>> two bits of sa related code i've written, neither of them are what  
>> i'd particularly call "polished", but if you feel like firing them  
>> up, i'd love to hear your feedback:
>> 
>> Phisher:
>> http://www.faisal.com/software/phisher/
>> This is a plugin that does nothing more complicated than check for  
>> the case of something like <a href="http://scam.ru";>www.paypal.com</ 
>> a>.  I've run it on and off since August of last year, although most  
>> of the time was not after 3.1.1 (which is why I only claim it works  
>> on 3.1).  I don't have a suggested score for it (would love feedback  
>> there).  I ran it at .1 mostly to see how much it triggered and fp'd  
>> (not much, as it turns out.  I know this has been a problem in the  
>> past, so I'm wondering if the normalization code helps there, or I've  
>> just been lucky).  As noted, this has some rewrite bits coming when I  
>> get some time.
>> 
>> 

I have suggested something like this a few times. and used to hear concerns 
about valid
links not necessarily the same.
These can be put into two groups: one would have links to a "related" server,
like cgi.bigcompany.com
The other one is totally unrelated ,,, say a marketing company has set up a 
redirector to
count how often each link is visited.
For the first case I would like to suggest: if the names do not match, chech if 
the IPs are in the
same /24
Well, for the other one ..... I would not want to read these mails even if they 
are not phish 

An additional comment about phish: I get a lot of stuff that does not even make 
it to SA
scanning because I do not appear as a recipient. One can probably safely assume
that paypal, or any bank, would not send a verification message to 100 
recipients
at once with a bcc list .... could serve as a meta rule to triple the score for 
phish

Wolfgang Hamann





Reply via email to