> OK...I'll do some testing tomorrow and see if we can't come up with some
> information for you.
>
> Matt



> in the last few days a lot of spam is (ab)using t.co shortened URLs in
> the payload, so these are ending up in bofhland_cracked_URL.ndb (~7K
> distinct URLs atm)
>

Sorry for the cross post...

Hi,

In doing a very small single file test using the bofhland_cracked_URL.ndb,
it look ** 66 seconds ** to scan the file.

Having a quick look at repeating pattens in the file, 777777 (www) was
common, so just for testing I tried this...

sed "s/(B)7777772E/2E/g" bofhland_cracked_URL.ndb >
bofhland_cracked_URL_test.ndb

This will remove the beginning boundary check and the www. bit... and
replace with a single ".", which hopefully will be a simple boundary
separator:

If I now scan the same file, but using the bofhland_cracked_URL_test.ndb
database, it only takes ** 5 seconds ** :O

Not sure if this is the workaround... but certainly food for thought.

Cheers,

Steve
Sanesecurity

_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to