Bill> We may need expanded rules to handle obfuscation. The following
Bill> javascript decodes into another obfuscation javasscript. I didn't
Bill> have time to persue it further (what the sender is counting on i
Bill> suppose)...
Well, I wasted a couple minutes this morning translating it to Python and
executing it in an interpreter shell... ;-) When all is said and done it
expands to
<base href="http://images.adultplex.com/AP1/pgirl/">
I don't know what triggers are set up for Javascript beyond what's in 2.20
but the presence of something.charCodeAt or String.fromCharCode seems like a
surefire sign of obfuscation. I'd suggest a rule something like:
rawbody OBFUSCATING_JAVASCRIPT /charCodeAt|fromCharCode/
describe OBFUSCATING_JAVASCRIPT JavaScript which tries to hide the message
--
Skip Montanaro
[EMAIL PROTECTED]
consulting: http://manatee.mojam.com/~skip/resume.html
_______________________________________________________________
Don't miss the 2002 Sprint PCS Application Developer's Conference
August 25-28 in Las Vegas -
http://devcon.sprintpcs.com/adp/index.cfm?source=osdntextlink
_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk