Avast community forum
Home
Help
Search
Login
Register
Avast WEBforum
»
Other
»
Viruses and worms
(Moderators:
Maxx_original
,
misak
) »
Site url phishing
« previous
next »
Print
Pages: [
1
]
Go Down
Author
Topic: Site url phishing (Read 1035 times)
0 Members and 1 Guest are viewing this topic.
Alyka
Newbie
Posts: 2
Site url phishing
«
on:
June 20, 2019, 05:09:15 AM »
I am having the same issue on
http://premiaprivate.lamp5.cloudsites.net.au/
can you help to disable that?
Logged
Pondus
Probably Bot
Posts: 37547
Not a avast user
Re: Site url phishing
«
Reply #1 on:
June 20, 2019, 07:25:08 AM »
Report a false positive (select file or website)
https://www.avast.com/false-positive-file-form.php
Logged
Alyka
Newbie
Posts: 2
Re: Site url phishing
«
Reply #2 on:
June 20, 2019, 07:54:23 AM »
Submited the form
Logged
polonus
Avast Überevangelist
Probably Bot
Posts: 33913
malware fighter
Re: Site url phishing
«
Reply #3 on:
June 20, 2019, 05:50:32 PM »
Hi Alyka,
No alerts here:
https://urlquery.net/report/73de88ee-a533-4f89-a7b8-ee95b313e0ee
also see:
https://www.shodan.io/host/103.9.64.234
Nothing in particular here:
https://www.virustotal.com/gui/domain/premiaprivate.lamp5.cloudsites.net.au/relations
1 vulnerable jQuery library found:
https://retire.insecurity.today/#!/scan/90c7b71594b99da9a1a94b6ea1555c2c2b488afa96e8a0aff48f571cb8e18adb
Reputation Check
PASSED
Google Safe Browse: OK
Spamhaus Check: OK
Abuse CC: OK
Dshield Blocklist: OK
Cisco Talos Blacklist: OK
Web Server:
Apache/2.4.39 (cPanel) OpenSSL/1.0.2r mod_bwlimited/1.4
X-Powered-By:
None
IP Address:
103.9.64.234
Hosting Provider:
ZETTAGRID CLOUD
Shared Hosting:
149 sites found on 103.9.64.234
Configuration error: User Enumeration
The first two user ID's were tested to determine if user enumeration is possible.
ID User Login
1 dy009i0Sif dy009i0sif
2 Alyka Development alykaadmin
It is recommended to rename the admin user account to reduce the chance of brute force attacks occurring. As this will reduce the chance of automated password attackers gaining access. However it is important to understand that if the author archives are enabled it is usually possible to enumerate all users within a WordPress installation.
Directory Indexing
In the test an attempt was made to list the directory contents of the uploads and plugins folders to determine if Directory Indexing is enabled. This is a common information leakage vulnerability that can reveal sensitive information regarding your site configuration or content.
/wp-content/uploads/ enabled
/wp-content/plugins/ disabled
Protection Recommendations
Directory Listing is enabled on your site. This can lead to information leakage. We recommend disabling Directory Listing.
HTTP Trace Method is allowed on your site. Allowing the TRACE method can be misused to attack your site.
See:
https://aw-snap.info/file-viewer/?protocol=not-secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=cH17bVt8cH1bdnx0ey5sfG1wNS5ebF11I3NbdHtzLm57dC58dQ%3D%3D~enc
Wait for a final verdict from an avast team member, as we here are volunteers with relevant knowlege,
but only avast team members can come and unblock.
OK->
https://sitecheck.sucuri.net/results/premiaprivate.lamp5.cloudsites.net.au
TLS Recommendations
HTTPS version of this website is not accessible: TLS certificate does not match the host name. Please consider setting up HTTPS to avoid the "Not Secure" browser warning.
polonus (volunteer 3rd party cold reconnaissance website security analyst and website error-hunter)
Logged
Cybersecurity is more of an attitude than anything else. Avast Evangelists.
Use NoScript, a limited user account and a virtual machine and be safe(r)!
HonzaZ
Avast team
Advanced Poster
Posts: 1038
Re: Site url phishing
«
Reply #4 on:
June 24, 2019, 02:01:13 PM »
Apparently already unblocked 20.06., 12:50 CEST
Logged
Print
Pages: [
1
]
Go Up
« previous
next »
Avast WEBforum
»
Other
»
Viruses and worms
(Moderators:
Maxx_original
,
misak
) »
Site url phishing