 404 Not Found Content-Length: 613 Content-Type: text/html | clean |
http://puresoundz.net/contactus.shtml | 404 Not Found Content-Length: 613 Content-Type: text/html | clean |
http://puresoundz.net/../site/application.html | 400 Bad Request Content-Length: 613 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: puresoundz.net
Result:
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Wed, 16 Dec 2015 22:56:30 GMT
Location: http://www.puresoundz.net/site/
Server: Apache
Content-Length: 239
Content-Type: text/html; charset=iso-8859-1
...239 bytes of data.
GET / HTTP/1.1
Host: puresoundz.net
Result:
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Wed, 16 Dec 2015 22:56:30 GMT
Location: http://www.puresoundz.net/site/
Server: Apache
Content-Length: 239
Content-Type: text/html; charset=iso-8859-1
...239 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: puresoundz.net
Referer: http://www.google.com/search?q=puresoundz.net
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: puresoundz.net
Referer: http://www.google.com/search?q=puresoundz.net
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=puresoundz.net
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://puresoundz.net/
Result: puresoundz.net is not infected or malware details are not published yet.
Result: puresoundz.net is not infected or malware details are not published yet.