Reverse Deception: Organized Cyber Threat Counter-Exploitation (38 page)

Read Reverse Deception: Organized Cyber Threat Counter-Exploitation Online

Authors: Sean Bodmer

Tags: #General, #security, #Computers

BOOK: Reverse Deception: Organized Cyber Threat Counter-Exploitation
8.46Mb size Format: txt, pdf, ePub

 

Malware URL
   This data repository is a good resource that can be used to validate specific URLs. You can also search by other criteria, but this data source is focused mostly on malicious URLs. It is possible to register for a trial feed of the data, and the site
says
a corporation can purchase a feed of these malicious URLs. The data feed is especially useful for infector sites, exploit kits, and phishing sites. There are other crimeware families included in the list, but the data has not been updated daily (more like weekly or biweekly) and can’t be used to actively track any specific operators. The site is located at
www.malwareurl.com
.

 

Fair

 

Other Public Data Sources

The following are some additional public data sources. They are not at the top of our list for tactical use, but are handy and offer services and/or products related to the type of content they provide. Some are better than others (they are not listed in any specific order).

Team Cymru (
www.team-cymru.org
)
The Ethical Hacker Network (
www.ethicalhacker.net
)
YGN Ethical Hacker Group (
yehg.net/lab/#home
)
Wepawet (
wepawet.iseclab.org
)
Dasient (
wam.dasient.com/wam/infection_library_index
)
The Day Before Zero (
blog.damballa.com
)
VirusTotal (
www.virustotal.com
)
Antivirus Tracker (
www.avtracker.info
)
ViCheck.ca
(
www.vicheck.ca
)
Securelist (
www.securelist.com
)
Exploit Database (
www.exploit-db.com
)
Malc0de Database (
http://malc0de.com/dashboard/
)

Other books

Lem, Stanislaw by The Cyberiad [v1.0] [htm]
A Cold Dark Place by Gregg Olsen
Next Summer by Hailey Abbott
Romero by Elizabeth Reyes
The End of Eternity by Isaac Asimov
Raising Stony Mayhall by Daryl Gregory