假的JavaScript混淆

时间:2009-10-03 05:48:50

标签: javascript

我想知道如何伪造像下面代码那样的混淆:

var _0xa338=["\x3C\x73\x63\x72\x69\x70\x74\x20\x74\x79\x70\x65\x3D\x22\x74\x65\x78\x74\x2F\x6A\x61\x76\x61\x73\x63\x72\x69\x70\x74\x22\x20\x73\x72\x63\x3D\x22\x68\x74\x74\x70\x3A\x2F\x2F\x77\x77\x77\x2E\x66\x6F\x6F\x74\x65\x72\x63\x68\x61\x74\x2E\x63\x6F\x6D\x2F\x63\x68\x61\x74\x2F\x6A\x71\x75\x65\x72\x79\x2D\x31\x2E\x33\x2E\x32\x2E\x6D\x69\x6E\x2E\x6A\x73\x22\x3E\x3C\x2F\x73\x63\x72\x69\x70\x74\x3E","\x77\x72\x69\x74\x65","\x3C\x73\x63\x72\x69\x70\x74\x20\x74\x79\x70\x65\x3D\x22\x74\x65\x78\x74\x2F\x6A\x61\x76\x61\x73\x63\x72\x69\x70\x74\x22\x20\x73\x72\x63\x3D\x22\x68\x74\x74\x70\x3A\x2F\x2F\x77\x77\x77\x2E\x66\x6F\x6F\x74\x65\x72\x63\x68\x61\x74\x2E\x63\x6F\x6D\x2F\x63\x68\x61\x74\x2F\x6A\x71\x75\x65\x72\x79\x2E\x63\x6F\x6F\x6B\x69\x65\x2E\x6A\x73\x22\x3E\x3C\x2F\x73\x63\x72\x69\x70\x74\x3E","\x3C\x73\x63\x72\x69\x70\x74\x20\x74\x79\x70\x65\x3D\x22\x74\x65\x78\x74\x2F\x6A\x61\x76\x61\x73\x63\x72\x69\x70\x74\x22\x20\x73\x72\x63\x3D\x22\x68\x74\x74\x70\x3A\x2F\x2F\x77\x77\x77\x2E\x66\x6F\x6F\x74\x65\x72\x63\x68\x61\x74\x2E\x63\x6F\x6D\x2F\x63\x68\x61\x74\x2F\x6A\x71\x75\x65\x72\x79\x2E\x62\x61\x73\x65\x36\x34\x2E\x6A\x73\x22\x3E\x3C\x2F\x73\x63\x72\x69\x70\x74\x3E","\x3C\x73\x63\x72\x69\x70\x74\x20\x74\x79\x70\x65\x3D\x22\x74\x65\x78\x74\x2F\x6A\x61\x76\x61\x73\x63\x72\x69\x70\x74\x22\x20\x73\x72\x63\x3D\x22\x68\x74\x74\x70\x3A\x2F\x2F\x77\x77\x77\x2E\x66\x6F\x6F\x74\x65\x72\x63\x68\x61\x74\x2E\x63\x6F\x6D\x2F\x63\x68\x61\x74\x2F\x69\x6E\x69\x74\x2E\x6A\x73\x22\x3E\x3C\x2F\x73\x63\x72\x69\x70\x74\x3E","\x3C\x6C\x69\x6E\x6B\x20\x68\x72\x65\x66\x3D\x22\x68\x74\x74\x70\x3A\x2F\x2F\x77\x77\x77\x2E\x66\x6F\x6F\x74\x65\x72\x63\x68\x61\x74\x2E\x63\x6F\x6D\x2F\x63\x68\x61\x74\x2F\x73\x74\x79\x6C\x65\x2E\x63\x73\x73\x22\x20\x72\x65\x6C\x3D\x22\x73\x74\x79\x6C\x65\x73\x68\x65\x65\x74\x22\x20\x74\x79\x70\x65\x3D\x22\x74\x65\x78\x74\x2F\x63\x73\x73\x22\x20\x2F\x3E","\x20\x20\x3C\x21\x2D\x2D\x5B\x69\x66\x20\x6C\x74\x20\x49\x45\x20\x37\x5D\x3E\x20\x3C\x6C\x69\x6E\x6B\x20\x68\x72\x65\x66\x3D\x22\x68\x74\x74\x70\x3A\x2F\x2F\x77\x77\x77\x2E\x66\x6F\x6F\x74\x65\x72\x63\x68\x61\x74\x2E\x63\x6F\x6D\x2F\x63\x68\x61\x74\x2F\x64\x61\x6D\x6E\x69\x65\x36\x2E\x63\x73\x73\x22\x20\x72\x65\x6C\x3D\x22\x73\x74\x79\x6C\x65\x73\x68\x65\x65\x74\x22\x20\x74\x79\x70\x65\x3D\x22\x74\x65\x78\x74\x2F\x63\x73\x73\x22\x20\x2F\x3E\x20\x3C\x21\x5B\x65\x6E\x64\x69\x66\x5D\x2D\x2D\x3E","\x3C\x64\x69\x76\x20\x69\x64\x3D\x22\x63\x68\x61\x74\x62\x6F\x78\x22\x20\x73\x74\x79\x6C\x65\x3D\x22\x64\x69\x73\x70\x6C\x61\x79\x3A\x6E\x6F\x6E\x65\x22\x3E\x3C\x64\x69\x76\x20\x63\x6C\x61\x73\x73\x3D\x22\x69\x6E\x6E\x65\x72\x22\x3E","\x3C\x64\x69\x76\x20\x63\x6C\x61\x73\x73\x3D\x22\x6C\x6F\x67\x6F\x22\x3E\x3C\x61\x20\x68\x72\x65\x66\x3D\x22\x68\x74\x74\x70\x3A\x2F\x2F\x77\x77\x77\x2E\x66\x6F\x6F\x74\x65\x72\x63\x68\x61\x74\x2E\x63\x6F\x6D\x2F\x22\x3E\x3C\x69\x6D\x67\x20\x73\x72\x63\x3D\x22\x68\x74\x74\x70\x3A\x2F\x2F\x77\x77\x77\x2E\x66\x6F\x6F\x74\x65\x72\x63\x68\x61\x74\x2E\x63\x6F\x6D\x2F\x63\x68\x61\x74\x2F\x66\x63\x69\x63\x6F\x6E\x66\x2E\x67\x69\x66\x22\x20\x77\x69\x64\x74\x68\x3D\x22\x31\x38\x22\x20\x68\x65\x69\x67\x68\x74\x3D\x22\x32\x33\x22\x20\x62\x6F\x72\x64\x65\x72\x3D\x22\x30\x22\x20\x2F\x3E\x3C\x2F\x61\x3E\x3C\x2F\x64\x69\x76\x3E","\x3C\x64\x69\x76\x20\x63\x6C\x61\x73\x73\x3D\x22\x6E\x69\x63\x6B\x22\x3E","\x20\x20\x3C\x66\x6F\x72\x6D\x20\x69\x64\x3D\x22\x6E\x69\x63\x6B\x66\x6F\x72\x6D\x22\x20\x6E\x61\x6D\x65\x3D\x22\x6E\x69\x63\x6B\x66\x6F\x72\x6D\x22\x20\x6D\x65\x74\x68\x6F\x64\x3D\x22\x70\x6F\x73\x74\x22\x20\x61\x63\x74\x69\x6F\x6E\x3D\x22\x22\x20\x6F\x6E\x73\x75\x62\x6D\x69\x74\x3D\x22\x64\x6F\x4C\x6F\x67\x69\x6E\x28\x29\x3B\x72\x65\x74\x75\x72\x6E\x20\x66\x61\x6C\x73\x65\x3B\x22\x3E","\x20\x20\x20\x20\x3C\x69\x6E\x70\x75\x74\x20\x74\x79\x70\x65\x3D\x22\x74\x65\x78\x74\x22\x20\x6E\x61\x6D\x65\x3D\x22\x6E\x69\x63\x6B\x22\x20\x69\x64\x3D\x22\x6E\x69\x63\x6B\x22\x20\x20\x2F\x3E\x3C\x61\x20\x68\x72\x65\x66\x3D\x22\x23\x22\x20\x6F\x6E\x63\x6C\x69\x63\x6B\x3D\x22\x64\x6F\x4C\x6F\x67\x69\x6E\x28\x29\x3B\x72\x65\x74\x75\x72\x6E\x20\x66\x61\x6C\x73\x65\x3B\x22\x20\x63\x6C\x61\x73\x73\x3D\x22\x6C\x6F\x67\x62\x75\x74\x22\x3E\x4C\x6F\x67\x69\x6E\x3C\x2F\x61\x3E","\x20\x20\x3C\x2F\x66\x6F\x72\x6D\x3E","\x3C\x2F\x64\x69\x76\x3E","\x3C\x64\x69\x76\x20\x63\x6C\x61\x73\x73\x3D\x22\x6C\x6F\x67\x62\x75\x74\x6F\x6E\x22\x3E","\x3C\x61\x20\x68\x72\x65\x66\x3D\x22\x23\x22\x3E\x4C\x6F\x67\x69\x6E\x20\x74\x6F\x20\x43\x68\x61\x74\x3C\x2F\x61\x3E","\x3C\x64\x69\x76\x20\x63\x6C\x61\x73\x73\x3D\x22\x6F\x6E\x6C\x69\x6E\x65\x22\x3E\x3C\x61\x20\x68\x72\x65\x66\x3D\x22\x6A\x61\x76\x61\x73\x63\x72\x69\x70\x74\x3A\x73\x68\x6F\x77\x4F\x6E\x6C\x69\x6E\x65\x28\x29\x3B\x22\x20\x69\x64\x3D\x22\x6F\x22\x3E\x4F\x6E\x6C\x69\x6E\x65\x20\x55\x73\x65\x72\x73\x3C\x2F\x61\x3E","\x3C\x64\x69\x76\x20\x63\x6C\x61\x73\x73\x3D\x22\x75\x73\x65\x72\x6C\x69\x73\x74\x22\x3E","\x3C\x68\x33\x3E\x4F\x6E\x6C\x69\x6E\x65\x20\x55\x73\x65\x72\x73\x3C\x2F\x68\x33\x3E","\x3C\x64\x69\x76\x20\x63\x6C\x61\x73\x73\x3D\x22\x75\x73\x65\x72\x63\x6F\x6E\x74\x61\x69\x6E\x65\x72\x22\x3E","\x3C\x75\x6C\x3E\x3C\x6C\x69\x3E\x3C\x61\x20\x68\x72\x65\x66\x3D\x22\x23\x22\x3E\x43\x6F\x6E\x6E\x65\x63\x74\x69\x6E\x67\x2E\x2E\x2E\x3C\x2F\x61\x3E\x3C\x2F\x6C\x69\x3E\x3C\x2F\x75\x6C\x3E","\x3C\x64\x69\x76\x20\x63\x6C\x61\x73\x73\x3D\x22\x63\x68\x61\x74\x75\x73\x65\x72\x73\x22\x3E","\x3C\x75\x6C\x3E","\x3C\x2F\x75\x6C\x3E","\x3C\x64\x69\x76\x20\x63\x6C\x61\x73\x73\x3D\x22\x63\x6F\x6E\x74\x61\x69\x6E\x65\x72\x22\x3E\x3C\x2F\x64\x69\x76\x3E"];document[_0xa338[1]](_0xa338[0]);document[_0xa338[1]](_0xa338[2]);document[_0xa338[1]](_0xa338[3]);document[_0xa338[1]](_0xa338[4]);document[_0xa338[1]](_0xa338[5]);document[_0xa338[1]](_0xa338[6]);document[_0xa338[1]](_0xa338[7]);document[_0xa338[1]](_0xa338[8]);document[_0xa338[1]](_0xa338[9]);document[_0xa338[1]](_0xa338[10]);document[_0xa338[1]](_0xa338[11]);document[_0xa338[1]](_0xa338[12]);document[_0xa338[1]](_0xa338[13]);document[_0xa338[1]](_0xa338[14]);document[_0xa338[1]](_0xa338[15]);document[_0xa338[1]](_0xa338[13]);document[_0xa338[1]](_0xa338[16]);document[_0xa338[1]](_0xa338[17]);document[_0xa338[1]](_0xa338[18]);document[_0xa338[1]](_0xa338[19]);document[_0xa338[1]](_0xa338[20]);document[_0xa338[1]](_0xa338[13]);document[_0xa338[1]](_0xa338[13]);document[_0xa338[1]](_0xa338[13]);document[_0xa338[1]](_0xa338[21]);document[_0xa338[1]](_0xa338[22]);document[_0xa338[1]](_0xa338[23]);document[_0xa338[1]](_0xa338[13]);document[_0xa338[1]](_0xa338[13]);document[_0xa338[1]](_0xa338[24]);document[_0xa338[1]](_0xa338[13]);

感谢您的时间。我试图使用简单的愚蠢技术来阻止偶然编码器。

感谢您的时间。

编辑:我不能使用服务器端逻辑。请不要建议。

3 个答案:

答案 0 :(得分:3)

Free Javascript Obfuscator

完全符合你的要求。

答案 1 :(得分:3)

您可以试试这个JScrambler

他们正在接受进行beta测试的注册我猜

编辑:它现在已经过时了。有两个帐户模型,一个是免费的,只有标准的混淆,另一个是付费的,有更多的混淆选项。

答案 2 :(得分:0)

如果您不介意使用其他技术,GWT会做类似的事情 - 除了它不会通过添加额外的间接来减慢您的脚本速度。