Bill> We may need expanded rules to handle obfuscation.  The following
    Bill> javascript decodes into another obfuscation javasscript.  I didn't
    Bill> have time to persue it further (what the sender is counting on i
    Bill> suppose)...

Well, I wasted a couple minutes this morning translating it to Python and
executing it in an interpreter shell... ;-)  When all is said and done it
expands to

    <base href="http://images.adultplex.com/AP1/pgirl/";>

I don't know what triggers are set up for Javascript beyond what's in 2.20
but the presence of something.charCodeAt or String.fromCharCode seems like a
surefire sign of obfuscation.  I'd suggest a rule something like:

    rawbody OBFUSCATING_JAVASCRIPT      /charCodeAt|fromCharCode/
    describe OBFUSCATING_JAVASCRIPT     JavaScript which tries to hide the message

-- 
Skip Montanaro
[EMAIL PROTECTED]
consulting: http://manatee.mojam.com/~skip/resume.html

_______________________________________________________________

Don't miss the 2002 Sprint PCS Application Developer's Conference
August 25-28 in Las Vegas - 
http://devcon.sprintpcs.com/adp/index.cfm?source=osdntextlink

_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to