Author Topic: Weak hoster security created possibilties for defacement..  (Read 879 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33928
  • malware fighter
Weak hoster security created possibilties for defacement..
« on: August 03, 2015, 11:52:42 PM »
See: http://killmalware.com/agrotis.gr/  and the hosting party = http://toolbar.netcraft.com/site_report?url=http://www.uranushost.com  Excessive server header info proliferation: Apache/2.2.20 Unix mod_ssl/2.2.20 OpenSSL/0.9.8m DAV/2 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 mod_jk/1.2.30
WARNING: Found missing name servers:
ns1.adnserver.com.
ns2.adnserver.com.
Another risk: WARNING: Name servers software versions are exposed:
198.154.228.179: "9.3.6-P1-RedHat-9.3.6-25.P1.el5_11.3"
198.154.248.240: "9.3.6-P1-RedHat-9.3.6-25.P1.el5_11.3"
see: http://www.dnsinspect.com/uranushost.com/1438637871
-> http://198.154.228.179/cgi-sys/defaultwebpage.cgi -> htxp://www.noorfatema.org/up/uploads/13523242842.png
via htxp://bestessaywriting.services/wp-content/themes/ph_theme3.8/html5shiv.js ->  htxp://bestessaywriting.services/wp-content/themes/ph_theme3.8/ordb.js -> includes  Sizzle.js!
Corruption using
Code: [Select]
compatMode==="CSS1Compat"&&e.document.documentElement["client"+b]|| e.document.body["client"+b]:e.nodeType==
polonus (volunteer website security analyst and website error-hunter)
« Last Edit: August 03, 2015, 11:55:46 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!