?
Solved

Virustotal URLs scanning

Posted on 2015-01-29
6
Medium Priority
?
104 Views
Last Modified: 2015-03-04
From Virustotal API web page, I understand that we can write a python code to check against a list of URL from text file.
Can anyone help me with this? I would like to see if the links that user post on our forum is legitimate.

Thank you so much,
0
Comment
Question by:totoroha
  • 3
  • 2
6 Comments
 
LVL 25

Expert Comment

by:clockwatcher
ID: 40578883
Where are you getting stuck?  They have sample code on their site:  https://www.virustotal.com/en/documentation/public-api/#getting-url-scans.  The code formatting is messed up in my IE version.  But it's fine in Chrome.
0
 
LVL 32

Expert Comment

by:DrDamnit
ID: 40579508
What have you tried so far?
0
 

Author Comment

by:totoroha
ID: 40579741
my dream is like having an ultimate tool to compare the hash value, urls to virustotal and get the results back in a excel format form. But my programming skill is not that good, so i'm wrestling with everything now. ^_^
0
The eGuide to Automating Firewall Change Control

Today’s IT environment is constantly changing, which affects security policies and firewall rules. Discover tips to help you embrace this change through process improvement & identify areas where automation & actionable intelligence can enhance both security and business agility.

 

Author Comment

by:totoroha
ID: 40605768
can anyone help me with this please?
0
 
LVL 25

Accepted Solution

by:
clockwatcher earned 2000 total points
ID: 40606044
I have no idea where you are stuck.
0
 

Author Comment

by:totoroha
ID: 40645777
The code that I have it returns some error. So currremtly i'm stuck with it. Beside, my programming skills is not good so it's an obstacle too.
0

Featured Post

Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
Spectre and Meltdown, how it affects me and my clients?
Learn the basics of if, else, and elif statements in Python 2.7. Use "if" statements to test a specified condition.: The structure of an if statement is as follows: (CODE) Use "else" statements to allow the execution of an alternative, if the …
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

599 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question