That said you don't really want to run potentially malicious JavaScript
without sandboxing it or having some idea as to what it does.

Jim

2009/12/4 Bert Van Kets <[email protected]>

> Isn't is easier to use a proxy or packet trace and see where the
> requests go to?
> You are not really after the code itself, just the locations in the
> requests.
>
> Just my $0.02
>
> Bert
>
> Chris Blazek wrote:
> > A coworker clicked on a link in an email and was directed to facebook
> > then redirected to the following site: despatiesmercemerce . blogspot
> > . com
> > All of there fb contacts then received the same email. I pulled up the
> > site in malzilla and noticed a script block in the header that looks
> > like it's obfuscated.
> >
> > I was wondering if someone in the group could figure out what the site
> > was trying to do.
> >
> > Thanks,
> > Chris
> >
> >
> > ------------------------------------------------------------------------
> >
> > _______________________________________________
> > Pauldotcom mailing list
> > [email protected]
> > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> > Main Web Site: http://pauldotcom.com
>
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to