Author Topic: Problemas para acessar o meu site  (Read 2106 times)

0 Members and 1 Guest are viewing this topic.

REDACTED

  • Guest
Problemas para acessar o meu site
« on: October 13, 2015, 02:19:00 PM »
Toda vez que entro no meu site onde o link é http://quednaudesign.com.br o avast bloqueia. eu queria que isso nao acontecesse mais. tem como?

Offline CraigB

  • Avast Überevangelist
  • Serious Graphoman
  • *****
  • Posts: 11239
  • No support PM's thanks
Re: Problemas para acessar o meu site
« Reply #1 on: October 13, 2015, 02:28:08 PM »
English please or use the Portuguese language board https://forum.avast.com/index.php?board=27.0

Offline jefferson sant

  • Starting Graphoman
  • *
  • Posts: 6677
  • volunteer
Re: Problemas para acessar o meu site
« Reply #2 on: October 17, 2015, 12:31:18 AM »



Boa noite Yago Quednau

O site  esta na lista negra informado pelo Quttera.

https://www.virustotal.com/pt/url/fd0a5b4451178cc771df012adacb054172cb710111bada1b8159e93536f61382/analysis/1445033014/

Code: [Select]

x< body style='color: transparent;background-color: black'> < center> < h1> < b style='color: white'> Hacked by NG689Skw < br> < p style='color: transparent'>


Foi mostrado aqui

http://quttera.com/detailed_report/quednaudesign.com.br

https://pt.wikipedia.org/wiki/Defacement

IP esta na Blacklist

Endereço IP 45.35.80.18 está listado na CBL. Ele mostra sinais de estar infectado com um trojan envio de spam, link malicioso ou alguma outra forma de botnet.
hospedeiro neste endereço IP está infectado com CryptPHP malware.

http://www.ipvoid.com/scan/45.35.80.18/

http://www.abuseat.org/lookup.cgi?ip=45.35.80.18
« Last Edit: October 17, 2015, 12:34:52 AM by jefferson sant »

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33891
  • malware fighter
Re: Problemas para acessar o meu site
« Reply #3 on: October 17, 2015, 01:20:22 AM »
PHP version on website is vulnerable. See the various vulnerabilities for the PHP version that is used: http://4.59.136.200/plugins/index.php?view=single&id=77285
This had been defaced with malicious PHP content: wp-content/plugins/revslider/rs-plugin/css/captions.css?ver=4.3.1
- it is possible for an attacker to read your wp-config.php and find your database credentials, which may allow them to compromise your site’s database. We don’t allow random IP addresses to connect directly to your database, but that may not prevent someone from finding a way to use database info to connect to your DB.

Seems now cleansed: -http://quednaudesign.com.br/wp-content/plugins/revslider/rs-plugin/js/jquery.themepunch.revolution.min.js?ver=4.3.1
200 OK
Content-Length: 83792
Content-Type: application/javascript
clean

WP Plug-in vulnerabilities can be checked with this: https://wordpress.org/plugins/plugin-vulnerabilities/
Rendering issues:
Render blocking resources

The elements below are blocking the “above the fold” rendering.
The javascript files below are blocking the rendering.
-http://quednaudesign.com.br/.. /jquery.js?ver=1.11.3
-http://quednaudesign.com.br/.. /jquery-migrate.min.js?ver=1.2.1
-http://quednaudesign.com.br/.. /jquery.themepunch.revolution.min.js?ver=...
-http://quednaudesign.com.br/.. /jquery.form.min.js?ver=3.51.0-2014.06.20...
-http://quednaudesign.com.br/.. /scripts.js?ver=4.3
-http://quednaudesign.com.br/.. /add-to-cart.min.js?ver=2.4.7
-http://quednaudesign.com.br/.. /select2.min.js?ver=3.5.2
-http://quednaudesign.com.br/.. /jquery.blockUI.min.js?ver=2.70
-http://quednaudesign.com.br/.. /woocommerce.min.js?ver=2.4.7
-http://quednaudesign.com.br/.. /jquery.cookie.min.js?ver=1.4.1
-http://quednaudesign.com.br/.. /cart-fragments.min.js?ver=2.4.7
-http://quednaudesign.com.br/.. /common.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /modernizr-2.6.2-respond-1.1.0.min.js?ver...
-http://quednaudesign.com.br/.. /noconflict.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /webfont.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /jquery.prettyPhoto.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /extensions.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /woocommerce.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /comment-reply.min.js?ver=4.3.1
-http://quednaudesign.com.br/.. /queryloader2.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /waypoints.min.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /waypoints-sticky.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /jquery.smoothscroll.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /jquery.flexslider.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /jquery.viewport.mini.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /jquery.validationEngine-pt.js?ver=2.6.19...
-http://quednaudesign.com.br/.. /jquery.validationEngine.js?ver=2.6.19
-http://quednaudesign.com.br/.. /front-subscribers.js?ver=2.6.19
-http://use.typekit.net/pgb4snz.js
-http://www.google-analytics.com/ga.js
You can save 25.1KB (6% compression) on the analysed URL by minifying the javascript files, CSS, etc.
The browser cache have not set correctly for all elements.

polonus (volunteer website security analyst and website error-hunter)
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!