Re: [Clamav-users] PUA.HTML.Infected.WebPage-1

2010-06-10 Thread Arnaud Jacques
Hello, Le Thursday 03 June 2010 13:05:39 Jiri Reischig, vous avez écrit : > Hi all, > > is it possible find anywhere information what "PUA.HTML.Infected.WebPage" > exactly means if it's detected in the file? > > It's look like that it detects files with iframe html tag. > When yes it can detect a

Re: [Clamav-users] PUA.HTML.Infected.WebPage-1

2010-06-04 Thread Steve Basford
> Yep, please open a ticket in our bugzilla Entry added: https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2063 BTW, might be an idea to add "Sigtool" to the component options page on Bugzilla. Cheers, Steve Sanesecurity ___ Help us build a comprehe

Re: [Clamav-users] PUA.HTML.Infected.WebPage-1

2010-06-04 Thread Tomasz Kojm
On Thu, 3 Jun 2010 13:57:02 +0100 Steve Basford wrote: > Could a --database type option be added to sigtool, for loading databases > outside the normal DatabaseDirectory area from the clamd.conf file? Yep, please open a ticket in our bugzilla -- oo. Tomasz Kojm (\/)\.

Re: [Clamav-users] PUA.HTML.Infected.WebPage-1

2010-06-03 Thread Jiri Reischig
Thank you all. The command sigtool is wery useful for me. -- Jiri Reischig Econnect Internet provider for NGO Puskinovo nam. 5,160 00 Praha 6, Czech Republic Tel: +420 224 311 780 Fax: +420 224 317 892 Web: http://www.ecn.cz Dne Čt 3. června 2010 Steve Basford napsal(a): > > You can use 'sigt

Re: [Clamav-users] PUA.HTML.Infected.WebPage-1

2010-06-03 Thread Dennis Peterson
On 6/3/10 6:24 AM, Dennis Peterson wrote: This is brute force but works: grep -h Sanesecurity.Phishing.Fake.13780 * 2>/dev/null |sigtool --decode-sigs dp It's brute force but apparently so too is the sigtool method. Grep is faster. dp ___ Help us

Re: [Clamav-users] PUA.HTML.Infected.WebPage-1

2010-06-03 Thread Dennis Peterson
On 6/3/10 5:57 AM, Steve Basford wrote: You can use 'sigtool -fPUA.HTML.Infected.WebPage' to find and print the sigs, no need to unpack. Also works for: sigtool -fSanesecurity.Phishing.Fake.13780 | sigtool --decode-sigs Could a --database type option be added to sigtool, for loading database

Re: [Clamav-users] PUA.HTML.Infected.WebPage-1

2010-06-03 Thread Steve Basford
> > You can use 'sigtool -fPUA.HTML.Infected.WebPage' to find and print the > sigs, no need to unpack. Also works for: sigtool -fSanesecurity.Phishing.Fake.13780 | sigtool --decode-sigs Could a --database type option be added to sigtool, for loading databases outside the normal DatabaseDirectory

Re: [Clamav-users] PUA.HTML.Infected.WebPage-1

2010-06-03 Thread Steve Basford
> You can use 'sigtool -fPUA.HTML.Infected.WebPage' to find and print the > sigs, no need to unpack. Nice... thanks Edwin: sigtool -fPUA.HTML.Infected.WebPage | sigtool --decode-sigs :) Cheers, Steve Sanesecurity ___ Help us build a comprehensive Cl

Re: [Clamav-users] PUA.HTML.Infected.WebPage-1

2010-06-03 Thread Török Edwin
On 06/03/2010 03:42 PM, Steve Basford wrote: > Ooops... forgot the sigtool un-pack bit (note: daily file only) > > sigtool --unpack-current=daily > grep "PUA.HTML.Infected.WebPage" daily.* -h > sig.tmp > sigtool --decode-sigs < sig.tmp > decodedsig.tmp > cat decodedsig.tmp You can use 'si

Re: [Clamav-users] PUA.HTML.Infected.WebPage-1

2010-06-03 Thread Steve Basford
Ooops... forgot the sigtool un-pack bit (note: daily file only) sigtool --unpack-current=daily grep "PUA.HTML.Infected.WebPage" daily.* -h > sig.tmp sigtool --decode-sigs < sig.tmp > decodedsig.tmp cat decodedsig.tmp Cheers, Steve Sanesecurity __

Re: [Clamav-users] PUA.HTML.Infected.WebPage-1

2010-06-03 Thread Steve Basford
> Hi all, > > is it possible find anywhere information what "PUA.HTML.Infected.WebPage" > exactly means if it's detected in the file? > > It's look like that it detects files with iframe html tag. > When yes it can detect a lot of files which it's OK and not include any > "bad" > aplication or malw