Author Topic: Website server vulnerable to PHP Shell Exploit?  (Read 1215 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast √úberevangelist
  • Probably Bot
  • *****
  • Posts: 33647
  • malware fighter
Website server vulnerable to PHP Shell Exploit?
« on: December 28, 2015, 12:44:52 PM »
See: http://bashy.free.fr/phpse/phpse.php
Where? See: http://fetch.scritch.org/%2Bfetch/?url=+http%3A%2F%2Fyodacergy.free.fr&useragent=Fetch+useragent&accept_encoding=
Canonical & Other Meta   
Code: [Select]
{
    "html-title": "",
    "generator": "Microsoft FrontPage 4.0",
    "progid": "FrontPage.Editor.Document",
    "charset": "WINDOWS-1252"
}
See: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fyodacergy.free.fr
One to detect:
https://www.virustotal.com/nl/url/61d540856e53f6379bc6241f18b53a16aba2d7c437da0ff8fa4a93a370ea1a2d/analysis/1451302335/  Also consider: http://toolbar.netcraft.com/site_report?url=http://yodacergy.free.fr
website risk status 7 red out of 10!

polonus (volunteer website security analyst and website error-hunter)
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!