In that case, is there an online lookup form where I can enter a URL
to see how it's classified in the phishing database? I can't find one.
I know you can do it by getting an API key and doing a programmatic
lookup, but it would be easier if there were a form...
-Bennett
>--
>You received this message because you are subscribed to the Google
>Groups "Google Safe Browsing API" group.
>To post to this group, send email to
>google-safe-...@googlegroups.com.
>To unsubscribe from this group, send email to
>google-safe-browsi...@googlegroups.com.
>For more options, visit this group at
>http://groups.google.com/group/google-safe-browsing-api?hl=en.
Is there a test URL that's permanently on the "phishing" list, that I
can use to test this form?
I know this is a test URL that's permamently on the malware list:
http://malware.testing.google.test/testing/malware/
and the form does indeed report that as being blocked as malware.
But I can't find a working test "phish" URL. This page:
http://www.mozilla.com/firefox/its-a-trap.html
is blocked by Firefox as a "web forgery" so I thought that meant it
was on Google's anti-phishing list. But your lookup form says "no
match" for phishing. Are you sure it's working correctly for
phishing URLs?
-Bennett
Hey, thanks, that's very handy -- I was about to have to try and write a form myself to do something like that.
Is there a test URL that's permanently on the "phishing" list, that I can use to test this form?
I know this is a test URL that's permamently on the malware list:
http://malware.testing.google.test/testing/malware/
and the form does indeed report that as being blocked as malware.
But I can't find a working test "phish" URL. This page:
http://www.mozilla.com/firefox/its-a-trap.html
is blocked by Firefox as a "web forgery" so I thought that meant it was on Google's anti-phishing list. But your lookup form says "no match" for phishing. Are you sure it's working correctly for phishing URLs?
>On Wed, Aug 18, 2010 at 2:46 PM, Bennett Haselton
><<mailto:ben...@peacefire.org>ben...@peacefire.org> wrote:
>Hey, thanks, that's very handy -- I was about to have to try and
>write a form myself to do something like that.
>
>Is there a test URL that's permanently on the "phishing" list, that
>I can use to test this form?
>
>I know this is a test URL that's permamently on the malware list:
><http://malware.testing.google.test/testing/malware/>http://malware.testing.google.test/testing/malware/
>and the form does indeed report that as being blocked as malware.
>
>But I can't find a working test "phish" URL. This page:
><http://www.mozilla.com/firefox/its-a-trap.html>http://www.mozilla.com/firefox/its-a-trap.html
>is blocked by Firefox as a "web forgery" so I thought that meant it
>was on Google's anti-phishing list. But your lookup form says "no
>match" for phishing. Are you sure it's working correctly for
>phishing URLs?
>
>
>This site is hard coded into Firefox. It's mostly meant to show you
>the warning UI. There isn't a url built into the phishing list like
>there is for the malware list.
Well then here's something weird -- go to the same page in Internet
Explorer 8 (make sure you have SmartScreen enabled under Internet
Options -> Advanced -> Security -> Enable Smartscreen Filter) and you
get the IE8 warning page with the red background:
"This website has been reported as unsafe
www.mozilla.com
We recommend that you do not continue to this website."
etc.
Where is IE getting the URL from, if it's hard-coded into Firefox?
Meanwhile, is there a known phishing site in the Google anti-phishing
database, that I can use to test Beaver6813's lookup form?
-Bennett
Meanwhile, is there a known phishing site in the Google anti-phishing database, that I can use to test Beaver6813's lookup form?
-Bennett
I meant, not a test page set up as a permanent entry in the list, but
any known "real" phishing site that's currently blacklisted, that I
can use as a test.
-Bennett
-Bennett
Thanks. Currently, using Sam's form at
http://gsbtool.beaver6813.com/ulookup.php
the first URL:
http://banking0001.t35.com/buddybb/buddybb/index.html
gives "no match" on the phishing database, but the second two urls:
http://elspecmont.ru/photo/usrefundportal/allaccounts/usbank/login.html
http://elspecmont.ru/photo/usrefundportal/allaccounts/zions/index.html
both give a "match" on the phishing database. So, finally, I got a
positive result, which was what I was looking for :)
However, the higher-level directories on http://elspecmont.ru/ aren't
blacklisted, so requests for those directories would be approved by
the Google API.
If you find phishing content at one location on a server, wouldn't it
be fair to assume that the entire server is either (a) compromised,
or (b) untrustworthy, and blacklist the whole server?
-Bennett
I wouldn't agree that it should class the entire domain as
blacklisted. For example a blog hosted by a free web host could be
hosting malware but that doesn't mean that every site hosted by that
free web host is bad.
On Aug 20, 8:22 am, Bennett Haselton <benn...@peacefire.org> wrote:> Thanks. Currently, using Sam's form athttp://gsbtool.beaver6813.com/ulookup.php
> At 03:10 PM 8/19/2010, Garrett Casto wrote:
>
> >Sure,
>
> ><http://banking0001.t35.com/buddybb/buddybb/index.html>banking0001.t35.com/buddybb/buddybb/index.html
> ><http://elspecmont.ru/photo/usrefundportal/allaccounts/usbank/login.html>elspecmont.ru/photo/usrefundportal/allaccounts/usbank/login.html
> ><http://elspecmont.ru/photo/usrefundportal/allaccounts/zions/index.html>elspecmont.ru/photo/usrefundportal/allaccounts/zions/index.html
>
> >These were blacklisted just a few minutes ago, so you might have to
> >wait a bit before your tool picks them up.
>
> the first URL:http://banking0001.t35.com/buddybb/buddybb/index.html> gives "no match" on the phishing database, but the second two urls:http://elspecmont.ru/photo/usrefundportal/allaccounts/usbank/login.htmlhttp://elspecmont.ru/photo/usrefundportal/allaccounts/zions/index.html
> both give a "match" on the phishing database. So, finally, I got a> However, the higher-level directories onhttp://elspecmont.ru/aren't
> positive result, which was what I was looking for :)
>
> blacklisted, so requests for those directories would be approved by
> the Google API.
>
> If you find phishing content at one location on a server, wouldn't it
> be fair to assume that the entire server is either (a) compromised,
> or (b) untrustworthy, and blacklist the whole server?
>
> -Bennett
I would argue that it depends on the purpose for which the
blacklisting is being used.
If the blacklist is being used as a filter to remove URLs from Google
search results, then I agree that removing an entire domain is too
draconian, because the user won't know that their pages have
disappeared, and users who are searching on Google won't realize that
their pages are missing.
On the other hand, when the blacklist is being used as a filter to
stop a web browser from accessing a certain website, it might be
beneficial to blacklist the entire domain. Because in that case, the
more pages on the site are blocked, the faster the users will realize
that something is wrong, and will notify the site webmaster about the
problem. (Whereas if only one page on the site is blacklisted, then
the webmaster won't hear about it from their users, until one of the
users happens to visit that page and then tells the webmaster about
the browser warning.) Ironically, in this case, a wider blacklisting
could actually be more helpful to the webmaster.
-Bennett