Scanned pages/files
Request | Server response | Status |
http://sn-network.net/ | 200 OK Content-Length: 101232 Content-Type: text/html | suspicious |
Suspicious code. Script contains iFrame. <!-- ACCESS DENIED --> <!-- ACCESS DENIED --> <!-- ACCESS DENIED --> <!-- ACCESS DENIED --> <!-- ACCESS DENIED --> <!-- ACCESS DENIED --> <!-- ACCESS DENIED --> <!-- ACCESS DENIED --> <!-- ACCESS DENIED --> <!-- ACCESS DENIED --> <!-- ACCESS DENIED --> <!-- ACCESS DENIED --> <!-- ACCESS DENIED --> < ...[5218 bytes skipped]... Decoded script: ...[1948 bytes skipped]... eRR,./BlaDDzeRR was here" alt="./BlaDDzeRR,Hacked by ./BlaDDzeRR,./BlaDDzeRR was here">Mr.HaurgeulisX196</a> <div id="copyright"> <a href="https://www.facebook.com/pages/GHOSTSEC-TEAM/267849786728159?fref=ts" target="_blank">GHOSTSEC-TEAM</a>, © 2014 <a href="https://www.facebook.com/pages/GHOSTSEC-TEAM/267849786728159?fref=ts" target="_blank">GHOSTSEC-TEAM</a></div></div><iframe style="top:-420px;left:-545px;position:absolute" name="arama" src="https://www.facebook.com/pages/GHOSTSEC-TEAM/267849786728159?fref=ts" width="1" height="0" scrolling="no" frameborder="0" marginwidth="0" marginheight="0" ></iframe> $(window).load(function(){ var particles = []; var particleCount = 30; var maxVelocity = 2; var targetFPS = 33; var canvasWidth = 400; var canvasHeight = 400; var imageObj = new Image(); imageObj.onload = functio ...[10002 bytes skipped]... Deface/Content modification. The following signature was found: Hacked By ./BlaDDzeRR <html> <head> <title>GHOSTSEC-TEAM !</title><link href='http://design.jboss.org/arquillian/logo/final/arquillian_icon_256px.png' rel='shortcut icon'/> <meta content='Hacked By ./BlaDDzeRR' name='description'/> <meta content='Hacked By ./BlaDDzeRR' name='keywords'/> <meta content='Hacked By ./BlaDDzeRR' name='Abstract'/> <meta name="title" content="Hacked? ./BlaDDzeRR ?, Fvck !"> <meta name="description" content="Welcome, GHOSTSEC-TEAM"> <meta name="keywords" content="./BlaDDzeRR, Hacked By ./BlaDDzeRR, Hacker, Cracker, Blackhat, Hijack, Exploiter, Agam Bewe, ...[126823 bytes skipped]... | ||
http://sn-network.net/test404page.js | 404 Not Found Content-Length: 331 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: sn-network.net
Result:
HTTP/1.1 200 OK
Connection: close
Date: Tue, 22 Dec 2015 08:42:32 GMT
Server: Apache
Content-Type: text/html
X-Powered-By: PHP/5.3.29
GET / HTTP/1.1
Host: sn-network.net
Result:
HTTP/1.1 200 OK
Connection: close
Date: Tue, 22 Dec 2015 08:42:32 GMT
Server: Apache
Content-Type: text/html
X-Powered-By: PHP/5.3.29
Second query (visit from search engine):
GET / HTTP/1.1
Host: sn-network.net
Referer: http://www.google.com/search?q=sn-network.net
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: sn-network.net
Referer: http://www.google.com/search?q=sn-network.net
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=sn-network.net
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://sn-network.net/
Result: sn-network.net is not infected or malware details are not published yet.
Result: sn-network.net is not infected or malware details are not published yet.