Jump to content

GreenTrees

Members
  • Posts

    4
  • Joined

  • Last visited

Reputation

0 Neutral

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Thank you Jovan, Are you able to remove my attachment please.
  2. Hi, the login area to my site is reporting v2.6.20 | Heuristics: phishing
  3. Thanks for the offer but thats not really what I'm looking for, apologies for not making myself clearer. What I am looking to discover is what the script actually does ie decoding / analysing it and generally making it available for discussion with a view to learning more about what these people are up to. Is this the right place for that sort of thing ? -Thanks -GT
  4. Hi All, My friends website got hacked this week, all the .html files had a reference to a russian site inserted before the <body> tag. Like a twit when the site said it needed to access a microsoft .dll I let it (doh) and am now wondering what it may have done to my machine. I have extracted two scripts from my temporary files the first was I think run on the first visit and the 2nd when I went back to the site to have another look, doh ! The 1st script looks like this... //<script> try{if(n3Vk='*')throw new TypeError('%');}catch(thz){n3Vk=thz.message;} var oF2='.....data.....'; eval(unescape(oF2.replace(/[siPY]/g,n3Vk))); //</script> and the 2nd... <script> try{if(GT55='*')throw new TypeError('%');}catch(nOi){GT55=nOi.message;} ptfx='.....data.....'; eval(unescape(ptfx.replace(/[~LVn]/g,GT55))); </script> Would this forum be a good place to post the complete script and hopefully have someone decode it and find out what it may have done ?? Many thanks -Gt
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.