TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Dissecting a spammer's spam script

140 pointsby jmadsenabout 9 years ago

4 comments

tronjeabout 9 years ago
Maybe I'm too naive, but I really don't get why people do this (the spamming, not the dissecting). Whoever did this could probably land a nicely paying programming job, no? Is spamming that lucrative or what's going on?
评论 #11570823 未加载
评论 #11570665 未加载
评论 #11570688 未加载
评论 #11576685 未加载
tmalyabout 9 years ago
I had a wordpress site hit with one of these attacks years back. I took it apart to see how it worked. It was a pretty messy hack, but I give them credit for working within the constraints they had.
bluedinoabout 9 years ago
I've seen some code from vendors using ZendGuard and kind of wondered how it worked - I'm assuming any dissections of their obfuscation algorithm or code would be served a takedown notice real quick.
评论 #11569083 未加载
batatabout 9 years ago
That was pretty straightforward. Check this <a href="http:&#x2F;&#x2F;ideone.com&#x2F;VImf2v" rel="nofollow">http:&#x2F;&#x2F;ideone.com&#x2F;VImf2v</a> :)