Decoding of the UrlSand Protection links of the email security suite service Print

  • UrlSand Protection, Decode UrlSand Protection
  • 2

As part of our Email Security Gateway solution, Libraesva UrlSand Defense actively blocks malicious email URLs to protect against spear-phishing attacks, zero-day exploits, and ransomware. Every URL, not just the uncategorized ones, in every email is protected. On every device. Extend link protection when you log in, not just when the email arrives.

Our URLSand sandbox isn't just an additional time-of-click blacklist check, it's a full page scan, detecting deeply nested malware and suspicious pages that scan obfuscated content and follow all redirects!

The links within the emails are rewritten to ensure their security by passing them through a control system.

once the link is rewritten, the service remains active even if the Sandbox is disabled, or if the appliance is not renewed.

In any case, the original link is easily recoverable, starting from the rewritten link a Decode URL is created (eg:  https://www.urldecoder.org/ ), and the link is the   parameter of the querystring.

Example

Link:

https://urlsand.esvalabs.com/?u=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Flibraesva%2F&e=dd4f1005&h=8572fddd&f=n&p=y

​URL DECODED

https://urlsand.esvalabs.com/?u=https://www.linkedin.com/company/libraesva/&e=dd4f1005&h=8572fddd&f=n&p=y

​Url

https://www.linkedin.com/company/libraesva/


Was this answer helpful?

« Back