'URL'에 해당되는 글 3건

  1. 2011.08.18 Malware URL by CEOinIRVINE
  2. 2010.03.12 New Twitter Feature Looks For Malicious URLs by CEOinIRVINE
  3. 2009.06.10 URL Encoding by CEOinIRVINE

Malware URL

Hacking 2011. 8. 18. 02:23
a[0-99].googletrait.com    
ns[0-99].info    
dns[0-99].us    
dns[0-99].dyndns.info    
dns[0-99].dyndns.org    
221.218.161.0    
210.223.204.0    
183.92.47.0    
123.118.142.0    
61.96.202.0    
49.247.255.0    
back.windowsxps.co.kr    
update.microsoftshell.com    
mail.winxps.com    
116.127.121.41    
cache.soucesp.com    
ywliyi.com    
yxrkhjs.gov.cn    
yuhuabei.com.cn    
yutong168.com    
ywjnt.com    
ytzr.com    
xiaomiao.net    
www.xinnet00.com    
www.neoluxel.com    
www.niubiyizu.com    
www.wintergemfarm.com    
www.hkslag.co.kr    
www.aiosk.com    
www.diarix.net    
igameer.appspot.com    
secureplace.biz    
usb.2580.com    
w29.com    
robingood.beeglover.cn    
news.an85.kr    
core2948.mylivejournalchanel.com    
miteksns.co.rs    
www.sofec.21s.fr    
www.i42.de    
www.jnxsezzb.com    
www.popgrle.com    
checkdizz.com    
piclooks.com    
nabe-ma.bakblu.com    
iufdvm.com    
jaji79.com    
kakolog.desktop2ch.net.playwow.us    
intranet.tomonline-inc.com    
intranet.tomonline-inc.com    
dana79.com    
game.playwow.us    
echinababy.com    
cfgty.com    
cutyline.zuzunza.joins.com    
chinanasdaq.com    
aop1.homelinux.com    
b0t.meibu.com    
bot.timewalk.me    
ado77.com    
01023111478.kt.io    
merlinmotorsport.co.uk    
66xiu.com    
ro.diggfunny.com    
cache.mindplat.com    
124.236.50.9    110730
cache.soucesp.com    
123.147.244.3    110730
50.16.254.123    110730
216.108.235.94    110730
116.127.121.109    110729
121.78.237.135    110729
119.253.42.182    110729
lvlove.info    
dyndns-at-work.com    
dyndns-ip.com    
dyndns-pics.com    
dyndns-at-home.com    
dyndns-server.com    
dyndns-web.com    
dyndns.org    
dyndns-wiki.com    
dyndns-work.com    
dyndns.info    
dyndns-mail.com    
dyndns-remote.com    
dyndns.tv    
dyndns-office.com    
dyndns-home.com    
dyndns-blog.com    
dyndns.biz    
dyndns-free.com    
27.255.64.0    
222.1.41.0    
216.18.211.0    
nexononline.com    
nexongame.net    
reegame.net    
google-analytics.dyndns-mail.com    
hpsupport.dns1.us    
dns01.dyndns.info    
dell.dyndns-office.com    
down2.winsoft9.com    
jesr.info    
koreasys1.com    
kowec.com    
wstatic.dcinside.com    
jrkxkf.com    
centralserver.qicp.net    
ns.dns3-domain.com    
mail.nexongame.net    
a1.reegame.net    
94.100.23.27    
183.92.47.211    
123.118.142.187    
49.247.255.43    
googletrait.com    
mail.hp-supports.org    
file.hp-supports.com    
file.googlefiles.net    
hack520.co.kr    
support.nexononline.com    
222.1.41.47    
down.tzh.kr    
Mremote    
210.223.204.67    
221.218.161.209    
caihong.kr    
an85.kr    
0day.kr    
vul.kr    
MyApp1.0    
ibmsupport.dyndns.org    
ibmsupport.dyndns.org    
dellsupport.dyndns-server.com    
dell.dyndns-wiki.com    
dns00.dyndns.org    
www.dnf782.com    
www.lwb80038.com    
www.feel6663.com    
www.ulmani.com    
70.39.99.123    
174.128.224.37    
hmmdt.com    
xmd.aspscript.info    
dw.mxdblog.info    
sleep.dnfgame.info    
fdsadhw11.info    
www.torysl.com    
dw.irisfilm.info    
ad.cy.co.kr    
174.128.224.47    
70.39.99.115    
70.39.99.111    
ylkf.coochou.com    
72.18.195.183    
lrvou.info    
vgob.info    
96.44.173.210    
96.44.173.126    
96.44.173.125    
caryhands.com    
files.caryhands.com    
61.78.63.171    
218.38.54.179    
74.82.179.57:82    
q8q.in    
up.mhhsrn.com    
images.stmaiget.com    
3162 http iis isapi .ida    
img.uyrubr.com    
ad.ilikec1ick.com    
tgong.co.kr    
www.9191game.com    
www.indisk.co.kr    
www.alahb.com    
hao.yueren.info    
ad.imad.co.kr    
www.allbook.biz    
www.mount-tai.com.cn    
muryoj.com    
2chsearch.info    
down.skypesotf.com    
www.yxwy.net.CN    
wbm.whu.edu.cn    
bidstrafen.com    
boaoyy.com    
ddsjy.com    
xuefu1.com    
yxhh.net    
gpbctv.com    
pacenoge.org    
gregshin.pe.kr    
junggomania.nefficient.co.kr    
www.sina.com.cn    
travlman.com    
7766.org    
99-22.cn    
2288.org    
9966.org    
8800.org    
6600.org    
8866.org    
3322.org    
bta.net.cn    
yxhh.net    
mz.cn    
www.531140.com    
images.kidkids.net    

'Hacking' 카테고리의 다른 글

tcpdump  (1) 2011.08.31
MS, AES security  (1) 2011.08.26
Social Networking Security Threats  (0) 2011.08.12
Jailbreak Apps  (2) 2011.08.09
Wardriving Evolves Into Warflying  (0) 2011.08.05
Posted by CEOinIRVINE
l

Meanwhile, one in eight Twitter accounts is either malicious, suspicious, or suspended, according to a new report from Barracuda Networks

Mar 10, 2010 | 02:53 PM

By Kelly Jackson Higgins
DarkReading

Twitter has added a new service that detects malicious URLs in an effort to quell the rise in spam and phishing on the microblogging social network.

The new security feature ultimately will scan all URLs before they hit the Twitter feed, but initially is only doing so for URLs sent via Twitter direct messages [DMs] and email notifications about DMs. Twitter is using its own URL shortener for these links: "For the most part, you will not notice this feature because it works behind the scenes but you may notice links shortened to twt.tl in Direct Messages and email notifications," said Del Harvey, Twitter's director of trust and safety, in a blog post last night.

Twitter's security feature comes amid new data revealing the level of abuse on the social network: One in eight Twitter accounts last year was malicious, suspicious, or suspended, according to a report issued today by Barracuda Networks. The surge in celebrities joining Twitter in 2009 resulted in a major jump in spam, phishing, and other abuse on the site, according to the report.

And those numbers have remained steady to date. "We are still seeing Twitter identify 3 to 4 percent of Twitter accounts as malicious. And, meanwhile, 9 to 10 percent of accounts on Twitter are actively engaging in malicious activity," says Paul Judge, chief research officer at Barracuda.

Twitter's abuse rate increased 66 percent during what Barracuda calls the "Twitter Red Carpet Era," the period during November 2008 to April 2009 when a wave of celebrities joined the social network. A copy of the full report is available here (PDF).

Chet Wisniewski, senior security adviser at Sophos, says Twitter's move to defend against attacks on its users is good news, although the announcement doesn't provide much detail on how the service works. "I did some testing, and it appears they are only converting links to their shortener, http://twt.tl, for email notifications of direct messages at this time," Wisniewski says. "Hopefully we will see Twitter partner with more security organizations to help stop spam, viruses, and other scams as well."

As of this posting, Twitter had not responded to a request for an interview.

Barracuda's Judge says protecting Twitter DMs is a good start, but that's not where the majority of malicious links are conducted on Twitter. "We've seen the majority of activity in the public time line, with attackers trying to take advantage of popular trending topics," Judge says. "At least Twitter is acknowledging the [malicious URL] problem."

Judge says it's unclear why Twitter needs a URL shortener to safeguard URLs. "I almost wonder if they wanted to have a URL shortener and are using security as a reason [to launch it]," he says.

Twitter should be conducting more analysis of links being distributed around its platform, and using reputation-based monitoring to catch illegitimate accounts and malicious activity, Judge says.

So far Twitter has mainly been hit by spam and phishing attacks, as well as hacked individual accounts. But a researcher at RSA Conference 2010 last week demonstrated a tool that impersonates a Twitter user's account in order to execute automated targeted attacks on the person's followers.

Pedro Varangot, a security researcher with Core Security Labs, says his team wrote the tool as a way to demonstrate and test for how social networks can be used for spear phishing.

Meanwhile, Twitter's Harvey said in his post that previously, his team was only able to detect phishing scams after the links had been sent. He called the new service "a major blow against phishing" and said that even if a malicious link is sent via an email notification and the recipient clicks on it, Twitter will "be able to keep that user safe."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

'IT' 카테고리의 다른 글

iPad app 열전!!!  (0) 2010.04.10
Must-Have iPad Apps For Professionals  (0) 2010.04.09
Apple Asks Court To Ban Google Phones  (0) 2010.03.05
IBM Eyes The iPad  (0) 2010.02.19
PayPal to become a way to pay for Facebook ads  (0) 2010.02.19
Posted by CEOinIRVINE
l

URL Encoding

Hacking 2009. 6. 10. 14:47

HTML URL Encoding Reference

Previous Next

URL encoding converts characters into a format that can be safely transmitted over the Internet.


URL - Uniform Resource Locator

Web browsers request pages from web servers by using a URL.

The URL is the address of a web page like: http://www.w3schools.com.


URL Encoding

URLs can only be sent over the Internet using the ASCII character-set.

Since URLs often contains characters outside the ASCII set, the URL has to be converted. URL encoding converts the URL into a valid ASCII format.

URL encoding replaces unsafe ASCII characters with "%" followed by two hexadecimal digits corresponding to the character values in the ISO-8859-1 character-set.

URLs cannot contain spaces. URL encoding normally replaces a space with a + sign.


Try It Yourself

If you click the "Submit" button below, the browser will URL encode the input before it is sent to the server. A page at the server will display the received input.

 

Try some other input and click Submit again.


URL Encoding Functions

In JavaScript, PHP, and ASP there are functions that can be used to URL encode a string.

In JavaScript you can use the encodeURI() function. PHP has the rawurlencode() function and ASP has the Server.URLEncode() function.

Click the "URL Encode" button to see how the JavaScript function encodes the text.

 

Note: The JavaScript function encodes space as %20.


URL Encoding Reference

ASCII CharacterURL-encoding
space %20
! %21
" %22
# %23
$ %24
% %25
& %26
' %27
( %28
) %29
* %2A
+ %2B
, %2C
- %2D
. %2E
/ %2F
0 %30
1 %31
2 %32
3 %33
4 %34
5 %35
6 %36
7 %37
8 %38
9 %39
: %3A
; %3B
< %3C
= %3D
> %3E
? %3F
@ %40
A %41
B %42
C %43
D %44
E %45
F %46
G %47
H %48
I %49
J %4A
K %4B
L %4C
M %4D
N %4E
O %4F
P %50
Q %51
R %52
S %53
T %54
U %55
V %56
W %57
X %58
Y %59
Z %5A
[ %5B
\ %5C
] %5D
^ %5E
_ %5F
` %60
a %61
b %62
c %63
d %64
e %65
f %66
g %67
h %68
i %69
j %6A
k %6B
l %6C
m %6D
n %6E
o %6F
p %70
q %71
r %72
s %73
t %74
u %75
v %76
w %77
x %78
y %79
z %7A
{ %7B
| %7C
} %7D
~ %7E
  %7F
%80
  %81
%82
ƒ %83
%84
%85
%86
%87
ˆ %88
%89
Š %8A
%8B
Π%8C
  %8D
Ž %8E
  %8F
  %90
%91
%92
%93
%94
%95
%96
%97
˜ %98
%99
š %9A
%9B
œ %9C
  %9D
ž %9E
Ÿ %9F
  %A0
¡ %A1
¢ %A2
£ %A3
  %A4
¥ %A5
| %A6
§ %A7
¨ %A8
© %A9
ª %AA
« %AB
¬ %AC
¯ %AD
® %AE
¯ %AF
° %B0
± %B1
² %B2
³ %B3
´ %B4
µ %B5
%B6
· %B7
¸ %B8
¹ %B9
º %BA
» %BB
¼ %BC
½ %BD
¾ %BE
¿ %BF
À %C0
Á %C1
 %C2
à %C3
Ä %C4
Å %C5
Æ %C6
Ç %C7
È %C8
É %C9
Ê %CA
Ë %CB
Ì %CC
Í %CD
Î %CE
Ï %CF
Ð %D0
Ñ %D1
Ò %D2
Ó %D3
Ô %D4
Õ %D5
Ö %D6
  %D7
Ø %D8
Ù %D9
Ú %DA
Û %DB
Ü %DC
Ý %DD
Þ %DE
ß %DF
à %E0
á %E1
â %E2
ã %E3
ä %E4
å %E5
æ %E6
ç %E7
è %E8
é %E9
ê %EA
ë %EB
ì %EC
í %ED
î %EE
ï %EF
ð %F0
ñ %F1
ò %F2
ó %F3
ô %F4
õ %F5
ö %F6
÷ %F7
ø %F8
ù %F9
ú %FA
û %FB
ü %FC
ý %FD
þ %FE
ÿ %FF


URL Encoding Reference

The ASCII device control characters %00-%1f were originally designed to control hardware devices. Control characters have nothing to do inside a URL.

ASCII CharacterDescriptionURL-encoding
NUL null character %00
SOH start of header %01
STX start of text %02
ETX end of text %03
EOT end of transmission %04
ENQ enquiry %05
ACK acknowledge %06
BEL bell (ring) %07
BS backspace %08
HT horizontal tab %09
LF line feed %0A
VT vertical tab %0B
FF form feed %0C
CR carriage return %0D
SO shift out %0E
SI shift in %0F
DLE data link escape %10
DC1 device control 1 %11
DC2 device control 2 %12
DC3 device control 3 %13
DC4 device control 4 %14
NAK negative acknowledge %15
SYN synchronize %16
ETB end transmission block %17
CAN cancel %18
EM end of medium %19
SUB substitute %1A
ESC escape %1B
FS file separator %1C
GS group separator %1D
RS record separator %1E
US unit separator %1F

'Hacking' 카테고리의 다른 글

SQL Vulnerability Leaves Passwords In The Clear, Researchers Say  (0) 2009.09.04
Penetration Testing Service  (0) 2009.09.04
Hacking with Javascript 2005.FEB.  (0) 2009.06.09
How to find Addresses in Gunz  (0) 2009.06.09
Lolhackerstic.dll (godmode)  (0) 2009.06.09
Posted by CEOinIRVINE
l