Redkit exploit sites can be detected as goog-malware-shavar: http://www.cknow.com/cms/articles/what-is-goog-malware-shavar.html (articled written by DaBoss)
and site is then being blacklisted- example: http://urlquery.net/report.php?id=97496
Web application details:
Plesk version 7 outdated: Upgrade required.
Running Plesk 7: resistenza dot it:8443 See: http://sitecheck.sucuri.net/results/resistenza.it/37263467.html
But trying to load htxp://www.google.nl/search?hl=nl&output=search&sclient=psy-ab&q=http%3A%2F%2Fresistenza.it%2F37263467.html&btnK=
avast Webshield alerts for JS:ScriptPE-inf[Trj]
Had I gone there, there would have been a conditional redirect: Header returned by request for: htxp://resistenza.it/37263467.html
HTTP/1.1 301 Moved Permanently
Date: Fri, 20 Jul 2012 14:24:07 GMT
Server: Apache
Location: htxp://bronzesage.ru/in.cgi?16 → http://urlquery.net/report.php?id=97788 Detected SutraTDS HTTP GET request
ET CURRENT_EVENTS MALVERTISING Malicious Advertizing URL in.cgi
And browser specific code. This comes after the < /html> tag and can be considered as suspicious
8: < !-- a padding to disable MSIE and Chrome friendly error page →
9: < !-- a padding to disable MSIE and Chrome friendly error page →
10: < !-- a padding to disable MSIE and Chrome friendly error page →
11: < !-- a padding to disable MSIE and Chrome friendly error page →
12: < !-- a padding to disable MSIE and Chrome friendly error page →
13: < !-- a padding to disable MSIE and Chrome friendly error page →
Using -XXem on the css positioning elements is used to hide the text given from the iframe on the current page despite the font size, due to its em measurement.
So -999em for top and left would completely hide the results in an unseen corner.