a buddy tricked me into going to a website, which was just a blank white page. i looked at the source and it had a hidden applet which named a few .exe files. it looked very much like it was meant to download and run some exploit, but I didn't get any security warnings.
can someone please take a look and see if this site is dangerous or if it's just meant to scare me?
theyareliars.info
(warning, this site may harm your computer, etc etc)
Name:
Anonymous2010-04-15 18:31
Okay, let's get serious. This is the main page:
<title>They Are Liars!</title>
<style type="text/css">
html {overflow: auto;}
html, body, div, iframe {margin: 0px; padding: 0px; height: 100%; border: none;}
iframe {display: block; width: 100%; border: none; overflow-y: auto; overflow-x: hidden;}
</style>
</head>
<body>
<iframe id="tree" name="tree" src="index1.php" frameborder="0" marginheight="0" marginwidth="0" width="100%" height="100%" scrolling="auto"></iframe>
</body>
</html>
This simply loads an iframe filling the whole browser area. Just a trick to hide the internal URLs by always showing the same URL into the location bar. Quite typical. However, the HTML code itself can't be lamer: not even an <html> opening tag!
Now let's have a look to that index1.php: <title>Who were they to tell us?</title>
<body bgcolor="BLACK">
<br><br>
<center><img src="splash.png" border="0"><br>
<a href="answers.php"><font size="5" color="#333333">ENTER</font></a></center><br><br>
A splash image and a link. The .png file looks like a PNG image. And what is answers.php? This:
<TITLE>They Are Liars!</title>
<!-- They expect us to wish upon a star
They don't tell us that star is deadly --!>
<body bgcolor="BLACK">
<br><br>
<center><img src="twitterdotcom@theyareliars.gif" border="0"><br>
<font color="#333333">30:32:20:2f:20:31:39:20:2f:20:32:30:30:37</font><br>
<font color="#333333">Guvf vf gur cynpr jurer rira natryf srne gb gernq.</font><br>
<a href="" onClick="history.go(0)">answers?</a> ?'s
<br><br><br>
7447<embed src="1.mp3" width="1" height="1" autostart="true" loop=TRUE hidden="true"></embed>
<!-- <embed src="2.mp3" width="1" height="1" autostart="true" loop=TRUE hidden="true"></embed> --></center> [b]ENTERPRISE QUALITY[/q]. Invalid HTML code, setting an e-mail address as the source for an image, and trying to reproduce whatever sound is contained inside that 1.mp3 file. Ah, the onclick="history.go(0)" puzzles me. Nice way to do nothing, and do it improperly.
Summarizing: you won't catch any infection by visiting this site. The author is too lame.