Perhaps you could overwrite the native eval() and track calls throug your
custom eval implementation?
Something like:
var proxied = eval;
eval = function() { alert("ha"); return proxied.apply(this, arguments);};
eval(7);
Honza
On Friday, June 13, 2014 1:46:27 PM UTC+2, Akshay Darekar wrote:
>
> I am a python developer. i was find out malicious or Obfuscation
> javascript this are run time executing, when i execute in my brawser this
> are infected to my desktop. i want to trace what in the eval function are
> executing. this javascript are encoded format that are run time encoding
> self and infecting to machine. anybody have idea about how to catch this
> value / string.
>
--
You received this message because you are subscribed to the Google Groups
"Firebug" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/firebug.
To view this discussion on the web visit
https://groups.google.com/d/msgid/firebug/e87d1f7a-c40b-429a-a322-6b01160b1142%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.