I apologize. I just tried several and it expands so I know I probably got all of it. But when I have problem is when I see a "php?id=" and it cuts off the id number or something else like that. This is critical for some hosts since sometimes without the proper ID number you don't get the malware but instead get redirected to some place like Yahoo. I didn't notice the expanding before but I do know that frequently the URLs give by you and MalwareURL.com don't work. Some of that may be just that they are gone, but with these ID numbers you frequently need them.
I think you misunderstood my other query. Let me give an example so you can see what I mean. The blog by Gary Warner for the month has a lot of hosts in them, all of them being up to know good but now they seem to be gone (the ones listed):
http://garwarner.blogspot.com/Taking the first list, I first notice that all of the hosts are dead. But that doesn't matter - it is grist for my pattern matching mill. Out of it comes these two rules for Nacha:
GoodDomains[i++] = "nacha.org";
BadHostWordStarts[i++] = "nacha\.org";
Now those rules allow you to go to Nacha, but not any of those dead hosts like nacha.org.fstpproid02.com. What if there are more hosts like this one we don't know about yet? I have always been stopping the ones for FaceBook (and somehow lost the one for youtube which means it needs to be put back in):
GoodDomains[i++] = ".facebook.com";
BadHostParts[i++] = "facebook";
Those rules allow me to go to
www.facebook.com but will stop visits to these hosts:
facebook-image.net
www.facebook.com.asqwaze.euwww.facebook.com.qweasi.euwww.facebook.com.qweasx.euWhat that does is stop the pretenders without me even knowing who they are. What would be nice to have is MDL's entire list of bad URLs to look for other similar patterns. That way, just like here I can stop the nonsense without even knowing the name of the host. IOW, I am pretty sure Dr Warner has all these hosts shut down (they don't appear in DNS any more), but what about the ones we don't know about any more. I will put that missing "youtube" rule back in. For example, it would have stopped these hosts you have without me even knowing they exist:
youtube-b.com
youtubegiris.com
Well, it will after I put that "youtube" rule back in that I seemed to have lost. Now do you know what I am getting at? But if I have the entire URL lists (not just the host names) I am very good at inducing patterns that stop something bad without me even knowing what it is in advance. Another example:
GoodDomains[i++] = ".adobe.com";
GoodDomains[i++] = "foxitsoftware.com";
BadURL_WordStarts[i++] = "flash-plugin";
BadURL_WordStarts[i++] = "flash-hq-plugin";
I don't care what the name of the host is. If it isn't Adobe or Foxit, I don't want their flash plugin. Now do you understand? What I am looking for is not just single snippet URLs, but a big list that would give me
patterns that would stop unknown threats. A lot of this depends on human thinking. What is wrong with myFriendlyScanner.com as opposed to NastyTrojanInjector.com? People would of course avoid the second host but some would be suckers for the first host. Just take a look at the Malware URLs in my PAC filter and you will see it is rather thin at the URL level:
http://www.SecureMecca.com/Downloads/proxy_en.txtThe comments are on the right.