See: http://killmalware.com/drpadin.com/#
Re: the analysis of a likewise hack/ defacement by izumino: http://killmalware.com/drpadin.com/#
Consider the obfuscated form decoded: -http://ddecode.com/hexdecoder/?results=2ca3c41aeaaa8b45dd7e5cfa47532517
and -http://www.domxssscanner.com/scan?url=http%3A%2F%2Fdrpadin.com%2Fganteng.htm
Re: error: ./pre.js:249: InternalError: too much recursion (endless recursion).
The address you entered is unnecessarily exposing the following response headers which divulge its choice of web platform:
Server: Apache/2.2.26 (Unix) mod_ssl/2.2.26 OpenSSL/1.0.1e-fips mod_auth_passthrough/2.1 mod_bwlimited/1.4
Configuring the application to not return unnecessary headers keeps this information silent and makes it significantly more difficult to identify the underlying frameworks.
Abuse on: -https://trapper.whspn.net/cgi-sys/defaultwebpage.cgi
Phishing performed from: -http://drpadin.com/googlee1d9e84306cc0d00.html
polonus (volunteer website security analyst and website error-hunter)