Description:
Most Web Applications seem to use AJAX based technologies nowadays to create a rich user experience. Developers at times want to protect the client side javascript code they are deploying and use Javascript Obfuscators to do the job. Though these obfuscators do a good job as they make it visually impossible for another developer to figure out what is happening, they are easily beatable. There are many Javascript Deobsucator utilities now available to reverse engineer the obfuscated code. We will see a demo of the Mina Javascript Deobfuscator in this video. This is a very good example of the fact that "Security through Obscurity" can never work.
The Mina Javascript Deobfuscation Helper tool uses the Windows Debug API’s (and is actually a mini debugger) that attach to IE process space and monitors for when that function is called. When that function is hit, Mina catches it, and dumps the javascript to disk. The Mina is fully standalone, so you wont have to use your debugger, it will also automatically download symbols and such, so it should work portably across different versions of Windows (IA32 only).
The full blog post about it's release is
available here. You can download Mini from
here.
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Comments: