What URL analysis capabilities are in Filescan?

OPSWAT Filescan (Sandbox) offers a variety of features around URL analysis. Here are the highlights:

  • Full webpage rendering (Chrome), including capture of all GET/POST requests, Certificates and a Screenshot
  • All potential IOCs captured during the webpage rendering phase are added to the main report and cross-checked against our real-time MD Cloud Reputation (includes 50B+ hashes, URLs, IPs, domains) service
  • Machine Learning (ML) based image analysis for phishing detection
  • Currently detects 260+ major brands
  • Additional integrations with Google Safebrowsing

Do you have an example API request/response?

1) Submit a file using the /api/scan/url endpoint (Reference: https://www.filescan.io/api/docs#/scan/scan_file_api_scan_url_post) and obtain a flow_id

2) Using that flow_id, query the results using /api/scan/<flow_id>/report and apply at minimum the ur%3ArenderResults filter.

Example:

https://www.filescan.io/api/scan/6437bf9d1f50fdcf669a0b60/report?filter=overallState&filter=finalVerdict&filter=allTags&filter=allSignalGroups&filter=ur%3ArenderResults

The final verdict of the URL analysis can be obtained via the finalVerdict field, if the overallState field is set to SUCCESS (requires additional filters, see Example).

Do you have documentation on the API fields returned?

For all render related fields, please refer to the Chrome DevTools Protocol documentation, specifically Network Domain and related classes: https://chromedevtools.github.io/devtools-protocol/tot/Network/

Phishing detection related fields are present beneath the

JSON
Copy

Where the category field may be 0 (benign) or 1 (phishing detected). The base64 field contains the rendered image.

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard