Malicious website with vulnerable CMS....

Malicious static Olark embedded code detected?

What site was flagged 1 hour ago: http://killmalware.com/twisp.co.za/#
Not flagged here: https://www.virustotal.com/en/url/e70a37ae5d6373739927b2d50d71dc88b28c3c6433ba9edcec5d8fceead77265/analysis/
nor here: https://sitecheck.sucuri.net/results/www.twisp.co.za
while this is outdated: Wordpress Version 4.1 based on: -http://www.twisp.co.za/wp-includes/js/autosave.js

Re: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fwww.twisp.co.za%2Fwp-includes%2Fjs%2Fautosave.js

Also consider: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fwww.twisp.co.za%2Fwp-includes%2Fjs%2Fjquery%2Fjquery-migrate.min.js%3Fver%3D1.2.1

WordPress Version
4.2.7
Version does not appear to be latest 4.4.2 - update now.

WordPress Plugins
The following plugins were detected by reading the HTML source of the WordPress sites front page.

woocommerce 2.1.6 latest release (2.5.2) Update required
http://www.woothemes.com/woocommerce/
revslider
go_pricing
theme-my-login 6.3.9 latest release (6.4.4) Update required
http://www.jfarthing.com/extend/wordpress-plugins/theme-my-login/
woocommerce-bulk-discount 2.2 latest release (2.4.1) Update required
http://wordpress.org/plugins/woocommerce-bulk-discount/
recent-tweets-widget 1.3 latest release (1.6.4) Update required
http://wordpress.org/extend/plugins/recent-tweets-widget/
wordpress-seo 1.7.4 latest release (3.0.7) Update required
https://yoast.com/wordpress/plugins/seo/
woocommerce-composite-products
LayerSlider
contact-form-7 3.9.2 latest release (4.4) Update required
http://contactform7.com/
Plugins are a source of many security vulnerabilities within WordPress installations, always keep them updated to the latest version available and check the developers plugin page for information about security related updates and fixes.

Warning User Enumeration is possible
The first two user ID’s were tested to determine if user enumeration is possible.

ID User Login :o
1 chregan chregan
2 None
It is recommended to rename the admin user account to reduce the chance of brute force attacks occurring. As this will reduce the chance of automated password attackers gaining access. However it is important to understand that if the author archives are enabled it is usually possible to enumerate all users within a WordPress installation.

No vulnerable jQuery libraries found.

iFrame

A-rated: https://sritest.io/#report/c74c7c74-3c99-41f5-ae9c-1c152c7a6db3
XSS vulnerable: Stylesheets 2 issues
Tag Result

Missing SRI hash Missing SRI hash

Possible Frontend SPOF from:

html5shiv.googlecode.com - Whitelist
(58%) -
fonts.googleapis.com - Whitelist
(48%) -
(47%) -

Insecure Identifiers detected: 57% of the trackers on this site could be protecting you from NSA snooping. Tell twisp.co.za to fix it.

Re: http://www.dnsinspect.com/twisp.co.za/1456755869 issues like:

WARNING: Name servers software versions are exposed:
196.22.142.254: “9.8.4-rpz2+rl005.12-P1”
196.40.99.254: “9.8.4-rpz2+rl005.12-P1”
41.204.201.2: “9.8.4-rpz2+rl005.12-P1”

Exposing name server’s versions may be risky, when a new vulnerability is found your name servers may be automatically exploited by script kiddies until you patch the system. Learn how to hide version.

polonus (volunteer website security analyst and website error-hunter)