Scanned pages/files
Request | Server response | Status |
http://serveuganda.com/ | 200 OK Content-Length: 12727 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: HaCkEd By T34M HacKeR$ of IRaQ _!_ ...[126 bytes skipped]... ********************************** // script by drevil_nz, Michael Dillon, Christchurch New Zealand. // Permission granted to use this script provided this credit // remains intact. Visit my homepage www.chc.quik.co.nz/juggler/mikey.html // Script written for Internet Explorer 4.0+. // ******************************************************************* var message="HaCkEd By T34M HacKeR$ of IRaQ _!_" //specifys the title var message=message+" " //gives a pause at the end,1 space=1 speed unit, here I used 10 spaces@150 each = 1.5seconds. i="0" //declares the variable and sets it to start at 0 var temptitle="" //declares the variable and sets it to have no value yet. var speed="150" //the delay in milliseconds between letters function titler(){ if (!document.all&& ...[15545 bytes skipped]... | ||
http://serveuganda.com/test404page.js | 404 Not Found Content-Length: 12727 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: serveuganda.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Mon, 07 Apr 2014 15:03:04 GMT
Server: Apache/2.2.25 (Unix) mod_ssl/2.2.25 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4
Content-Type: text/html; charset=UTF-8
X-Pingback: http://serveuganda.wordpress.com/xmlrpc.php
X-Powered-By: PHP/5.3.27
GET / HTTP/1.1
Host: serveuganda.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Mon, 07 Apr 2014 15:03:04 GMT
Server: Apache/2.2.25 (Unix) mod_ssl/2.2.25 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4
Content-Type: text/html; charset=UTF-8
X-Pingback: http://serveuganda.wordpress.com/xmlrpc.php
X-Powered-By: PHP/5.3.27
Second query (visit from search engine):
GET / HTTP/1.1
Host: serveuganda.com
Referer: http://www.google.com/search?q=serveuganda.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: serveuganda.com
Referer: http://www.google.com/search?q=serveuganda.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=serveuganda.com
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://serveuganda.com/
Result: serveuganda.com is not infected or malware details are not published yet.
Result: serveuganda.com is not infected or malware details are not published yet.