Bookmarks (8)

  • A Brief Survey of Code Obfuscation Techniques

    Programs often have secrets that their programmers want to hide, and it is not always possible...

  • Reducing Memory Allocations in Golang

    Go’s place between C and Python in terms of abstraction and garbage collection memory management model...

  • How Websites Know You're Lying About Your User-Agent

    Spoofing a browser’s user agent is often hailed as a privacy enhancing technique. On the Chrome...

  • A Simple Anti Gdb Trick

    After reading Alex O’Mara’s post about preventing disassembly with Hopper by including the Hopper self-protection signature...

  • Deobfuscated PerimeterX Code

    I deobfuscated PerimeterX’s bot detection JavaScript using the shift-refactor library. Input file (perimeterx.js): Original, Mirror. Deobfuscator...

  • Analyzing Forter's Fraud Prevention JavaScript

    Forter is a fraud prevention vendor for ecommerce sites. They collect a large number of signals...

  • Analysis of a Commercial Browser Fingerprinting Service

    Augur (2013-2017) was a commercial browser fingerprinting service, offered primarily to AdTech companies. In this post...

  • Understanding Distil Networks Anti-Bot Code

    Introduction I was browsing Whitepages when I noticed a request to https://www.whitepages.com/dstl-wp.js[1]. After beautifying the code,...