Author Topic: Site url phishing  (Read 1006 times)

0 Members and 1 Guest are viewing this topic.

Offline Alyka

  • Newbie
  • *
  • Posts: 2
Site url phishing
« on: June 20, 2019, 05:09:15 AM »
I am having the same issue on http://premiaprivate.lamp5.cloudsites.net.au/

can you help to disable that?


Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37506
  • Not a avast user
Re: Site url phishing
« Reply #1 on: June 20, 2019, 07:25:08 AM »
Report a false positive (select file or website)
https://www.avast.com/false-positive-file-form.php



Offline Alyka

  • Newbie
  • *
  • Posts: 2
Re: Site url phishing
« Reply #2 on: June 20, 2019, 07:54:23 AM »
Submited the form

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33891
  • malware fighter
Re: Site url phishing
« Reply #3 on: June 20, 2019, 05:50:32 PM »
Hi Alyka,

No alerts here: https://urlquery.net/report/73de88ee-a533-4f89-a7b8-ee95b313e0ee
also see: https://www.shodan.io/host/103.9.64.234
Nothing in particular here: https://www.virustotal.com/gui/domain/premiaprivate.lamp5.cloudsites.net.au/relations
1 vulnerable jQuery library found: https://retire.insecurity.today/#!/scan/90c7b71594b99da9a1a94b6ea1555c2c2b488afa96e8a0aff48f571cb8e18adb
Reputation Check
PASSED
Google Safe Browse: OK
Spamhaus Check: OK
Abuse CC: OK
Dshield Blocklist: OK
Cisco Talos Blacklist: OK
Web Server:
Apache/2.4.39 (cPanel) OpenSSL/1.0.2r mod_bwlimited/1.4
X-Powered-By:
None
IP Address:
103.9.64.234
Hosting Provider:
ZETTAGRID CLOUD 
Shared Hosting:
149 sites found on 103.9.64.234

Configuration error:  User Enumeration
  The first two user ID's were tested to determine if user enumeration is possible.

ID   User   Login
1   dy009i0Sif   dy009i0sif
2   Alyka Development   alykaadmin
It is recommended to rename the admin user account to reduce the chance of brute force attacks occurring. As this will reduce the chance of automated password attackers gaining access. However it is important to understand that if the author archives are enabled it is usually possible to enumerate all users within a WordPress installation.

 Directory Indexing
In the test an attempt was made to list the directory contents of the uploads and plugins folders to determine if Directory Indexing is enabled. This is a common information leakage vulnerability that can reveal sensitive information regarding your site configuration or content.

/wp-content/uploads/      enabled
/wp-content/plugins/      disabled

Protection Recommendations
Directory Listing is enabled on your site. This can lead to information leakage. We recommend disabling Directory Listing.

HTTP Trace Method is allowed on your site. Allowing the TRACE method can be misused to attack your site.

See: https://aw-snap.info/file-viewer/?protocol=not-secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=cH17bVt8cH1bdnx0ey5sfG1wNS5ebF11I3NbdHtzLm57dC58dQ%3D%3D~enc

Wait for a final verdict from an avast team member, as we here are volunteers with relevant knowlege,
but only avast team members can come and unblock.

OK->
https://sitecheck.sucuri.net/results/premiaprivate.lamp5.cloudsites.net.au

TLS Recommendations
HTTPS version of this website is not accessible: TLS certificate does not match the host name. Please consider setting up HTTPS to avoid the "Not Secure" browser warning.

polonus (volunteer 3rd party cold reconnaissance website security analyst and website error-hunter)
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline HonzaZ

  • Avast team
  • Advanced Poster
  • *
  • Posts: 1038
Re: Site url phishing
« Reply #4 on: June 24, 2019, 02:01:13 PM »
Apparently already unblocked 20.06., 12:50 CEST