Eliminating malicious TLDs with regex
September 07, 2018 —
shinohai
A discussion on Telegram this morning led to this post, I decided to preserve this handy list of regular expressions for filtering out mostly dumb and malicious TLD's. I am personally using an EdgeRouter Lite with dnsmasq for this purpose, so your mileage may vary - feel free to modify and make these better. Suggestions for changes may be sent to my email listed on the contact page, as usual non-encrypted content will be ignored.
^https?://([A-Za-z0-9.-]*\.)?.gq/ ^https?://([A-Za-z0-9.-]*\.)?.cf/ ^https?://([A-Za-z0-9.-]*\.)?.men/ ^https?://([A-Za-z0-9.-]*\.)?.loan/ ^https?://([A-Za-z0-9.-]*\.)?.ml/ ^https?://([A-Za-z0-9.-]*\.)?.top/ ^https?://([A-Za-z0-9.-]*\.)?.work/ ^https?://([A-Za-z0-9.-]*\.)?.click/ ^https?://([A-Za-z0-9.-]*\.)?.tk/ ^https?://([A-Za-z0-9.-]*\.)?.country/ ^https?://([A-Za-z0-9.-]*\.)?.pw/ ^https?://([A-Za-z0-9.-]*\.)?.party/ ^https?://([A-Za-z0-9.-]*\.)?.trade/ ^https?://([A-Za-z0-9.-]*\.)?.review/ ^https?://([A-Za-z0-9.-]*\.)?.club/ ^https?://([A-Za-z0-9.-]*\.)?.bid/
YARA compatible regular expressions for detecting base64 encoded variable-case http:// and https:// URI prefixes:
HTTP:// ([\x2b\x2f-\x39A-Za-z][\x2b\x2f-\x39A-Za-z][\x31\x35\x39BFJNRVZdhlptx] [Io][Vd][FH][R][Qw][O]i\x38v[\x2b\x2f-\x39A-Za-z]|[\x2b\x2f-\x39A-Za-z] [\x30\x32EGUWkm][h][\x30U][Vd][FH][A]\x36Ly[\x2b\x2f\x38-\x39]|[Sa][FH][R][\x30U] [Uc][D]ovL[\x2b\x2f-\x39w-z]) HTTPS:// ([\x2b\x2f-\x39A-Za-z][\x2b\x2f-\x39A-Za-z][\x31\x35\x39BFJNRVZdhlptx] [Io][Vd][FH][R][Qw][Uc][z]ovL[\x2b\x2f-\x39w-z]|[\x2b\x2f-\x39A-Za-z] [\x30\x32EGUWkm][h][\x30U][Vd][FH][B][Tz][O]i\x38v[\x2b\x2f-\x39A-Za-z]|[Sa][FH][R][\x30U] [Uc][FH][M]\x36Ly[\x2b\x2f\x38-\x39])
Tags: Insecurity, Webshit