G
G
grigor2014-01-08 23:31:33
JavaScript
grigor, 2014-01-08 23:31:33

How is this javascript encoded? And how to decode it?

How is this javascript encoded? And how to decode it?
Link to the file -  speedy.sh/9zPB7/application.js
Several mirrors to the same file:
www.sendspace.com/file/58naic
www23.zippyshare.com/v/2382129/file.html
PS: Sorry for the garbage hosting.
Thanks in advance!

Answer the question

In order to leave comments, you need to log in

4 answer(s)
R
rozhik, 2014-01-09
@rozhik

In chrome inspector go to www.speedyshare.com or wherever it works. Look at the network traffic, and in upload_page.php we see the same code, only not obfuscated;)

N
Nikolai Vasilchuk, 2014-01-09
@Anonym

Something tells me that this is not JS.

M
maxaon, 2014-01-09
@maxaon

JS weighing 8.8 mb - it is extremely unlikely that there is JS, except that it contains the source code of the site with pictures, scripts and styles. See how this file is loaded and what happens to it.
Judging by the entropy of this file, it is not compressed and not encrypted with normal ciphers. Most likely this file is loaded, decoded and further processed in accordance with some logic. Look at it not as a JS file, but as some unknown file.

M
maxaon, 2014-01-10
@maxaon

Since the presence of ciphertext tells you practically nothing about the encryption algorithm, and even more so about the key, then you have several options:
1. Cryptanalysis. Decrypt the text, having on hand the ciphertext and, possibly, the plaintext. Extremely labor intensive and costly. But there is a chance that an amateur encrypted it (since the file has increased 4 times) and you will be able to find a self-written encryption algorithm. You can ask on specialized forums.
2. Software analysis. You need to analyze the application that works with this file. By its behavior you will find the algorithm and possibly the key. Also look at the installer. There is also a possibility that this was done with the help of some well-known tool, you can dig there. Difficult, but possible.
3. Buy a software development company.
4.Bandit cryptanalysis (blackmail, extortion, thermorectal cryptanalysis)
As you can see, there are many options.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question