See: http://killmalware.com/homeloans-nevada.com/#
Quttera flags: index
Severity: Suspicious
Reason: Detected suspicious redirection to external web resources at HTTP level.
Details: Detected HTTP redirection to htxp://abe.muhay.eu/s.php.
File size[byte]: 0
File type: Unknown
Page/File MD5: 00000000000000000000000000000000
Scan duration[sec]: 0.001000
Web application version:
WordPress version: WordPress
Wordpress version from source: 3.3.2
Wordpress Version 3.3.2 based on: htxp://homeloans-nevada.com/wp-admin/js/common.js
WordPress directory: htxp://homeloans-nevada.com/wp-content
WordPress theme: htxp://homeloans-nevada.com/wp-content/themes/thesis_181/
Wordpress internal path: /home/content/59/7669159/html/wp-content/themes/thesis_181/index.php
WordPress version outdated: Upgrade required.
Outdated WordPress Found: WordPress Under 4.2
WordPress Version
3.3.2
Version does not appear to be latest 4.2.1 - update now.
he following plugins were detected from the HTML source of the WordPress front page.
simple-real-estate-pack-4
contact-form-7
dynamic-headers
Theme : thesis_181 (can be exploited, read: http://zennolab.com/discussion/threads/please-help-understand-if-my-site-got-hacked.2787/ )
User Enumeration Warning
The first two user ID’s were tested to determine if user enumeration is possible.
User ID 1 : dwightmillard
User ID 2 : douglas
External links checked:
-www.mlcalc.com Akamai Technologies United States
-player.streamtheworld.com Triton Digital Canada
polonus (volunteer website security analyst and website error-hunter)