Nytro Posted April 18, 2012 Report Posted April 18, 2012 JavaScript DeobfuscationA Manual ApproachSudeep Singh4/15/2012Table of ContentsPreface .......................................................................................................................................................... 3Reasons for JavaScript Obfuscation .............................................................................................................. 4Javascript Minifiers vs Obfuscators ............................................................................................................... 4Methods of JavaScript Obfuscation .............................................................................................................. 5Basic JavaScript Obfuscation ......................................................................................................................... 6Blackhole Exploit Kit .................................................................................................................................... 12Breaking Point Obfuscated JS Challenge ..................................................................................................... 23JS Obfuscation in MetaSploit Framework ................................................................................................... 34Conclusion ................................................................................................................................................... 37References .................................................................................................................................................. 37Download:http://www.exploit-db.com/wp-content/themes/exploit/docs/18746.pdf Quote