TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Deobfuscating the Facebook Spam Script

41 点作者 infinity大约 14 年前

4 条评论

3ds大约 14 年前
Here is the proper deobfuscated code:<p><a href="http://pastebin.com/nkBx8GbH" rel="nofollow">http://pastebin.com/nkBx8GbH</a><p>reddit disusses it nicely:<p><a href="http://www.reddit.com/r/netsec/comments/h9ke3/facebook_being_hit_by_an_xss/" rel="nofollow">http://www.reddit.com/r/netsec/comments/h9ke3/facebook_being...</a>
adsr大约 14 年前
Wouldn't it be possible to deny any scripts that looked like that? I know that it must obviously be legal Javascript, but if it's formatted like one blob of text, deny. This might be a too naive approach to work, I'm mostly raising the question out of curiosity, is it possible to spot obfuscation programmatically.
评论 #2545370 未加载
pdenya大约 14 年前
I was drawn to security for a while mostly because javascript like that must be so much fun to write and encrypt. Although it's almost as much fun to decrypt. Until I get some more free time I guess I'll settle for reading about it.<p>Also, I love the first comment on this article: "Didn’t you just violate DMCA?"
Luyt大约 14 年前
I'm no user of Facebook, and when I see this material, I highly doubt I will ever try it. Why is Facebook unleashing this kind of stuff on its members? It shows the traits of malicious JavaScript that shady sites use to exploit security vulnerabilities in browsers. Why aren't Facebook members not allowed to know what they're made to run? Does Facebook have something nasty to hide?
评论 #2545458 未加载