https://github.com/osumatrix/expimont-waf-challenge-reversed
🛡 Deobfuscated challenge of the Expimont WAF
https://github.com/osumatrix/expimont-waf-challenge-reversed
1337 deobfuscation expimont js reverse-engineering waf
Last synced: about 1 month ago
JSON representation
🛡 Deobfuscated challenge of the Expimont WAF
- Host: GitHub
- URL: https://github.com/osumatrix/expimont-waf-challenge-reversed
- Owner: oSumAtrIX
- Created: 2021-12-24T00:06:03.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2021-12-24T06:28:34.000Z (over 3 years ago)
- Last Synced: 2024-10-19T00:18:23.856Z (6 months ago)
- Topics: 1337, deobfuscation, expimont, js, reverse-engineering, waf
- Language: JavaScript
- Homepage: https://osumatrix.me
- Size: 32.2 KB
- Stars: 0
- Watchers: 2
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
![]()
# 👩💻 Expimont challenge - reversed
Deobfuscated challenge of the [Expimont WAF JavaScript challenge](https://expimont.com/expimont/js/challenge.js)## ⚙ How it works
The JS challenge sets a cookie based on `testcookie_enc_set`. It uses the value of `testcookie_enc_set` to call some functions and generate an object. This object is then passed to the decryption function to generate the cookie. Afterwards you get redirected to the page. The decryption object can be dumped at the point where the cookie is being set in order to statically generate the cookie.