473,395 Members | 1,584 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,395 software developers and data experts.

Help decrypting javascript

Hi,

Could anyone help me decrypting this script:

<script type='text/javascript'> str='@3c@49@46@52@41@4d@45@20@53@52@43@3d@27@68@74 @74@70@3a@2f@2f@77@77@77@2e@67@6f@6f@67@6c@65@2e@6 3@6f@6d@27@20@57@49@44@54@48@3d@31@20@48@45@49@47@ 48@54@3d@31@3e@3c@2f@49@46@52@41@4d@45@3e'; document.write(unescape(str.replace(/@/g,'%'))); </script>

Thank you,

Antonio
May 24 '07 #1
5 1912
AricC
1,892 Expert 1GB
Hi,

Could anyone help me decrypting this script:

<script type='text/javascript'> str='@3c@49@46@52@41@4d@45@20@53@52@43@3d@27@68@74 @74@70@3a@2f@2f@77@77@77@2e@67@6f@6f@67@6c@65@2e@6 3@6f@6d@27@20@57@49@44@54@48@3d@31@20@48@45@49@47@ 48@54@3d@31@3e@3c@2f@49@46@52@41@4d@45@3e'; document.write(unescape(str.replace(/@/g,'%'))); </script>

Thank you,

Antonio
I think you need to provide more info.
May 24 '07 #2
I think you need to provide more info.
What do you mean? It is not possible to decrypt it with just this line of code? :(
May 24 '07 #3
acoder
16,027 Expert Mod 8TB
It's very easy to decrypt this code. Just replace the document.write with an alert and you will see that it's an iframe with the Google website as its source url and a height and width of 1.
May 24 '07 #4
Thank you very much for tour help
May 24 '07 #5
acoder
16,027 Expert Mod 8TB
No problem, you're welcome!
May 24 '07 #6

Sign in to post your reply or Sign up for a free account.

Similar topics

8
by: MattP | last post by:
Ok, with the help of some examples found on the web and some minor modifications on our own, we have a simple and working encrypt and decrypt solution. It runs as a service, watches for files with...
1
by: checksumde | last post by:
Hi Guys, i've found a small java script function that simple decrypts some encodedtext to plaintext. function decrypt(t,k){ var y=0; var r=''; t=unescape(t); for (i=0;i<t.length;i++){
3
by: JW | last post by:
I can encrypt the contents of a memory stream with no problems, however when decrypting( I'm using the same key an IV ) I get an exception stating bad data. I'm at a lost. I'm actually creating...
3
by: James | last post by:
Hi, I am developing a ActiveX Control which will be used in a web page. The control will encrypt some value then decrypt it when the web page opens next time. I tested the control in a windows...
1
by: Yair Nissan | last post by:
Hi, I'm trying to find a way to encrypt data (strings) from my client application (c++ 6.0) and transfer it to my server's .Net web services application. The web services must be able to decrypt...
5
by: Skeleton Man | last post by:
Hi, I came across the basic algorithmfor decrypting WS_FTP Pro 6 passwords as follows, and I'm trying to reverse it to make an encryption function: function ws_dec() { var str =...
8
by: manmit.walia | last post by:
Hello Everyone, Long time ago, I posted a small problem I had about converting a VB6 program to C#. Well with the help with everyone I got it converted. But I overlooked something and don't...
3
by: dfa_geko | last post by:
Hi All, I had a question about encrypting and decrypting XML files using asymmetric keys. I copied some sample code from MSDN, here are the samples: ...
2
by: prasath03 | last post by:
Hi, I wrote a java program for Encrypt and Decrypt the given string, when i execute the program it show me an error....but the string has Encrypted, if i want to Decrypt the string it show me an...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.