|
Obfuscated code, apparently this is
more common these days to do. There's something that does a hash
off the posted payload input that interprets the real code and
functions behind it as it is read.
I was reading about something like this not long ago the motions to reverse engineer malware payloads from hacker-news posted research used to keep their business under wraps. They figured out how to reverse the algorithm and read the code the same as they would to interpret the payload and run it when hitting the site, noting what sort of havoc was being performed when executed, some sort of windoze 0-day. They do something like this with android apk apps to keep them "secure" and keep crappy other devs from pilfering code. I always run noscript for firefox and scriptsafe on chrome's, it's worth the hassle. -mb On 09/04/2016 02:39 PM, Parabellum7 wrote:
|
--------------------------------------------------- PLUG-discuss mailing list - [email protected] To subscribe, unsubscribe, or to change your mail settings: http://lists.phxlinux.org/mailman/listinfo/plug-discuss
