是否有可能破解ASCII 2 HEX - JavaScript加密器

时间:2011-11-30 14:47:05

标签: javascript jquery encryption

我正在开发一个包含敏感JavaScript代码的商业软件项目。

我知道不可能阻止任何人看到我的代码,所以我想方设法让它变得更难,我发现this page女巫看起来很有希望,因为它阻止了JavaScript的访问任何其他页面/网址。

所以我的问题是这个解决方案有多安全?

随意建议任何其他方法来“隐藏”JavaScript代码。

4 个答案:

答案 0 :(得分:7)

不是,它已经下载到用户机器,他们可以在他们的脚本调试器中查看它,没有什么可以做的,以防止有人查看你的代码,你可以做的最好是混淆它,但只有deters随便的小偷。

此外,如果您在客户端放置敏感代码,那么您可能想要重构您的架构。

答案 1 :(得分:3)

无论是否加密到客户端都无论是加密还是不加密(因为客户端代码 - jscript - 将需要对其进行解码并且很容易入侵)

答案 2 :(得分:3)

我的猜测是“不太安全” - 在某些时候你需要以未加密的(或者说是未编码的)形式将JavaScript提供给浏览器的JS引擎,这是攻击者可以访问它的地方。

我隐藏敏感代码的建议是首先不要将其发送给用户。

我实际上无法使用该功能,但查看其(非“加密”)页面源,“解密”方法是eval(unescape("the result of some bizarre maths on the hex values"))。将eval()内的内容复制粘贴到JS控制台中可能会为您提供原始代码。

答案 3 :(得分:0)

这个混淆器( ASCII 2 HEX v1.2(JavaScript加密器))在阅读代码时可能会遇到一些困难(显然JavaScript代码无法隐藏)。它不会直接在网站上运行,您必须下载源代码并将其保存到“dummy.html”文件中:

http://js-x.com/page/javascripts__example.html?view=1109

例如,“alert('Hello world!')”将返回此代码:

<Script Language=Javascript>
<!--
eval(unescape('%68%35%3D%30%3B%68%30%3D%27%%36%44%%36%35%%36%45%%37%34%%32%45%%35%35%%35%32%%34%43%%33%42%27%3B%66%75%6E%63%74%69%6F%6E%20%68%31%35%28%68%31%31%29%7B%68%38%3D%4D%61%74%68%2E%72%6F%75%6E%64%28%68%31%31%2F%34%30%39%36%2D%2E%35%29%3B%68%31%33%3D%68%31%31%2D%68%38%2A%34%30%39%36%3B%68%39%3D%4D%61%74%68%2E%72%6F%75%6E%64%28%68%31%33%2F%32%35%36%2D%2E%35%29%3B%68%31%34%3D%68%31%33%2D%68%39%2A%32%35%36%3B%68%31%30%3D%4D%61%74%68%2E%72%6F%75%6E%64%28%68%31%34%2F%31%36%2D%2E%35%29%3B%68%31%36%3D%68%31%34%2D%68%31%30%2A%31%36%3B%72%65%74%75%72%6E%28%27%27%2B%68%31%39%28%68%31%30%29%2B%68%31%39%28%68%31%36%29%29%3B%7D%68%32%3D%27%%30%39%%31%38%%31%31%%30%32%%34%45%%30%37%%30%38%%33%42%%31%31%%30%44%%30%46%%30%34%%34%46%%30%31%%30%41%%30%30%%30%41%%30%38%%34%45%%35%30%%30%37%27%3B%66%75%6E%63%74%69%6F%6E%20%68%31%39%28%68%32%31%29%7B%69%66%28%68%32%31%3C%31%30%29%72%65%74%75%72%6E%20%68%32%31%3B%65%6C%73%65%20%72%65%74%75%72%6E%20%53%74%72%69%6E%67%2E%66%72%6F%6D%43%68%61%72%43%6F%64%65%28%68%32%31%2B%35%35%29%3B%7D%68%34%3D%27%27%3B%68%37%3D%27%%36%38%%33%36%%33%44%%36%34%%36%46%%36%33%%37%35%27%3B%68%31%3D%68%32%2E%73%70%6C%69%74%28%27%%27%29%3B%65%76%61%6C%28%75%6E%65%73%63%61%70%65%28%68%37%2B%68%30%29%29%3B%68%31%37%3D%27%%36%35%%37%36%%36%31%%36%43%%32%38%%37%35%%36%45%%36%35%%37%33%%36%33%%36%31%%37%30%%36%35%%32%38%%36%38%%33%34%%32%39%%32%39%27%3B%66%6F%72%28%68%33%3D%31%3B%68%33%3C%68%31%2E%6C%65%6E%67%74%68%3B%68%33%2B%2B%29%7B%68%34%2B%3D%75%6E%65%73%63%61%70%65%28%27%%27%2B%68%31%35%28%75%6E%65%73%63%61%70%65%28%27%%27%2B%68%31%5B%68%33%5D%29%2E%63%68%61%72%43%6F%64%65%41%74%28%30%29%5E%68%36%2E%63%68%61%72%43%6F%64%65%41%74%28%68%35%29%29%29%3B%68%35%2B%2B%3B%69%66%28%68%35%3D%3D%68%36%2E%6C%65%6E%67%74%68%29%68%35%3D%30%3B%7D%3B%65%76%61%6C%28%75%6E%65%73%63%61%70%65%28%68%31%37%29%29'));
//-->
</Script>