-
Recent Posts
Recent Comments
Archives
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
Categories
Meta
Tag Archives: javascript
Making Wacky Redirect Scripts - Part III
This post is the third and final entry of redirect scripts I wrote to test my Javascript Analyzer program. 1. We all know about how to convert IP addresses to decimal. This script has the decimal value of Google’s IP … Continue reading
Making Wacky Redirect Scripts - Part II
This post is the second part of my quest to test a Javascript Analyzer program I wrote. 1. This script shows the GNU General Public License in the HTML body. The script below reads in the DIV’s innerHTML value and … Continue reading
Making Wacky Redirect Scripts - Part I
A couple of months ago, I created a program that would analyze Javascript code that obfuscates redirection to malicious websites. I come across a lot of these kinds of scripts so this program will make it easier and faster for … Continue reading
SpiderMonkey 1.8.5 for Windows
Get a Windows binary build of Mozilla’s JavaScript 1.8.5 engine here: spidermonkey-1.8.5.zip The source code was downloaded from Mozilla’s Mercurial repository via http://hg.mozilla.org/mozilla-central/ on 2010-11-24. This is based off of the latest successful build “mozilla-central” after Mozilla Firefox 4.0b7 was released. … Continue reading
Posted in Tools
Tagged 1.8.5, engine, Firefox, javascript, JägerMonkey, Mozilla, SpiderMonkey, windows
Comments Off
Deobfuscating Tricks
Deobfuscating malicious Javascript can be tricky at times. Luckily, there are several techniques researchers can use to decode Javascript that has been purposefully obscured to hide its real intentions. Here are the common techniques I use to deobfuscate malicious scripts … Continue reading