Scanned pages/files
Request | Server response | Status |
http://videoresponsestation.com/ | 200 OK Content-Length: 831 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: HACKED by TheZero <html>
<head> <title>HACKED by TheZero</title> </head> <style type="text/css"> <!-- body,td,th {color: #FFFFFF;} body {background-color: #000000;} a {font-family: Courier New, Courier, monospace;font-size: 12px;color: #CCCCCC;}a:visited {color: #333333;} a:hover {color: #FFFFFF;}a:active {color: #FFFFFF;} --> </style> <body> <center> <h1>HACKED by Th ...[603 bytes skipped]... | ||
http://www.usuarios-online.com/usuarios.php?v=TheZero | HTTP/1.1 301 Moved Permanently Connection: close Date: Sat, 12 Dec 2015 07:11:31 GMT Location: http://static.usuarios-online.com/uoo.js?&v=TheZero Server: nginx/1.2.6 Content-Length: 184 Content-Type: text/html | clean |
http://static.usuarios-online.com/uoo.js?&v=thezero | 200 OK Content-Length: 1840 Content-Type: application/x-javascript | clean |
http://videoresponsestation.com/test404page.js | HTTP/1.1 302 Found Connection: close Date: Sat, 12 Dec 2015 07:11:32 GMT Location: http://boatman.sogero.kr/error_404.html Server: Apache Vary: Accept-Encoding Content-Length: 223 Content-Type: text/html; charset=iso-8859-1 | clean |
http://boatman.sogero.kr/error_404.html | 200 OK Content-Length: 355 Content-Type: text/html | clean |
http://boatman.sogero.kr/test404page.js | HTTP/1.1 302 Found Connection: close Date: Sat, 12 Dec 2015 07:11:35 GMT Location: http://boatman.sogero.kr/error_404.html Server: Apache/2.2.11 (Unix) mod_ssl/2.2.11 OpenSSL/0.9.8d DAV/2 PHP/5.2.9 Content-Length: 223 Content-Type: text/html; charset=iso-8859-1 | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: videoresponsestation.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sat, 12 Dec 2015 07:11:31 GMT
Server: Apache
Vary: Accept-Encoding
Content-Length: 831
Content-Type: text/html
...831 bytes of data.
GET / HTTP/1.1
Host: videoresponsestation.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sat, 12 Dec 2015 07:11:31 GMT
Server: Apache
Vary: Accept-Encoding
Content-Length: 831
Content-Type: text/html
...831 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: videoresponsestation.com
Referer: http://www.google.com/search?q=videoresponsestation.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: videoresponsestation.com
Referer: http://www.google.com/search?q=videoresponsestation.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=videoresponsestation.com
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://videoresponsestation.com/
Result: videoresponsestation.com is not infected or malware details are not published yet.
Result: videoresponsestation.com is not infected or malware details are not published yet.