Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

theyareliars

Name: noko 2010-04-15 17:59

a buddy tricked me into going to a website, which was just a blank white page. i looked at the source and it had a hidden applet which named a few .exe files. it looked very much like it was meant to download and run some exploit, but I didn't get any security warnings.
can someone please take a look and see if this site is dangerous or if it's just meant to scare me?
theyareliars.info
(warning, this site may harm your computer, etc etc)

Name: Anonymous 2010-04-15 18:31

Okay, let's get serious. This is the main page:

<title>They Are Liars!</title>

<style type="text/css">
html {overflow: auto;}
html, body, div, iframe {margin: 0px; padding: 0px; height: 100%; border: none;}
iframe {display: block; width: 100%; border: none; overflow-y: auto; overflow-x: hidden;}
</style>
</head>
<body>
<iframe id="tree" name="tree" src="index1.php" frameborder="0" marginheight="0" marginwidth="0" width="100%" height="100%" scrolling="auto"></iframe>
</body>
</html>

This simply loads an iframe filling the whole browser area. Just a trick to hide the internal URLs by always showing the same URL into the location bar. Quite typical. However, the HTML code itself can't be lamer: not even an <html> opening tag!

Now let's have a look to that index1.php:
<title>Who were they to tell us?</title>

<body bgcolor="BLACK">

<br><br>
<center><img src="splash.png" border="0"><br>
<a href="answers.php"><font size="5" color="#333333">ENTER</font></a></center><br><br>

A splash image and a link. The .png file looks like a PNG image. And what is answers.php? This:

<TITLE>They Are Liars!</title>
<!-- They expect us to wish upon a star
They don't tell us that star is deadly --!>

<head>
<style type="text/css">
a {color: BLACK; text-decoration: none; }
</style>
</head>


<body bgcolor="BLACK">
<br><br>
<center><img src="twitterdotcom@theyareliars.gif" border="0"><br>
<font color="#333333">30:32:20:2f:20:31:39:20:2f:20:32:30:30:37</font><br>
<font color="#333333">Guvf vf gur cynpr jurer rira natryf srne gb gernq.</font><br>
<a href="" onClick="history.go(0)">answers?</a> ?'s
<br><br><br>
7447<embed src="1.mp3" width="1" height="1" autostart="true" loop=TRUE hidden="true"></embed>
<!-- <embed src="2.mp3" width="1" height="1" autostart="true" loop=TRUE hidden="true"></embed> --></center>

[b]ENTERPRISE QUALITY[/q]. Invalid HTML code, setting an e-mail address as the source for an image, and trying to reproduce whatever sound is contained inside that 1.mp3 file. Ah, the onclick="history.go(0)" puzzles me. Nice way to do nothing, and do it improperly.

Summarizing: you won't catch any infection by visiting this site. The author is too lame.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List