Open udit-001 opened 6 years ago
Thanks Udit @udit-001. In particular, https://ransomwaretracker.abuse.ch looks very interesting.
@StevenBlack i just checked some of the Phishing sites and some were blocked by the hosts file(means they're already in your list) and some by my adblocker(means they're not in the list but are legit pfishing sites). Probably it's a good idea the missing ones to be added for extra protection.
https://ransomwaretracker.abuse.ch/downloads/RW_DOMBL.txt
that list seems to be gone
WHAT??
danmed, back to the code :unamused:
As for the remaining source, https://openphish.com/feed.txt, that's not a hosts file, so we would need a pre-process transformation for that. Other issues here imply transformations, too...
That's simple
wget -qO- 'https://openphish.com/feed.txt' | cut -d "/" -f 3 | sort -u | uniq -u
If you like I can add it to my https://gitlab.com/my-privacy-dns/external-sources/hosts-sources but that would be without the prefixed IP
If requested it can then be added to the https://gitlab.com/my-privacy-dns/rpz-dns-firewall-tools/hosts
@StevenBlack just say the word and it will be alive
@spirillen yeah but what I mean is, we need an in-framework pipeline for that.
Note to self: 1816 unique domains.
By the way, it's a feed, so the URLs are updated every 12 hours. https://openphish.com/phishing_feeds.html
wget -qO- 'https://openphish.com/feed.txt' | cut -d "/" -f 3 | sort -u | uniq -u | wc -l
908
wget -qO- 'https://openphish.com/feed.txt' | cut -d "/" -f 3 | wc -l
1795
wget -qO- 'https://openphish.com/feed.txt' | cut -d "/" -f 3 | sort -u | uniq -u | wc -l 908
wget -qO- 'https://openphish.com/feed.txt' | cut -d "/" -f 3 | wc -l 1795
Found these lists which might be useful, take a look :
List of Phishing Sites https://openphish.com/feed.txt
List of domains associated with Ransomware https://ransomwaretracker.abuse.ch/downloads/RW_DOMBL.txt