деобфускация

Discussion in 'Болталка' started by .while, 21 Oct 2013.

  1. .while

    .while Member

    Joined:
    22 Feb 2010
    Messages:
    40
    Likes Received:
    5
    Reputations:
    0
    под чем код? :confused:
     
  2. Ganz Euler

    Ganz Euler Member

    Joined:
    7 Oct 2013
    Messages:
    50
    Likes Received:
    13
    Reputations:
    10
    Code:
    <%=chr(78) + chr(69) + chr(84) + chr(83) + chr(80) + chr(65) + chr(82) + chr(75) + chr(69) + chr(82) + chr(95) + chr(70) + chr(48) + chr(77) + chr(49) %>
    выводит NETSPARKER_F0M1

    Code:
    <%=chr(45) & (44353702950+(Cint(Request("nsxint"))*4567)) & chr(45) %>
    выводит.. что-то.

    http://netsparker.com/n/

    Code:
    <? print chr(78).chr(69).chr(84).chr(83).chr(80).chr(65).chr(82).chr(75).chr(69).chr(82).chr(95).chr(70).chr(48).chr(77).chr(49) ?>
    <? print chr(45).(44353702950+(intval($_GET["nsxint"])*4567)).chr(45) ?>
    <%=chr(78) + chr(69) + chr(84) + chr(83) + chr(80) + chr(65) + chr(82) + chr(75) + chr(69) + chr(82) + chr(95) + chr(70) + chr(48) + chr(77) + chr(49) %>
    <%=chr(45) & (44353702950+(Cint(Request("nsxint"))*4567)) & chr(45) %>
    <script>netsparkerRFI(0x066666)</script>
    https://www.mavitunasecurity.com/netsparker/

    Netsparker is the only False-positive-free web application security scanner. Simply point it at your website and it will automatically discover the flaws that could leave you dangerously exposed.

    Код под героином.
     
  3. .while

    .while Member

    Joined:
    22 Feb 2010
    Messages:
    40
    Likes Received:
    5
    Reputations:
    0
    благодарю тебя!