Author Topic: Parked domain hacked and defaced on insecure hoster...  (Read 1447 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33908
  • malware fighter
Parked domain hacked and defaced on insecure hoster...
« on: May 26, 2016, 06:46:45 PM »
See: http://killmalware.com/jogral.ru/#
Re: -http://jogral.ru//parking.jino.ru/static/main.js/
Quote
Ошибка 404. Файл не найден
Возможно, вы ошиблись при наборе адреса, или ссылка, по которой вы прошли, устарела.

Если вы владелец этого сайта, ознакомьтесь с возможными причинами возникновения этой ошибки. Вы также можете изменить эту страницу.
Netcraft Risk Scale 7 red out of 10: http://toolbar.netcraft.com/site_report?url=http://jogral.ru
Nameserver at hoster DROWn vulnerable: https://test.drownattack.com/?site=ns1.jino.ru

Cypto Report: jino.ru
Info
BEAST
The BEAST attack is not mitigated on this server.
Certificate information
This server uses a Domain Validated (DV) certificate. No information about the site owner has been validated. Data is protected, but exchanging personal or financial information is not recommended.
Common name:
 *.jino.ru
SAN:
 *.jino.ru, jino.ru
Valid from:
 2016-Jan-10 20:10:11 GMT
Valid to:
 2018-Feb-11 04:25:40 GMT
Certificate status:
 Valid
Revocation check method:
 OCSP
Organization:
 
Organizational unit:
 
City/locality:
 
State/province:
 
Country:
 
Certificate Transparency:
 Not embedded in certificate
Serial number:
 097849
Algorithm type:
 SHA256withRSA
Key size:
 2048
Certificate chainShow details
RapidSSL SHA256 CA - G3Intermediate certificate
*.jino.ruTested certificate
Server configuration
Host name:
 81.177.135.100
Server type:
 nginx
IP address:
 81.177.135.100
Port number:
 443
Protocols enabled:
TLS1.2
TLS1.1
TLS1.0
Protocols not enabled:
SSLv3
SSLv2
Secure Renegotiation:
 Enabled
Downgrade attack prevention:
 Enabled
Next Protocol Negotiation:
 Enabled
Session resumption (caching):
 Enabled
Session resumption (tickets):
 Enabled
Strict Transport Security (HSTS):
 Not Enabled
SSL/TLS compression:
 Not Enabled
Heartbeat (extension):
 Enabled
RC4:
 Not Enabled
OCSP stapling:
 Not Enabled

The Apache webserver firewall mod_pizza is easily circumvented  :o

pol
« Last Edit: May 26, 2016, 06:51:16 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!