Reverse Deception: Organized Cyber Threat Counter-Exploitation (38 page)

Read Reverse Deception: Organized Cyber Threat Counter-Exploitation Online

Authors: Sean Bodmer

Tags: #General, #security, #Computers

BOOK: Reverse Deception: Organized Cyber Threat Counter-Exploitation
12.13Mb size Format: txt, pdf, ePub

 

Malware URL
   This data repository is a good resource that can be used to validate specific URLs. You can also search by other criteria, but this data source is focused mostly on malicious URLs. It is possible to register for a trial feed of the data, and the site
says
a corporation can purchase a feed of these malicious URLs. The data feed is especially useful for infector sites, exploit kits, and phishing sites. There are other crimeware families included in the list, but the data has not been updated daily (more like weekly or biweekly) and can’t be used to actively track any specific operators. The site is located at
www.malwareurl.com
.

 

Fair

 

Other Public Data Sources

The following are some additional public data sources. They are not at the top of our list for tactical use, but are handy and offer services and/or products related to the type of content they provide. Some are better than others (they are not listed in any specific order).

Team Cymru (
www.team-cymru.org
)
The Ethical Hacker Network (
www.ethicalhacker.net
)
YGN Ethical Hacker Group (
yehg.net/lab/#home
)
Wepawet (
wepawet.iseclab.org
)
Dasient (
wam.dasient.com/wam/infection_library_index
)
The Day Before Zero (
blog.damballa.com
)
VirusTotal (
www.virustotal.com
)
Antivirus Tracker (
www.avtracker.info
)
ViCheck.ca
(
www.vicheck.ca
)
Securelist (
www.securelist.com
)
Exploit Database (
www.exploit-db.com
)
Malc0de Database (
http://malc0de.com/dashboard/
)

Other books

In a Heartbeat by Elizabeth Adler
Forever Is Over by Wade, Calvin
The Dance by Alison G. Bailey
The Colonel's Lady by Laura Frantz
My Star by Christine Gasbjerg
Peak Oil by Arno Joubert
Sold for Sex by Bailey, J.A.