{"id":4556,"date":"2017-06-02T20:10:21","date_gmt":"2017-06-02T12:10:21","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4556"},"modified":"2017-06-02T20:10:37","modified_gmt":"2017-06-02T12:10:37","slug":"maltrail-malicious-traffic-detection-system","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2017\/06\/maltrail-malicious-traffic-detection-system\/","title":{"rendered":"maltrail – Malicious Traffic Detection System"},"content":{"rendered":"

Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and\/or generally suspicious trails, along with static trails compiled from various AV reports and custom user-defined lists, where trail can be anything from domain name (e.g. zvpprsensinaix.com<\/code> for Banjori malware), URL (e.g. http:\/\/109.162.38.120\/harsh02.exe<\/code> for known malicious executable), IP address (e.g. 185.130.5.231<\/code> for known attacker) or HTTP User-Agent header value (e.g. sqlmap for automatic SQL injection and database takeover tool).<\/p>\n

\"maltrail<\/p>\n

Also, it uses (optional) advanced heuristic mechanisms that can help in the discovery of unknown threats (e.g. new malware).<\/p>\n