1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
|
// A program to scan emails for phishing links.
// Copyright (C) 2019 Harald Eilertsen
//
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with this program. If not, see <https://www.gnu.org/licenses/>.
use chrono::{ DateTime, Utc };
use serde::Deserialize;
use serde_json;
use std::io::{ BufRead, Result };
use std::net::IpAddr;
#[derive(Deserialize)]
pub struct PhishTank {
pub phishes: Vec<Phish>,
}
#[derive(Deserialize)]
pub struct Phish {
pub phish_id: String,
pub url: String,
pub phish_detail_url: String,
pub submission_time: DateTime<Utc>,
pub verified: String,
pub verified_time: Option<DateTime<Utc>>,
pub online: String,
pub target: String,
pub details: Vec<PhishDetails>,
}
#[derive(Deserialize)]
pub struct PhishDetails {
pub ip_address: IpAddr,
pub cidr_block: String,
pub announcing_network: String,
pub rir: String,
pub country: String,
pub detail_time: DateTime<Utc>,
}
pub fn load_phistank<R: BufRead>(input: R) -> Result<PhishTank> {
let phishes = serde_json::from_reader(input)?;
Ok(PhishTank { phishes })
}
|