- Feature Articles
- CodeSOD
- Error'd
- Forums
-
Other Articles
- Random Article
- Other Series
- Alex's Soapbox
- Announcements
- Best of…
- Best of Email
- Best of the Sidebar
- Bring Your Own Code
- Coded Smorgasbord
- Mandatory Fun Day
- Off Topic
- Representative Line
- News Roundup
- Editor's Soapbox
- Software on the Rocks
- Souvenir Potpourri
- Sponsor Post
- Tales from the Interview
- The Daily WTF: Live
- Virtudyne
Admin
Registrant: Inedo, LLC 44 Front St 2nd Floor Berea, Ohio 44017 United States
Registered through: GoDaddy.com, Inc. (http://www.godaddy.com) Domain Name: INITRODEGLOBAL.COM Created on: 20-Nov-07 Expires on: 20-Nov-08 Last Updated on: 20-Nov-07
Administrative Contact: Papadimoulis, Alex [email protected] Inedo, LLC 44 Front St 2nd Floor Berea, Ohio 44017 United States (440) 243-6737 Fax --
Technical Contact: Papadimoulis, Alex [email protected] Inedo, LLC 44 Front St 2nd Floor Berea, Ohio 44017 United States (440) 243-6737 Fax --
Domain servers in listed order: NS27.DOMAINCONTROL.COM NS28.DOMAINCONTROL.COM
Admin
This code is great! Centre of the column, 11 lines down.
Yummy
Admin
Why do you think this script was obfuscated in the first place? Seriously, it's a contact us form, but if I had to bet, the coder "accidentally" included that security hole on purpose and the rest of this drivel was to obfuscate that fact.
Admin
Lol!!! ;-)
Admin
LOL, this is typical behavour from anything claiming to "Encrypt" or "Protect" or "Obfuscate" PHP.
There was an article in 2600 a few issues back, I believe the title was something along the lines of "Friends don't let friends use obfuscators" that one actually made it a 3 step process ;o)
Gotta love them feeding remote page contents to eval though...
Admin
Looks it was just ran through and obsfucation utility. Or maybe someone really went through that much work. Sure hope it felt worth their time.
Admin
exactly!!! 1|3 lmao!
Admin
While doing security for a hosting service provider, I found a lot of "direct mailer" scripts laying around -- the result of compromised phpBB forums and the like.
These scripts were routinely searched for of course, but the "nasty" ones were encoded like this, often 4 times deep. I think this was a form of copy protection by the original authors, but to me it just meant searching for scripts with large text blocks, evals and base64 decodes. They'd stick out like nothing else.
Admin
Someone please email me the codes for this thing.
Admin
At least it was handled serverside. Microsoft injects these kinds of string in web pages and calls it _VIEWSTATE. Apparently, a good old server side session storage is too advanced for the average .Net developer.
Admin
Well, I have worked for a boss once, who asked for a "securitaziation" of the code of his website.... and then would gladly accept a result like the above and pay for it.... So if this is what the customers want....
Admin
You didn't ask properly. You should have asked: "plz email me teh codez"
Admin
But not (2)Two(2) ... no, definatley not two
Admin
I think I'll hang myself. People like this actually exist???
Admin
If gained access to the code, a hacker would hack it. Long variable names don't disturb - they can be very very easily changed to short.
Admin
Why in 1 hour or 3? Not 2 or 4? Sonnofabeetch
Admin
Its may be that encode64 is not the is build-in function... but a user defined one that actually performs some encryption. Dehradun Escorts Dehradun Call Girls
Admin
Its may be that encode64 is not the is build-in function... but a user defined one that actually performs some encryption. <a rel="nofollow" href="href="https://www.dlfgurgaoncallgirls.com/dehradun-escorts/" target="_blank" title="href="https://www.dlfgurgaoncallgirls.com/dehradun-escorts/">Escorts in Dehradun Dehradun Escorts service Call Girls in Dehradun