See: http://killmalware.com/newpridecorporation.com/#
Consider -http://www.domxssscanner.com/scan?url=http%3A%2F%2Fnewpridecorporation.com
5 red out of 10 risk status: http://toolbar.netcraft.com/site_report?url=http://208.70.72.12
PHP can be edited to crash: http://stackoverflow.com/questions/1583033/xampp-i-edited-php-ini-and-now-apache-crashes
- Excessive server info proliferation on outdated server software.
ISSUE DETECTED DEFINITION INFECTED URL
Website Malware malware-entry-mwblacklisted35 http://newpridecorporation.com/index.php?option=com_content&view=article&id=48&Itemid=57 ( View Payload )
Suspicious domain detected. Details: http://sucuri.net/malware/malware-entry-mwblacklisted35
Location: -http://opec.lflink.com/ does not resolve now.
Read about the hack from the expert Redleg: https://productforums.google.com/forum/#!msg/webmasters/88oCerYqvGQ/zSzA0H0ZScIJ
jquery.bgiframe.min.js vulnerable to clickframe exploits and was used to infect with JLNP, JS/Exploit-Blacole.eq, Mal/Iframe-AF, Trojan/Script.Gen, Trojan:JS/BlacoleRef.W, JS - could cause errors in IE9-stack.
Superfish V1.4.8 Clashes With SWF - blind sql injection patched in IE8 - comvbined with Mootools… **
code apparently not checked/tested against vulnerabilities and exploits :o
Web application details:
Application: Joomla! 1.5 - Open Source Content Management - http://www.joomla.org
Web application version:
Joomla Version
1.5
Found in META Generator Tag
Joomla Version 1.5.15 for: -http://newpridecorporation.com/media/system/js/caption.js
Joomla Version 1.5.15 for: -http://newpridecorporation.com/language/en-GB/en-GB.ini
Joomla version outdated: Upgrade required.
Outdated Joomla Found: Joomla under 2.5.28 or 3.4.3
Joomla Modules, Components and Plugins
The following modules were detected from the HTML source of the Joomla front page.
mod_superfishmenu **
Outdated Web Server Apache Found: Apache/2.2.11 *
Externally linked host: -npc.gncomputer.com → http://toolbar.netcraft.com/site_report?url=npc.gncomputer.com
bad zone: Could not get name servers for ‘npc.gncomputer.com’. That is why it is so important to do a DNS scan
in case of issues and vulnerabilities, could be a rather good indicator for a sub-domain, here the top domain scan:
http://www.dnsinspect.com/gncomputer.com/1441708172 Only 1 nameserver detected, should be 2 to 7;
nameserver cannot be reached via IPv6. Nameserver software exposed: “Microsoft DNS 6.1.7601 (1DB14556)”
Excessive header warning: Server: Microsoft-HTTPAPI/2.0 httpd 2.0 (SSDP/UPnP) cpe:/o:microsoft:windows
See: https://asafaweb.com/Scan?Url=gncomputer.com
- bein’ at risk from clickjacking attack
Mailserver issues
polonus (volunteer website security analyst and website error-hunter)